This presentation was made during the Hackfest'2015 event, 11 and 12 April 2015 in Technopark Ghazella , Tunisia.
Presentation video : http://livestre.am/55ut5
The document discusses adding edge intelligence to Intel IoT gateways using the MIx Core platform. It defines the edge as the convergence of physical, security, connectivity, and data aspects where assets are located. The MIx Core platform integrates data streaming from sensors in real-time to enable preventative maintenance by detecting anomalies in vibration data from machines. This reduces equipment downtime and improves manufacturing performance.
IoT Edge Intelligence - The need for new software development approachesBart Jonkers
CeBIT 2016 talk on "IoT Edge Intelligence - The need for new software development approaches".
In order to bridge the 'IoT skills gap' or solve the 'IT vs OT' divide, the IoT market needs to enable traditional IT developers to move into the OT (operational technology) world. In the OT world, devices, gateways and machines run embedded software on proprietary operating systems, using unfamiliar communications protocols in resource constraint environments. To enable a large community of developers to build intelligent IoT edge applications, abstraction from these domain specific technologies and complexities is required. Bitreactive offers visual developer tooling to highly simplify the application development on devices and the way edge devices integrate to IoT sensors, cloud services, analytics, visualization services etc.
(Some technologies supported: MQTT, AMQP, BLE, Zigbee, OPC-UA, Paho, Californium, Kura, Coap, JSON-RPC, LoRA, Bluetooth, IBM Bluemix, IBM IoT Foundation, Microsoft Azure, AWS, Oracle IoT Cloud Service, GE Predix, GE Predix machine, Xively, Solair, Geofencing, Modbus, GPIO, RaspberryPI, XMPP, Eurotech Reliagate, Eurotech ESF, PLC, SCADA, DELL 5000, Intel IoT gateway, Multitech conduit, Java SE, openJDK, OSGi, Kura, Eclipse IoT, Embedded Java, Oauth 2.0, alternative to Node Red)
Blockchain, IoT and the GxP lab technology helping compliance?
This webinar discusses how distributed ledger technology like blockchain and IOTA could help enhance compliance in GxP laboratories. It explores how DLT could be used to track devices, materials, and data in a more transparent, trusted and auditable way. Specifically, it presents a vision of an internet-connected "laboratory of the future" where all devices share data using DLT. This could improve integrity, security and access to data while reducing costs. While DLT cannot directly increase compliance, it may help build trust in GxP systems and processes by making components more transparent to regulators.
Privacy and Security by Design Spotlight Presentation at HIMMS Privacy and Security Forum, December 5th 2016. Presented by Jeff R. Livingstone, PhD, Vice President and Global Lead, Life Sciences & Healthcare, Unisys Corporation.
This presentation is an overview of the directions of IoT development by leading world companies, described how the IoT and cloud environments can give a synergistic effect.
This presentation was held by Dov Nimratz (Solution Architect, Consultant, GlobalLogic) at GlobalLogic Ivano-Frankivks TechTalk on December 1, 2018.
5 IoT challenges to be faced in 2018- InfographicTestingXperts
After a revolutionary 2017 that saw the IoT become a household name throughout the world, there are several challenges that need to be addressed. Read this infographic and identify the top 5 challenges that the IoT eco-system will face.
Solving Industrial Data Integration with Machine IntelligenceBit Stew Systems
The document discusses the challenges of integrating industrial data from different sources due to its large volume, varied formats and complex relationships. It introduces MIx Core, a machine intelligence solution from Bit Stew Systems that can automate data integration through feature extraction, relationship mapping and generating a semantic model to solve problems that overwhelm traditional ETL approaches. The system uses machine learning algorithms to classify data fields and dynamically understand changing relationships without requiring large, costly integration teams.
This presentation was made during the Hackfest'2015 event, 11 and 12 April 2015 in Technopark Ghazella , Tunisia.
Presentation video : http://livestre.am/55ut5
The document discusses adding edge intelligence to Intel IoT gateways using the MIx Core platform. It defines the edge as the convergence of physical, security, connectivity, and data aspects where assets are located. The MIx Core platform integrates data streaming from sensors in real-time to enable preventative maintenance by detecting anomalies in vibration data from machines. This reduces equipment downtime and improves manufacturing performance.
IoT Edge Intelligence - The need for new software development approachesBart Jonkers
CeBIT 2016 talk on "IoT Edge Intelligence - The need for new software development approaches".
In order to bridge the 'IoT skills gap' or solve the 'IT vs OT' divide, the IoT market needs to enable traditional IT developers to move into the OT (operational technology) world. In the OT world, devices, gateways and machines run embedded software on proprietary operating systems, using unfamiliar communications protocols in resource constraint environments. To enable a large community of developers to build intelligent IoT edge applications, abstraction from these domain specific technologies and complexities is required. Bitreactive offers visual developer tooling to highly simplify the application development on devices and the way edge devices integrate to IoT sensors, cloud services, analytics, visualization services etc.
(Some technologies supported: MQTT, AMQP, BLE, Zigbee, OPC-UA, Paho, Californium, Kura, Coap, JSON-RPC, LoRA, Bluetooth, IBM Bluemix, IBM IoT Foundation, Microsoft Azure, AWS, Oracle IoT Cloud Service, GE Predix, GE Predix machine, Xively, Solair, Geofencing, Modbus, GPIO, RaspberryPI, XMPP, Eurotech Reliagate, Eurotech ESF, PLC, SCADA, DELL 5000, Intel IoT gateway, Multitech conduit, Java SE, openJDK, OSGi, Kura, Eclipse IoT, Embedded Java, Oauth 2.0, alternative to Node Red)
Blockchain, IoT and the GxP lab technology helping compliance?
This webinar discusses how distributed ledger technology like blockchain and IOTA could help enhance compliance in GxP laboratories. It explores how DLT could be used to track devices, materials, and data in a more transparent, trusted and auditable way. Specifically, it presents a vision of an internet-connected "laboratory of the future" where all devices share data using DLT. This could improve integrity, security and access to data while reducing costs. While DLT cannot directly increase compliance, it may help build trust in GxP systems and processes by making components more transparent to regulators.
Privacy and Security by Design Spotlight Presentation at HIMMS Privacy and Security Forum, December 5th 2016. Presented by Jeff R. Livingstone, PhD, Vice President and Global Lead, Life Sciences & Healthcare, Unisys Corporation.
This presentation is an overview of the directions of IoT development by leading world companies, described how the IoT and cloud environments can give a synergistic effect.
This presentation was held by Dov Nimratz (Solution Architect, Consultant, GlobalLogic) at GlobalLogic Ivano-Frankivks TechTalk on December 1, 2018.
5 IoT challenges to be faced in 2018- InfographicTestingXperts
After a revolutionary 2017 that saw the IoT become a household name throughout the world, there are several challenges that need to be addressed. Read this infographic and identify the top 5 challenges that the IoT eco-system will face.
Solving Industrial Data Integration with Machine IntelligenceBit Stew Systems
The document discusses the challenges of integrating industrial data from different sources due to its large volume, varied formats and complex relationships. It introduces MIx Core, a machine intelligence solution from Bit Stew Systems that can automate data integration through feature extraction, relationship mapping and generating a semantic model to solve problems that overwhelm traditional ETL approaches. The system uses machine learning algorithms to classify data fields and dynamically understand changing relationships without requiring large, costly integration teams.
Quick overview of the TechRiot IoT business acceleration program presented to businesses in Fort Collins.
Copyright and property of Matthew Bailey 2016
Personal data and the blockchain – how will the GDPR influence blockchain app...BigchainDB
Simon Schwerin from BigchainDB talkst about privacy and blockchain:
There are many blockchain applications in the field of identity, IP, finance and energy that are working with personal data. As of May, 28 2018 the new EU GDPR will be implemented, with the aim to strengthen the human rights of individuals, by increasing protection and a feel of ownership of their personal data. It is also supposed to be designed to be technologically neutral and adaptable to processing personal data in different contexts, structures and manners. With regards to blockchain this leaves many questions open, to name a few:
Who will be the data controller in decentralized multi-node systems? – Is there an Accountability Gap? Difference of Private vs. Public set-ups?
Privacy by Design/Default and blockchain core features – Implementation or Clash of Principles? What about the right to be forgotten?
How could a blockchain privacy impact assessment (bPIA) look like to increase the chance of compliance with GDPR next year?
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?3G4G
Presented by David Wood, Principal, Delta Wisdom
In this talk anticipating future scenarios for smart devices, futurist and smartphone industry pioneer David Wood suggests answers to a number of key questions. What are the key trends we should be watching, to see if they'll ever emerge from a slow disappointing phase into a fast and furious phase? How might these trends combine to shake up present-day usage patterns? Will the successors of the smartphone accelerate a Brave New World, and/or make Black Mirror a reality? And what can we learn from past predictions of future smartphone scenarios?
*** Shared with Permission ***
The document discusses the Internet of Things (IoT), which refers to the network of physical objects embedded with electronics, software, and sensors that allows them to connect, collect, and exchange data. It examines how IoT works and its dependence on 2017 studies, outlines the top 5 IoT industries and programming languages as well as operating systems and cloud platforms used. The document also covers IoT development, its future potential, and some of the challenges still facing widespread IoT adoption.
PixelCrayons is one of the leading blockchain development companies focused on building innovative products using blockchain and smart contracts. BlockChains are an open, ledger that can record transactions between two parties efficiently and provide a secure way of making and recording transactions, agreements and contracts or anything that needs to be recorded and verified as having taken place.
Feel free to ask any queries @ bit.ly/2Ezb3uk
Our Social Media Profile:
https://www.facebook.com/PixelCrayons
https://twitter.com/pixelcrayons
https://www.linkedin.com/company/pixelcrayons
Internet of Things With Privacy in MindGosia Fraser
This document discusses privacy considerations for Internet of Things devices. It notes that IoT devices collect personal data that, even when fragmented, can reveal sensitive information when aggregated and analyzed. Many IoT manufacturers do not adequately explain how they collect, use, store, and allow deletion of personal information. The document advocates adopting privacy by design principles to build privacy protections into IoT technologies from the early stages of development through privacy impact assessments and data protection impact assessments. This helps understand privacy needs, shape better policies, and improve transparency while demonstrating adherence to high data protection standards.
Legal Tech Lab: A Roadmap to User-Friendly Law 2.0 by Riikka Koulu, Assistant Professor at Helsinki University and one of the founders of Legal Tech Lab.
This document announces a Big Data Meetup event in London on April 30th 2013 with four presentations: an introduction to eSynergy Solutions by Gavin Badcock, making sense of Big Data by Mrinal Devadas of Hortonworks, getting healthier using Big Data and Google BigQuery by Nick Evans of PA Consulting, and getting beer into and out of Neo4j by Rik van Bruggen of Neo Technology. Interested attendees can join the Big Data Jobs in London Meetup group or view presentations on the community page.
Meeting of the Blockchain Community and discussion about the cryptocurrency b...recheck
How many people actually know a thing or two about the blockchain? Won't you agree that cryptocurrencies are the future and we have to discuss the possibility of a collapse or burst? Whatever you need to know about the blockchain technology and cryptocurrencies are in the presentation.
#ESGJRConsultingInc #Software #Cisco #Network #Engineering #CNSVitalSigns #DNAIDSmartCard
Cisco Certifications
Go to www.esgjrconsultinginc.com to learn more about Software/Network Engineering Projects.
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...Dinis Cruz
This document discusses creating a graph-based security organization. It outlines security's objectives like allowing business operations while managing risk. Security is a driver of change and sits at the center of organizational data. The only effective way to manage and understand this relational data is as a graph. The presenter's organization refactored their risk workflow and JIRA implementation to represent data as a graph stored in a queryable database. They use tools like ELK, Slack bots, and plantUML diagrams to visualize and interact with the security graph. This empower's data-driven security decisions and risk management. The presenter provides examples of risk dashboards and encourages collaboration to further develop these graph-based approaches.
Want to be part of the Internet of Things revolution then this session is for you, Microsoft Azure as a platform delivers the capabilities to enable your IoT solution from building blocks through to finished services. In this demonstration rich session you will learn about Microsoft’s position on IoT, and the technology and services being delivered from Microsoft to help you develop, connect, manage and unlock data insights
This document discusses implementing IOTA solutions on embedded devices for Internet of Underwater Things (IoUT) systems. It presents the IOTA Tangle and Masked Authenticated Messaging (MAM) as supporting technologies. It then describes the methodology of performing a feasibility study, reverse engineering the workflow, and implementing a pure C version to integrate with embedded environments. Test results show execution times for fetching data and code size. The document concludes the proposed solution enables IoUT and outlines future work including optimization and additional IOTA features.
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeKishor Datta Gupta
Internet of Things (IoT) security and privacy remain
a major challenge, mainly due to the massive scale and
distributed nature of IoT networks. Blockchain-based approaches
provide decentralized security and privacy, yet they involve
significant energy, delay, and computational overhead that is
not suitable for most resource-constrained IoT devices. In our
previous work, we presented a lightweight instantiation of a
BC particularly geared for use in IoT by eliminating the Proof
of Work (POW) and the concept of coins. Our approach was
exemplified in a smart home setting and consists of three main
tiers namely: cloud storage, overlay, and smart home. In this
paper we delve deeper and outline the various core components
and functions of the smart home tier. Each smart home is
equipped with an always online, high resource device, known
as ”miner” that is responsible for handling all communication
within and external to the home. The miner also preserves
a private and secure BC, used for controlling and auditing
communications. We show that our proposed BC-based smart
home framework is secure by thoroughly analysing its security
with respect to the fundamental security goals of confidentiality,
integrity, and availability. Finally, we present simulation results
to highlight that the overheads (in terms of traffic, processing
time and energy consumption) introduced by our approach are
insignificant relative to its security and privacy gains.
Nederland behoort tot de absolute wereldtop binnen de tuinbouw. We produceren samen meer en betere groente, fruit en bloemen dan buitenlandse collega’s. Terwijl we daarvoor minder water, energie en ruimte gebruiken. Het slim sturen van het klimaat binnen de kas is hiervoor essentieel.
Het cloud-platform letsgrow.com (onderdeel van IoT Academy-partner Batenburg Techniek) haalt al meer dan 15 jaar informatie uit teelt- en meteo-data. Door gebruik te maken van de ontwikkelde modellen, telen tuinders nu al slimmer. En doordat het aantal sensoren in en rond de kas stijgt van 10-tallen naar 100-tallen, wordt het in de toekomst nóg slimmer!
Things (sensors, actuators) that connect to the
Internet either directly or via gateways. They use IoT networking
protocols like Bluetooth Low Energy, ZigBee, LoRaWAN, etc.
»
Gateway: A device that connects multiple things to the Internet
using IoT networking protocols and acts as a bridge to the
Internet.
»
IoT platform: A cloud-based service that manages connectivity,
data storage, and processing for IoT applications. It exposes
APIs for applications to access data and control things.
»
Application: Software that interacts with the IoT platform to
access data, control things, and provide value to end users.
When it comes to the Internet of Things, a blockchain can be provide a platform to handle device authentication process and thereby prevent a spoofing attack by malicious parties who may impersonate some other device to launch an attack to steal data or cause some other mayhem.Blockchain will allowdirect communication between two or more devices so that they are able to transact without going through a third-party intermediary, and in effect make spoofing more cost prohibitive. This White Paper explains how blockchain can improve the security of IOT devices.
The document discusses accelerating the adoption of the Internet of Things (IoT). It defines IoT as networks of sensors and devices connected to objects that provide data which can be analyzed and used to initiate automated actions. The document notes that McKinsey estimates the potential economic impact of IoT in 2025 to be $3.9-$11.1 trillion and that the number of connected devices is projected to grow from 22.9 billion in 2016 to 50.1 billion by 2020. Finally, the document discusses key drivers, challenges and opportunities of IoT for businesses and technology as well as examples of connected homes, cities, and enterprises.
3-part approach to turning IoT data into business powerAbhishek Sood
There will be 44 zettabytes of data produced by IoT alone by 2020, according to IDC. That’s a little more than the cumulative size of 44 trillion feature films.
Data from IoT devices will soon be table stakes in your industry, if it isn’t already. Turning that data into quick and actionable insights is the race for all businesses who are investing in IoT devices.
Learn about a 3-pronged approach that can turn your IoT data into business actions:
Business-wide analytics revolution
Connected relationships with customers
Intelligent innovation based on data
Quick overview of the TechRiot IoT business acceleration program presented to businesses in Fort Collins.
Copyright and property of Matthew Bailey 2016
Personal data and the blockchain – how will the GDPR influence blockchain app...BigchainDB
Simon Schwerin from BigchainDB talkst about privacy and blockchain:
There are many blockchain applications in the field of identity, IP, finance and energy that are working with personal data. As of May, 28 2018 the new EU GDPR will be implemented, with the aim to strengthen the human rights of individuals, by increasing protection and a feel of ownership of their personal data. It is also supposed to be designed to be technologically neutral and adaptable to processing personal data in different contexts, structures and manners. With regards to blockchain this leaves many questions open, to name a few:
Who will be the data controller in decentralized multi-node systems? – Is there an Accountability Gap? Difference of Private vs. Public set-ups?
Privacy by Design/Default and blockchain core features – Implementation or Clash of Principles? What about the right to be forgotten?
How could a blockchain privacy impact assessment (bPIA) look like to increase the chance of compliance with GDPR next year?
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?3G4G
Presented by David Wood, Principal, Delta Wisdom
In this talk anticipating future scenarios for smart devices, futurist and smartphone industry pioneer David Wood suggests answers to a number of key questions. What are the key trends we should be watching, to see if they'll ever emerge from a slow disappointing phase into a fast and furious phase? How might these trends combine to shake up present-day usage patterns? Will the successors of the smartphone accelerate a Brave New World, and/or make Black Mirror a reality? And what can we learn from past predictions of future smartphone scenarios?
*** Shared with Permission ***
The document discusses the Internet of Things (IoT), which refers to the network of physical objects embedded with electronics, software, and sensors that allows them to connect, collect, and exchange data. It examines how IoT works and its dependence on 2017 studies, outlines the top 5 IoT industries and programming languages as well as operating systems and cloud platforms used. The document also covers IoT development, its future potential, and some of the challenges still facing widespread IoT adoption.
PixelCrayons is one of the leading blockchain development companies focused on building innovative products using blockchain and smart contracts. BlockChains are an open, ledger that can record transactions between two parties efficiently and provide a secure way of making and recording transactions, agreements and contracts or anything that needs to be recorded and verified as having taken place.
Feel free to ask any queries @ bit.ly/2Ezb3uk
Our Social Media Profile:
https://www.facebook.com/PixelCrayons
https://twitter.com/pixelcrayons
https://www.linkedin.com/company/pixelcrayons
Internet of Things With Privacy in MindGosia Fraser
This document discusses privacy considerations for Internet of Things devices. It notes that IoT devices collect personal data that, even when fragmented, can reveal sensitive information when aggregated and analyzed. Many IoT manufacturers do not adequately explain how they collect, use, store, and allow deletion of personal information. The document advocates adopting privacy by design principles to build privacy protections into IoT technologies from the early stages of development through privacy impact assessments and data protection impact assessments. This helps understand privacy needs, shape better policies, and improve transparency while demonstrating adherence to high data protection standards.
Legal Tech Lab: A Roadmap to User-Friendly Law 2.0 by Riikka Koulu, Assistant Professor at Helsinki University and one of the founders of Legal Tech Lab.
This document announces a Big Data Meetup event in London on April 30th 2013 with four presentations: an introduction to eSynergy Solutions by Gavin Badcock, making sense of Big Data by Mrinal Devadas of Hortonworks, getting healthier using Big Data and Google BigQuery by Nick Evans of PA Consulting, and getting beer into and out of Neo4j by Rik van Bruggen of Neo Technology. Interested attendees can join the Big Data Jobs in London Meetup group or view presentations on the community page.
Meeting of the Blockchain Community and discussion about the cryptocurrency b...recheck
How many people actually know a thing or two about the blockchain? Won't you agree that cryptocurrencies are the future and we have to discuss the possibility of a collapse or burst? Whatever you need to know about the blockchain technology and cryptocurrencies are in the presentation.
#ESGJRConsultingInc #Software #Cisco #Network #Engineering #CNSVitalSigns #DNAIDSmartCard
Cisco Certifications
Go to www.esgjrconsultinginc.com to learn more about Software/Network Engineering Projects.
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...Dinis Cruz
This document discusses creating a graph-based security organization. It outlines security's objectives like allowing business operations while managing risk. Security is a driver of change and sits at the center of organizational data. The only effective way to manage and understand this relational data is as a graph. The presenter's organization refactored their risk workflow and JIRA implementation to represent data as a graph stored in a queryable database. They use tools like ELK, Slack bots, and plantUML diagrams to visualize and interact with the security graph. This empower's data-driven security decisions and risk management. The presenter provides examples of risk dashboards and encourages collaboration to further develop these graph-based approaches.
Want to be part of the Internet of Things revolution then this session is for you, Microsoft Azure as a platform delivers the capabilities to enable your IoT solution from building blocks through to finished services. In this demonstration rich session you will learn about Microsoft’s position on IoT, and the technology and services being delivered from Microsoft to help you develop, connect, manage and unlock data insights
This document discusses implementing IOTA solutions on embedded devices for Internet of Underwater Things (IoUT) systems. It presents the IOTA Tangle and Masked Authenticated Messaging (MAM) as supporting technologies. It then describes the methodology of performing a feasibility study, reverse engineering the workflow, and implementing a pure C version to integrate with embedded environments. Test results show execution times for fetching data and code size. The document concludes the proposed solution enables IoUT and outlines future work including optimization and additional IOTA features.
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeKishor Datta Gupta
Internet of Things (IoT) security and privacy remain
a major challenge, mainly due to the massive scale and
distributed nature of IoT networks. Blockchain-based approaches
provide decentralized security and privacy, yet they involve
significant energy, delay, and computational overhead that is
not suitable for most resource-constrained IoT devices. In our
previous work, we presented a lightweight instantiation of a
BC particularly geared for use in IoT by eliminating the Proof
of Work (POW) and the concept of coins. Our approach was
exemplified in a smart home setting and consists of three main
tiers namely: cloud storage, overlay, and smart home. In this
paper we delve deeper and outline the various core components
and functions of the smart home tier. Each smart home is
equipped with an always online, high resource device, known
as ”miner” that is responsible for handling all communication
within and external to the home. The miner also preserves
a private and secure BC, used for controlling and auditing
communications. We show that our proposed BC-based smart
home framework is secure by thoroughly analysing its security
with respect to the fundamental security goals of confidentiality,
integrity, and availability. Finally, we present simulation results
to highlight that the overheads (in terms of traffic, processing
time and energy consumption) introduced by our approach are
insignificant relative to its security and privacy gains.
Nederland behoort tot de absolute wereldtop binnen de tuinbouw. We produceren samen meer en betere groente, fruit en bloemen dan buitenlandse collega’s. Terwijl we daarvoor minder water, energie en ruimte gebruiken. Het slim sturen van het klimaat binnen de kas is hiervoor essentieel.
Het cloud-platform letsgrow.com (onderdeel van IoT Academy-partner Batenburg Techniek) haalt al meer dan 15 jaar informatie uit teelt- en meteo-data. Door gebruik te maken van de ontwikkelde modellen, telen tuinders nu al slimmer. En doordat het aantal sensoren in en rond de kas stijgt van 10-tallen naar 100-tallen, wordt het in de toekomst nóg slimmer!
Things (sensors, actuators) that connect to the
Internet either directly or via gateways. They use IoT networking
protocols like Bluetooth Low Energy, ZigBee, LoRaWAN, etc.
»
Gateway: A device that connects multiple things to the Internet
using IoT networking protocols and acts as a bridge to the
Internet.
»
IoT platform: A cloud-based service that manages connectivity,
data storage, and processing for IoT applications. It exposes
APIs for applications to access data and control things.
»
Application: Software that interacts with the IoT platform to
access data, control things, and provide value to end users.
When it comes to the Internet of Things, a blockchain can be provide a platform to handle device authentication process and thereby prevent a spoofing attack by malicious parties who may impersonate some other device to launch an attack to steal data or cause some other mayhem.Blockchain will allowdirect communication between two or more devices so that they are able to transact without going through a third-party intermediary, and in effect make spoofing more cost prohibitive. This White Paper explains how blockchain can improve the security of IOT devices.
The document discusses accelerating the adoption of the Internet of Things (IoT). It defines IoT as networks of sensors and devices connected to objects that provide data which can be analyzed and used to initiate automated actions. The document notes that McKinsey estimates the potential economic impact of IoT in 2025 to be $3.9-$11.1 trillion and that the number of connected devices is projected to grow from 22.9 billion in 2016 to 50.1 billion by 2020. Finally, the document discusses key drivers, challenges and opportunities of IoT for businesses and technology as well as examples of connected homes, cities, and enterprises.
3-part approach to turning IoT data into business powerAbhishek Sood
There will be 44 zettabytes of data produced by IoT alone by 2020, according to IDC. That’s a little more than the cumulative size of 44 trillion feature films.
Data from IoT devices will soon be table stakes in your industry, if it isn’t already. Turning that data into quick and actionable insights is the race for all businesses who are investing in IoT devices.
Learn about a 3-pronged approach that can turn your IoT data into business actions:
Business-wide analytics revolution
Connected relationships with customers
Intelligent innovation based on data
DWS16 - Connected things forum - Luc Julia, Samsung ElectronicsIDATE DigiWorld
The document discusses issues with data silos in IoT and proposes an open data exchange platform called ARTIK Cloud to address these issues. ARTIK Cloud aims to collect data from any device or cloud, store it securely while belonging to the user, and provide tools and machine learning to enable new applications and services by facilitating connections between data instead of isolating it into silos. This approach realizes the vision of an "Intelligence of Things" by allowing devices to collaborate and leverage collective intelligence through shared access to centralized data on ARTIK Cloud.
Smart, connected products are everyday products like televisions, tractors, and baby monitors that are connected to the Internet by their manufacturers. This allows the manufacturers to continually optimize the products through software updates and analysis of sensor data. The products can evolve over time and offer new features through the cloud. This changes the relationship between manufacturers and consumers to an ongoing, dynamic interaction.
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...IRJET Journal
This document proposes a new approach called the Future IoT Controller (FITC) that utilizes edge computing to provide distributed intelligence and low-latency insights for IoT applications. The FITC would be located at the network edge between IoT devices and the cloud to offer local intelligence through techniques like reinforcement learning. This would help reduce issues with cloud-based solutions like high latency, network loads, and inability to handle uncertain situations. The approach was tested in a simulated smart home environment and showed the feasibility of the FITC in providing faster responses, reducing rule complexity, and enabling predictions through learning from experiences at the edge.
Presentation to startup groups at Finders New Venture Institute (NVI) Smart City/Venture Dorm Summer Accelerator 2017 (http://www.nviflinders.com.au/what-we-provide/smartcityventuredorm/). Overview of technologies to keep an eye out for.
Blockchain in IoT and Other Considerations by Dinis GuardaDinis Guarda
Blockchain in IOT And other considerations:
IoT, Business Strategy, Tech, Security and Blockchain as a foundation tech
How to manage IoT / Blockchain for business strategy, technical set up, security, plus blockchain
The natural tech evolution marriage that has yet to properly consummate?
Why IOT products may not live up to their promise and how to overcome these to build successful IoT / Blockchain products.
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...AlAtfat
Introducing IBchain, a new blockchain architecture with the Internet of Things (IoT), could be an
attractive framework regarding improvements in connectivity implementation through the smart cities.
Instead of meriting innovation and security, the IoT links people, sites, and products and provides
opportunities. Everything that transfers information to the IoT system is integrated by advanced
microchips, sensors, and actuators in actual things. The analytical ability of the IoT converts observations
into actions, impacting business advancements and significant ways of activity. IoT enables connected
objects to transmit information to personal blockchain systems to create tamper-resistant transaction
records. The information from sensors and microchips is progressing rapidly with blockchain ledgers,
making them more portable and relevant for immediate conversations. In IBchain methodology, the smart
objects are permissible to connect securely with other smart objects in diverse situations. IBchain creates
an innovative blockchain-based processing configuration through the IoT. The IBchain could analyze
blockchain to the main expertise or supports the IoT validation and trustworthiness. It reinforces
blockchain and cloud to build an empowering IoT ubiquitous situation for secure communication among
the smart devices.
The Internet of Things (IoT) is used to improve traditional healthcare systems in different aspects, including monitoring patients’ behaviors. Information gathered by sensors in the IoT plays an essential role in healthcare systems. Because of privacy and security issues, the data must be protected against unauthorized changes. On the other hand, Blockchain technology provides a wide range of mechanisms to protect data against changes. Therefore, IoT-based healthcare monitoring using Blockchain constitutes an exciting technological innovation, which may help mitigate security and privacy concerns related to the gathering of information during patient monitoring. In this chapter, the potential applications of IoT–Blockchain systems are studied, and then monitoring mechanisms in healthcare systems are analyzed. To this end, a novel architecture based on recently reported solutions is proposed. The proposed architecture, with the aid of computational power obtained from the IoT, Blockchain and artificial intelligence, can be used in a wide range of solutions aimed at managing the coronavirus disease 2019 (COVID-19). In order to show the potential of the proposed architecture, three case studies namely path recommendation for pandemic situations, health insurance recommendation, and fighting COVID-19 pandemic algorithm have been suggested. The proposed algorithms will facilitate verification of COVID-19 antibody testing, vaccines, and then will issue a valid certificate for them. These certificates will be registered in the Blockchain in a transparent and immutable manner. A panel on the dashboard is dedicated to showing the certificates. The blockchain-based functionalities of the proposed architecture will be useful for equitable COVID-19 vaccine distribution. At the end of this chapter, other applications of the proposed architecture are summarized, which can be used in pandemic situations.
The document discusses the Internet of Things (IoT). It defines IoT as the network of physical objects embedded with sensors and software that allows them to connect and exchange data with other devices and systems via the internet. It describes the key components of IoT as sensors, connectivity, and people/processes. It outlines several applications of IoT such as improving efficiency and asset utilization. However, it also notes challenges like scalability, security, and lack of standards. Solutions proposed include improving interoperability, setting regulations, and strengthening authentication and encryption.
The Internet Of Things will have an increasing impact to all industries and health and fitness are no exception. This definitive guide provides a blue print for the things we all need to keep in mind as we adopt the IOT revolution.
Revue de presse IoT / Data du 04/02/2017Romain Bochet
Bonjour,
Voici la revue de presse IoT/data/energie du 4 février 2017.
Sommaire :
1. Le radiateur intelligent Lancey, probable futur « pilier » des smart grids
2. Bosch, Cisco and Foxconn join blockchain and IoT consortium
3. Why artificial intelligence could be key to future-proofing the grid
4. Energy Harvesting Extends The IoT To Billions Of Smart Assets
5. The Distributed Energy Resource Management System Comes of Age
6. Avec Scale Zone, IBM et Sigfox industrialisent les start-ups IoT
Je suis preneur d'autres artices / sources !
Bonne lecture !
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET Journal
This document discusses using blockchain technology to secure data management for supply chain management applications that utilize Internet of Things (IoT). It first provides background on IoT and blockchain individually, explaining how IoT connects devices to share data but also raises security and privacy issues, while blockchain provides a distributed ledger to securely record transactions without a central authority. The document then reviews related work applying blockchain to areas like crowdsensing and supply chains. It proposes that blockchain could help address some security issues in IoT by providing secure identity management, product traceability, automated smart contracts, and time-stamped records for supply chain applications. However, challenges remain to implement these solutions in practice.
In this presentation, Abhijeet introduces IoT and associated trends. Abhijeet's interest area lies in is to study and refine common protocols and standards that will allow such a diverse collection of smart things to communicate and share information.
The document discusses the future of the Internet of Things (IoT). It defines IoT and describes how IoT devices work and are developed. The document outlines different IoT models in areas like medicine, robotics, smart cities, industry, and automobiles. It discusses the advantages of IoT in improving life efficiency but also the challenges of privacy, security, and potential unemployment. Finally, it explores the large scope and investment in IoT, suggesting it will continue to grow and impact lives.
The interconnections of things such as gadgets, electronic devices, smart appliances, machines etc. with the help of embedded software’s, actuators, and network via the Internet forming a holistic grid is called as the internet of things or IoT. IoT enables these devices to communicate, share data & information amongst each other.
Similar to IoT et blockchain : perspective R&D (20)
La transformation des métiers par l'Usine du Futur - Thomas Leseigneur, ActemiumLiving Things
This document discusses how jobs are being transformed by the factory of the future. It provides information about VINCI Energies, a global company with €10.8 billion in revenue in 2017, operating in 53 countries through 1,600 business units and employing 69,400 people. It also discusses Actemium, a subsidiary of VINCI Energies that provides industrial solutions and services through 371 business units across 40 countries on 5 continents, generating €2.4 billion in turnover. The document outlines how IT and OT convergence, new technologies, and data analytics are impacting both customers and the solutions Actemium provides around areas like process automation, robotics, and additive manufacturing.
Blockchain et IoT - introduction (X. Lavayssière, ECAN)Living Things
This document discusses the history and challenges of blockchains and their use with IoT. It covers the evolution of technologies pre-bitcoin like TCP, RSA, and hashcash that led to bitcoin being introduced in 2009. It then explains how public/private keys and transactions work with blockchains. Some challenges with blockchains and IoT are also summarized like interface/UX, certification of data, security, privacy, and governance of infrastructure. The document concludes with a brief mention of initial coin offerings.
Regard prospectif sur la R&D en IA avec Bertrand BraunschweigLiving Things
Présentation par Bertrand Brauschweig, directeur du Centre Inria-Saclay Île-de-France ; Living Things du 18/10/2017 en parallèle des Rencontres Inria Industrie
Challenges business et technologiques pour le véhicule autonome et la Mobilit...Living Things
Présentation par Paul Labrogère, Directeur Programme « Transport Autonome » @IRT SystemX ; Living Things du 18/10/2017 en parallèle des Rencontres Inria Industrie
« Le panneau photovoltaïque est un objet connecté », ReuniwattLiving Things
« Le panneau photovoltaïque est un objet connecté »
Intervention de Marion Lafuma, Business Developper chez Reuniwatt dans le cadre du Living Things "Intelligence artificielle dans les systèmes IoT : quelles innovation spour l'environnement?", le 15 mars 2017
« Les réseaux de neurones peuvent faire l’apprentissage de modèles grâce à un...Living Things
« Les réseaux de neurones peuvent faire l’apprentissage de modèles grâce à une succession de fonctions linéaires et non-linéaires »
Intervention de Jean-Charles Vialatte, doctorant Cityzen Data / IMT Bretagne dans le cadre du Living Things "Intelligence artificielle dans les systèmes IoT : quelles innovations pour l'environnement?", le 15 mars 2017
« Le machine learning permet de traiter les corrélations alors que les graph...Living Things
« Le machine learning permet de traiter les corrélations alors que les graphes apportent des liens de causalité dans les modèles »
Intervention d'Arnaud de MOISSAC, CEO de DC Brain et du Professeur Dominique BARTH, Directeur du laboratoire DAVID de l'UVSQ dans le cadre du Living Things "L'intelligence artificielle dans les systèmes IoT, quelles innovations pour l'environnement?", le 15 mars 2017
Table-ronde Business : "Vêtements connectés : va-t-on passer du concept au ma...Living Things
Table-ronde avec Florence Bost (Sable Chaud), Yann Rivoallan (The Other Store), Lucas Delattre (IFM)
dans le cadre de l'événement Living Things à Futur en Seine 2016
Focus R&D Vêtements connectés : Vitruvian ProjectLiving Things
Intervention de Clémentine Chambon et Françoise Mamert de Design Percept : "Cas de la veste photovoltaïque" dans le cadre de l'événement Living Things du 9 juin à Futur en Seine "Vêtements connectés : de l'industrie textile à la filière IoT"
Evénement du 9 juin à Futur en Seine "Etat des lieuxdu secteur des vêtements connectés, panorama de la filière française" par Stanislas Vandier, R3iLab
Antoine Fenoglio, co-fondateur de l'agence Sismo design présente ce que peut apporter l'application du Design Thinking à la conception des objets connectés
Présentation du mardi 8 mars 2016 "Design Thinking et objets connectés : un événement du think-tank Living Things, en partenariat avec le Lieu du Design
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
1. 1
An R&D Perspective
Traçabilité, sécurité, collaboration : ce que peut la blockchain pour l'IoT
Sara Tucci, Ph.D.
Head of Lab for Trustworthy,
Smart and Self-Organising
Information Systems
CEA LIST
Tuesday 10 July 2018
4. 4
Two sides of the same coin?
VIEWPOINT #1
incorporating
IoT
in blockchains
applications
VIEWPOINT #2
incorporating
blockchains
in IoT
applications
5. 5
WHEN YOU THINK “SYSTEM” CHALLENGES YOU FIND “VERY
COMMON” ONES
YOU SAY «I use the blockchain
to scale up to million of devices »
BUT is the blockchain SCALABLE?
YOU SAY «I use the blockchain
to prevent DDOS attacks,
malaware injection, IP forgery »
BUT are you sure this prevents to get false
information ? Or no information ?
YOU SAY «I use the blockchain
to securely trace transactions
among IoT devices »
BUT is the IoT device a blockchain node?
Resource constraints prevent to use even
classical asymmetric cryptography…
At the end you discover that you moved bottlenecks in the
blockchain…
6. 6
THE TRIANGLE “CONJECTURE” [Slepak and Petrova. The DCS Theorem, 2018]
Autonomy Resilience/Security
Scale
Capacity of deciding
autonomously on the next
state
The system continues to
perform its behaviour even if
any single node is
removed/changes behaviour
Ability to maintain
performances while workload
increase by adding resources
Pick two
out of
three
7. 7
R&D : SEEKING THE BEST TRADE-OFF, EXAMPLES…
A R
S
• Committee Consensus
• Tendermint [Buchman2015-18],
• RedBelly [Crain2017],
• Ouroboros [Kiayias2017],
• Algorand [Gilad2017]
• Sharding
• Omniledger [Kokoris2018]
• Ethereum Sharding
A R
S
+
A R
S
2-layer blockchain
• Lightning[Poon2017]
• Channel factories
[Decker2017]
8. 8
R&D : SEEKING THE BEST TRADE-OFF, MORE EXAMPLES
A R
S
A R
S
+
A R
S
And other emerging approaches for federated
blockchains
• Cosmos [Kwon2017]
• Plasma [Poon2017]
• Polkadot [Wood2016]
• Interledger [Thomas2015]
9. 9
But still R&D…not operational
so what to do in the meanwhile to build
IoT&blockchain applications?
10. 10
THERE IS NO MAGIC: YOU NEED SYSTEM THINKING TO PUT TOGETHER
ALL THE PIECES
ORGANIZE YOUR ARCHITECTURE
A. Dorri et al. « Towards an Optimized BlockChain for IoT » IoTDI 2017, April 2017, Pittsburgh, PA USA
Transactions are generated by
users and devices to request or
share data
11. 11
THERE IS NO MAGIC: YOU NEED SYSTEM THINKING TO PUT TOGETHER
ALL THE PIECES
QUALIFY AND AUDIT YOUR DATA
O. Gurcan et al. «An Industrial Prototype of Trusted Energy Performance Contracts Using BlockChain Technologies » IEEE Smart City 2018,, UK
Energy performance
contracts
12. 12
THERE IS NO MAGIC: YOU NEED SYSTEM THINKING TO PUT TOGETHER
ALL THE PIECES
FIND THE ACCEPTABLE TRADE OFF
O. Gurcan et al. «An Industrial Prototype of Trusted Energy Performance Contracts Using BlockChain Technologies » IEEE Smart City 2018, UK
13. 13
Takeaways
• IoT and blockchain are the two sides of a same ”system problem”
• Single technologies do not provide a universal solution
• System thinking is necessary
• R&D is needed and the following axes are now well-understood
• Federation of heterogenous blockchains
• Off-chain transactions
• Interoperability
• Interdisciplinarity: economical design of distributed protocols
• Clever engineering is still needed to come up with “good enough” systems