IEEE P1931.1 is an upcoming IEEE standard that defines an architectural framework, protocols and Application Programming Interfaces (APIs) for providing Real-time Onsite Operations Facilitation (ROOF). ROOF computing and networking for the data and the devices include next-hop connectivity for the devices, real-time context building and decision triggers, efficient backhaul connectivity to the cloud, and security & privacy.
the small ppt on IOT.
i gave presentation on this topic which is very useful.
Iot is very big things to learn and it contains many of the things like sensors,Internet etc.
Independent of the source of data, the integration of event streams into an Enterprise Architecture gets more and more important in the world of sensors, social media streams and Internet of Things. Events have to be accepted quickly and reliably, they have to be distributed and analysed, often with many consumers or systems interested in all or part of the events. Dependent on the size and quantity of such events, this can quickly be in the range of Big Data. How can we efficiently collect and transmit these events? How can we make sure that we can always report over historical events? How can these new events be integrated into traditional infrastructure and application landscape?
Starting with a product and technology neutral reference architecture, we will then present different solutions using Open Source frameworks and the Oracle Stack both for on premises as well as the cloud.
IEEE P1931.1 is an upcoming IEEE standard that defines an architectural framework, protocols and Application Programming Interfaces (APIs) for providing Real-time Onsite Operations Facilitation (ROOF). ROOF computing and networking for the data and the devices include next-hop connectivity for the devices, real-time context building and decision triggers, efficient backhaul connectivity to the cloud, and security & privacy.
the small ppt on IOT.
i gave presentation on this topic which is very useful.
Iot is very big things to learn and it contains many of the things like sensors,Internet etc.
Independent of the source of data, the integration of event streams into an Enterprise Architecture gets more and more important in the world of sensors, social media streams and Internet of Things. Events have to be accepted quickly and reliably, they have to be distributed and analysed, often with many consumers or systems interested in all or part of the events. Dependent on the size and quantity of such events, this can quickly be in the range of Big Data. How can we efficiently collect and transmit these events? How can we make sure that we can always report over historical events? How can these new events be integrated into traditional infrastructure and application landscape?
Starting with a product and technology neutral reference architecture, we will then present different solutions using Open Source frameworks and the Oracle Stack both for on premises as well as the cloud.
Machine to machine (M2M) is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.
Primarily M2M and IoT are similar in upper layer such as hardware, networking or devices. But they differ in system architecture, types of applications and underlying Technologies.
This will be helpful for GTU IOT subject course understanding too!
If you like the video please subscribe to our channel and turn notifications on for future videos.
Follow us on:
Website: http://www.edtechnology.in/
Instagram: https://www.instagram.com/ed.tech/
Facebook: https://www.facebook.com/Edtech18/
IoT and machine learning - Computational Intelligence conferenceAjit Jaokar
Slides for IoT and Machine learning talk. Sign up at Sign up at www.futuretext.com to get forthcoming copies of papers on IoT and Machine learning, Real time algorithms for IoT and Machine learning algorithms for Smart cities
IOT is connecting every physical object in the world using wireless technologies to track and control them from every where in the world...Every object is uniquely identified using ip addresses(IPv6)
In this presentation, Divya introduces IoT and associated trends. Natasha is interested in IoT applications in the domains of smart cities and pollution reporting.
All the details of Fog Computing is discussed in this PPT, its better to get knowledge about this ppt,All the details of applications and examples are covered..
Introduction to IoT, Arduino and Raspberry pi. Also a project on environment parameter sensing using IoT. the presentation gives basic understanding of how internet of things works, what are its uses, applications, the fields it can be used in and its future scope.
The project is about collecting useful data using sensors and uploading on the server to keep track of the parameters.
Here's how big data and the Internet of Things work together: a vast network of sensors (IoT) collect a boatload of information (big data) that is then used to improve services and products in various industries, which in turn generate revenue.
Internet of Things means every household or handy device which is used to make our world easy and better and connected with IP which transmit some data.
This slide covers IOT description, OWASP Top 10 2014 & its recommendations.
INTRODUCTION
IoT history
IoT world
IoT in Gartner Hype cycle
IoT economic impact and trends
ABOUT IoT
What is IoT ?
IoT market environment
Technologies behind IoT
IoT global roadmap
What is IoT ?
IoT market environment
Technologies behind IoT
IoT global roadmap
APPLICATIONS OF IoT
Selection of impacting examples
IS IoT FOR YOU?
List of questions to help you moving forward!
Why should you start exploring IoT opportunities?
Preliminary questions before jumping in (Skills, assets…)
Helpful survey for researchers and students who are intended to investigate in the Internet of things field in term of security and privacy side. This survey has general overview in security issues with the solutions addressed these issues.
Fog computing, also known as fogging/edge computing, it is a model in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud.
The term "Fog Computing" was introduced by the Cisco Systems .
Its extended from cloud
A look at where the market of the Internet of Things is and how technologies like Node.js (JavaScript) and the Intel Edison are making it easier to create connected solutions.
Learn more at https://losant.com.
The major topics include:
* What is the Internet of Things
* Where is IoT Today
* 4 Parts of IoT (Collect, Communicate, Analyze, Act)
* Why JavaScript is Good for IoT
* How Node.js is Making a Dent in the Internet of Things
* What npm Modules are used for Hardware (Johnny-Five, Cylon.js, MRAA)
* What is the Intel Edison
* How to Best Work with the Edison
* Tips for Edison (MRAA, Grove Kit, UPM)
* Where the World of JavaScript and IoT is Going
FogFlow: Cloud-Edge Orchestrator in FIWAREBin Cheng
fog computing framework with agile programming models. It allows IoT service providers to easily design and implement their services, meanwhile automatically launching dynamic data processing flows over cloud and edges in an optimized manner.
Machine to machine (M2M) is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.
Primarily M2M and IoT are similar in upper layer such as hardware, networking or devices. But they differ in system architecture, types of applications and underlying Technologies.
This will be helpful for GTU IOT subject course understanding too!
If you like the video please subscribe to our channel and turn notifications on for future videos.
Follow us on:
Website: http://www.edtechnology.in/
Instagram: https://www.instagram.com/ed.tech/
Facebook: https://www.facebook.com/Edtech18/
IoT and machine learning - Computational Intelligence conferenceAjit Jaokar
Slides for IoT and Machine learning talk. Sign up at Sign up at www.futuretext.com to get forthcoming copies of papers on IoT and Machine learning, Real time algorithms for IoT and Machine learning algorithms for Smart cities
IOT is connecting every physical object in the world using wireless technologies to track and control them from every where in the world...Every object is uniquely identified using ip addresses(IPv6)
In this presentation, Divya introduces IoT and associated trends. Natasha is interested in IoT applications in the domains of smart cities and pollution reporting.
All the details of Fog Computing is discussed in this PPT, its better to get knowledge about this ppt,All the details of applications and examples are covered..
Introduction to IoT, Arduino and Raspberry pi. Also a project on environment parameter sensing using IoT. the presentation gives basic understanding of how internet of things works, what are its uses, applications, the fields it can be used in and its future scope.
The project is about collecting useful data using sensors and uploading on the server to keep track of the parameters.
Here's how big data and the Internet of Things work together: a vast network of sensors (IoT) collect a boatload of information (big data) that is then used to improve services and products in various industries, which in turn generate revenue.
Internet of Things means every household or handy device which is used to make our world easy and better and connected with IP which transmit some data.
This slide covers IOT description, OWASP Top 10 2014 & its recommendations.
INTRODUCTION
IoT history
IoT world
IoT in Gartner Hype cycle
IoT economic impact and trends
ABOUT IoT
What is IoT ?
IoT market environment
Technologies behind IoT
IoT global roadmap
What is IoT ?
IoT market environment
Technologies behind IoT
IoT global roadmap
APPLICATIONS OF IoT
Selection of impacting examples
IS IoT FOR YOU?
List of questions to help you moving forward!
Why should you start exploring IoT opportunities?
Preliminary questions before jumping in (Skills, assets…)
Helpful survey for researchers and students who are intended to investigate in the Internet of things field in term of security and privacy side. This survey has general overview in security issues with the solutions addressed these issues.
Fog computing, also known as fogging/edge computing, it is a model in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud.
The term "Fog Computing" was introduced by the Cisco Systems .
Its extended from cloud
A look at where the market of the Internet of Things is and how technologies like Node.js (JavaScript) and the Intel Edison are making it easier to create connected solutions.
Learn more at https://losant.com.
The major topics include:
* What is the Internet of Things
* Where is IoT Today
* 4 Parts of IoT (Collect, Communicate, Analyze, Act)
* Why JavaScript is Good for IoT
* How Node.js is Making a Dent in the Internet of Things
* What npm Modules are used for Hardware (Johnny-Five, Cylon.js, MRAA)
* What is the Intel Edison
* How to Best Work with the Edison
* Tips for Edison (MRAA, Grove Kit, UPM)
* Where the World of JavaScript and IoT is Going
FogFlow: Cloud-Edge Orchestrator in FIWAREBin Cheng
fog computing framework with agile programming models. It allows IoT service providers to easily design and implement their services, meanwhile automatically launching dynamic data processing flows over cloud and edges in an optimized manner.
What is Your Edge From the Cloud to the Edge, Extending Your ReachSUSE
As companies continue to take advantage of the benefits of cloud – increased flexibility, speed of innovation and quickly responding to business demands, it is no wonder that they want to extend these benefits to the edge. But there are still a lot of questions.
"Cindy Xing is a Principal Software Dev Lead at Microsoft, with over 15 years of working experience in building and delivering large scale software distributed systems.
Her talk during the Data Science Conference will be focused on Edge Computing. Edge computing is the practice of processing data near the edge of your network, where the data is being generated, instead of in a centralized data-processing warehouse."
Walking through the fog (computing) - Keynote talk at Italian Networking Work...FBK CREATE-NET
"Walking through the fog (computing): trends, use-cases and open issues"
Despite its huge success in many IT-enabled application scenarios, cloud computing has demonstrated some intrinsic limitations that may severely limit its adoption in several contexts where constraints like e.g. preserving data locally, ensuring real-time reactivity or guaranteeing operation continuity despite lack of Internet connectivity (or a combination of them) are mandatory. These distinguishing requirements fostered an increased interest toward computing approaches that inherit the flexibility and adaptability of the cloud paradigm, while acting in proximity of a specific scenario. As a consequence, the emergence of this “proximity computing” approach has exploded into a plethora of architectural solutions (and novel terms) like fog computing, edge computing, dew computing, mist computing but also cloudlets, mobile cloud computing, mobile edge computing (and probably few others I may not be aware of…). The talk will initially make an attempt to introduce some clarity among these “foggy” definitions by proposing a taxonomy whose aim is to help identifying their peculiarities as well as their overlaps. Afterwards, the most important components of a generalized proximity computing architecture will be explained, followed by the description of few research works and use cases investigated within our Center and based on this emerging paradigm. An overview of open issues and interesting research directions will conclude the talk.
AccML, co-located with HiPEAC 2021_Pedro Trancoso presentationVEDLIoT Project
Project Summary
The ever increasing performance of computer systems in general and IoT systems, in particular, delivers the capability to solve increasingly challenging problems, pushing automation to improve the quality of our life. This triggers the need for a next-generation IoT architecture, satisfying the demand for key sectors like transportation (e.g. self-driving cars), industry (e.g. robotization or predictive maintenance), and our homes (e.g. assisted living). Such applications require building systems of enormous complexity, so that traditional approaches start to fail. The amount of data collected and processed is huge, the computational power required is very high, and the algorithms are too complex allowing for the computation of solutions within the tight time constraints. In addition, security, privacy, or robustness for such systems becomes a critical challenge.
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...Xirrus
Xirrus is the leading provider of high-performance wireless networks. Xirrus solutions perform under the most demanding circumstances, offering consistent “wired-like” performance with superior coverage and security.
This includes short description about modern computer network technologies like: 5G Technology, Artificial intelligence (AI), Augmented Reality and Virtual Reality, IoT, Edge/cloud computing, WIFI-6, SDN, SD-WAN, DevOps etc.
Insurtech, Cloud and Cybersecurity - Chartered Insurance InstituteHenrique Centieiro
Nov. 2020 presentation on Insurtech, how cloud is enabling insurtech and cybersecurity for cloud and insurtech.
Prepared by Henrique Centieiro for CII - Chartered Insurance Institute Hong Kong
In this session, we will take a deep-dive into the DevOps process that comes with Azure Machine Learning service, a cloud service that you can use to track as you build, train, deploy and manage models. We zoom into how the data science process can be made traceable and deploy the model with Azure DevOps to a Kubernetes cluster.
At the end of this session, you will have a good grasp of the technological building blocks of Azure machine learning services and can bring a machine learning project safely into production.
When it comes to microservice architecture, sometimes all you wanted is to perform cross cutting concerns ( logging, authentication , caching, CORS, Routing, load balancing , exception handling , tracing, resiliency etc..) and also there might be a scenario where you wanted to perform certain manipulations on your request payload before hitting into your actual handler. And this should not be a repetitive code in each of the services , so all you might need is a single place to orchestrate all these concerns and that is where Middleware comes into the picture. In the demo I will be covering how to orchestrate these cross cutting concerns by using Azure functions as a Serverless model.
In this talk, we will start with some introduction to Azure Functions, its triggers and bindings. Later we will build a serverless solution to solve a problem statement by using different triggers and bindings of Azure Functions.
Language to be used: C# and IDE - Visual Studio 2019 Community Edition"
In this workshop, you will understand how Azure DevOps Services helps you scale DevOps adoption strategies in enterprise. We will explore various feature and services that can enable you to implement various DevOps practices starting from planning, version control, CI & CD , Dependency Management and Test planning.
In this session, we will understand how to create your first pipeline and build an environment to restore dependencies and how to run tests in Azure DevOps followed by building an image and pushing it to container registry.
In this session, we will discuss a use case where we need to quickly develop web and mobile front end applications which are using several different frameworks, hosting options, and complex integrations between systems under the hood. Let’s see how we can leverage serverless technologies (Azure Functions and logic apps) and Low Code/No code platform to achieve the goal. During the session we will go though the code followed by a demonstration.
CREATING REAL TIME DASHBOARD WITH BLAZOR, AZURE FUNCTION COSMOS DB AN AZURE S...CodeOps Technologies LLP
In this talk people will get to know how we can use change feed feature of Cosmos DB and use azure functions and signal or service to develop a real time dashboard system
Imagine a scenario, where you can launch a video call or chat with an advisor, agent, or clinician in just one-click. We will explore application patterns that will enable you to write event-driven, resilient and highly scalable applications with Functions that too with power of engaging communication experience at scale. During the session, we will go through the use case along with code walkthrough and demonstration.
We will walk through the exploration, training and serving of a machine learning model by leveraging Kubeflow's main components. We will use Jupyter notebooks on the cluster to train the model and then introduce Kubeflow Pipelines to chain all the steps together, to automate the entire process.
It is difficult to deploy interloop Kubernetes development in current state. Know these open-source projects that can save us from the burden of various tools and help in deploying microservices on Kubernetes cluster without saving secrets in a file.
Must Know Azure Kubernetes Best Practices And Features For Better Resiliency ...CodeOps Technologies LLP
Running day-1 Ops on your Kubernetes is somewhat easy, but it is quite daunting to manage day two challenges. Learn about AKS best practices for your cloud-native applications so that you can avoid blow up your workloads.
Prometheus is a popular open source metric monitoring solution and Azure Monitor provides a seamless onboarding experience to collect Prometheus metrics. Learn how to configure scraping of Prometheus metrics with Azure Monitor for containers running in AKS cluster.
What if you could combine Trello, GitLab, JIRA, Calendar, Slack, Confluence, and more - all together into one solution?
Yes, we are talking about Space - the latest tool from JetBrains famous for its developer productivity-enhancing tools (esp. IntelliJ IDEA).
Here we have explained about JetBrains' space and its functionalities.
This talk will serve as a practical introduction to Distributed Tracing. We will see how we can make best use of open source distributed tracing platforms like Hypertrace with Azure and find the root cause of problems and predict issues in our critical business applications beforehand.
This talk serves as a practical introduction to Distributed Tracing. We will see how we can make best use of open source distributed tracing platforms like Hypertrace with Azure and find the root cause of problems and predict issues in our critical business applications beforehand.
Presentation part of Open Source Days on 30 Oct - ossdays.konfhub.com
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Introduction to roof computing by Nishant Krishna
1. IEEE P1931.1
Introduction to ROOF Computing
Nishant Krishna
Software Architect and Consulting
Engineer, Avaya
Member, P1931.1 Working Group
(Slides reused from Syam Madanapalli,
Chair, P1931.1)
2. 2
About Nishant Krishna
Ø Software Architect, Innovator and Inventor with ~17 years of
experience working on Network Management Systems (NMS),
Cloud and Virtualization, Software-Defined Network (SDN), API
Development and Internet of Things (IoT) technologies.
Ø 2 patent granted and 5 patents filed/pending with US Patent
Office in the areas of Network Management Systems, Cloud,
Virtualization and SDN Technologies.
Ø I participate actively in User Experience (UX) and Wireframing
related activities.
Ø My areas of interest include Cloud and Virtualization, SDN, IoT,
UX, User Interfaces, Network Security, Cryptography, public
speaking and latest tech and gadgets.
Ø Nishant has a Master of Science (MS) in Software Engineering
degree from BITS, Pilani, along with many technical
certifications.
https://in.linkedin.com/in/nishantkrishna
https://twitter.com/nishantkrishna
3. 3
“There are two types of
organizations in today’s world,
those that have been breached and
those that just don’t know it yet.”
4. 6/18/174
Standards Title: Standard for an Architectural
Framework for Real-time Onsite Operations Facilitation
(ROOF) for the Internet of Things
• Technical and functional interoperability for IoT systems that
operate and co-operate in a secure and independent manner
within the context of a local environment such as home, factory,
office or airport, etc.
• Defines an architectural framework, protocols and Application
Programming Interfaces (APIs) for providing Real-time Onsite
Operations Facilitation (ROOF).
• ROOF computing and networking for the data and the devices
include next-hop connectivity for the devices, real-time context
building and decision triggers, efficient backhaul connectivity to
the cloud, and security & privacy.
• Defines how an end user is able to securely provision, commission
and decommission the devices.
Working Group Chair: Syam Madanapalli, Dell
IEEE P1931.1: ROOF Computing
5. 6/18/175
Standards Title: Standard for Harmonization of Internet
of Things (IoT) Devices and Systems
• Define a metadata bridge to facilitate IoT protocol transport for
sensors, actuators, and devices.
• The standard addresses issues of security, scalability, and
interoperability. This standard can provide significant cost savings
and reduce complexity, and offer a data sharing approach
leveraging current instrumentation and devices used in industry
• The backend of such a globally scalable, secure and interoperable
network would be based on the eXtensible Messaging and
Presence Protocol (XMPP),
• Key components and needs of a successful Smart City
infrastructure will be identified and addressed. This standard does
not develop Application Programming Interfaces (APIs) for
existing IoT or legacy protocols.
Working Group Chair: Dr. William Miller, MACT-USA, Dr.
Muzzammil Hussain, Samsung (India Focus Group for 1451)
IEEE P1451-99: IoT Harmonisation
7. History of Computing Paradigms
1960s
Server Computing
1990s
Distributed Computing
2000s
Cloud Computing
Server
VPN Cloud
Headquarters
Subsidiaries
Remote users Remote users
Headquarters
Subsidiaries
Terminals
8. Roof, Humans and the Internet of Things
8
Roof protects people and their
possessions.*
* "Roof". Wikipedia. N.p., 2016. Web.
The Internet of Things, the
constrained devices, require an
environment wherein they can
operate, build trust, collaborate
and be protected.
Need a Roof for the Internet
of Things.
9. IoT and the Autonomy
9
An IoT system should have various decision
and automation tools that operate and
cooperate autonomously within the context of
a local environment.
10. What is Roof?
10
The ROOF
• A new computing paradigm for the Internet of Things
• ROOF is both a metaphor and acronym
• Below the Cloud and Fog
The Primary goal
• To provide Autonomous and Realtime Response over a period
of time
• Context building using edge analytics
Others
• To support plug and play connectivity for the Things
• Efficient connectivity to the Cloud/Service providers
• Security by default with contextual analysis
• Local storage
11. The Roof – for the Better Internet of Things
11
Cloud
Hundreds
Up to 1000s of
kilometers away
Fog
Tens of thousands
Few kilometers
away
ROOF
Millions to billions
Few meters/one-hop
away
Things
Billions to
trillions
ROOF – Realtime Onsite Operations Facilitation for the
Internet of Things
12. Motivation for the Roof
12
Various
access & data
protocols
Realtime and
offline
support
Constrained
nodes, and
device & data
protection
Variety of
sensor & data
and evolving
infrastructure
Connectivity Context Security Data
Framework
for
interoperabilit
y
Realtime
computing
Computing for
security and
privacy
Flexible
backhaul and
services
13. Roof Computing
Data/Service
Context
Security
Connectivity
13
Roof is a computational
paradigm for the Internet of
Things to provide
• Next-hop connectivity for the
Things
• Realtime context building and
actions
• Efficient data & service
connectivity to the
Cloud/service provider
• Framework and computing for
security & privacy
14. The Roof and the Spatiotemporal Location
14
It is important to treat all events with respect to their
temporal location!
If (this)
then
(react)
If (this)
then
(act)
If (this)
then
(optimiz
e)
If (this)
then
(plan)
Time
Realtime
Near realtime
Future
Things
Fog
Cloud
Roof
Fog
Roof Roof Roof
15. Roof Functional Model
15
IoT Services
Device&Network
Management
Security&Privacy
Management
Thing Connectivity
Cloud Connectivity &
Service Management
Context
Building
Local
Storage
Physical world (Things)
Intruders
Users
Cyber world/Service Providers
16. Roof Applications
16
Roof is essential for any IoT
application, including:
• Connected homes
• Connected industries
• Connected vehicles
• Connected healthcare
services
• Connected public
authorities
• Clusters of IoT deployments
in the smart cities
• Other highly distributed IoT
application deployments
Clou
d
Gateway
Things
Mobile
App
Internet
17. Roof with Blockchain
17
Cloud
Blockchain
• Establish peer-to-peer trust &
reputation
• Information sharing and
collaboration
• Move away on security from
passive prevention to
cooperative distributed
assurance
18. Roof vs. Fog vs. Cloud
18
Consideration
Computing Model
Roof Fog Cloud
Distance to Things Few meters Upto few kilometers
Upto thousands of
kilometers
Deployment numbers Millions to billions Tens of thousands Few hundreds
Technology
complexity
Simple Complex Simple
Implementation
complexity
Easy Difficult Easy
Content Machine data The Internet fringe Big data
Drivers
The things -
constrained
devices
Support for mobility
and to reduce the
latency
Big Data storage
and analytics
Applications All IoT applications
Large distributed IoT
applications
Appcesory, storage
and analytics
Cost of
implementation
Low High Medium
19. Goals for the Roof
1. Enable the devices under the Roof to collaborate and act in
realtime
2. Bridge the physical and cyber world, and allow horizontal
integration
3. Confirming to Roof requires security & privacy by design
4. Lower operational and maintenance cost with ease of
configuration, commissioning, use and maintenance
5. Easy to build and repeatable – hence increased reliability,
resilience and scalability for IoT deployments
6. Allow innovation for new business models and lower the barrier
for entry for device manufacturers and service providers
19
20. Goal 1: Context Building
Context Action
Devices
Sensor Fusion
Cn=2^s – 1
Cn = Max. no. of contexts
S= No. of States/services
Compute Context
Aggregate the data
Route the data
Data condensing is critical
because of the sheer
volumes of Data being
generated.
22. Goal 3: Security by Design
Security fusion, combining
multiple security touchpoints,
helps curb security threats.
Device manufacturers and Service providers
require support Security by design to fit into the
Roof Model.
Context
Authorization
Authentication
Network Security
Role Based
23. Goal 4: Better User Experience
Configuration
Commissioning and decommissioning
Software updates
Coherent services and distributed user experience
User aware security & privacy
24. Goal 5: Reuse & Scalability
A model that can be replicated easily
Be able to build large scale IoT applications, e.g. a Smart City
A model that can be used across multiple applications and verticals
Act autonomously in
realtime
Connect to the Cloud for
more value creation
Cloud
25. Goal 6: Innovation
Roof allows evolution of common IoT
platforms for rapid application/service
delivery
Applications can evolve
independently & enables an
environment for rapid innovation
Devices can evolve independently
Open IoT Platform
Service BService A Service N
26. What’s happening right now?
¾ Working group is meeting once every month. On an average close to 50
members join the meeting. The group has representation from industry,
standards body, device manufacturers, academia and many more areas,
from around the world.
¾ Sub-groups are already formed for various smaller sections of the
standard and they are activity working.
¾ Discussions about creating reference and open-source implementation
are going on.
¾ Use cases and areas where ROOF can be applicable are actively
identified in many of the sectors and are being expanded.
26
27. Few parting thoughts…
¾ Interoperability can be achieved through mandating a common set of
API, ontology and data semantics.
¾ We need to consider capability of establishing secure ownership of all
“things” including ROOF infrastructure. A “Software Roof of Trust” may
need to be established.
¾ We must allow ROOF and things to be private/business owned or rented
(owner maintains final control) and/or provided by an internet provider.
¾ May need to use blockchain to control both ownership and allowed
administrator/user along with a kill switch.
¾ We can’t leave out requirements for safety conformance of things,
communications, and processing of so many of the ROOFs and Things
that will be (already are) safety critical.
¾ Billions of ”things” out there use variety of protocols and standards. We
need to work towards developing protocols and strategies to integrate
such vast diversity of communication technologies.
27