SlideShare a Scribd company logo
1 Bit Stew Systems Inc. Confidential and Proprietary
Solving Industrial Data Integration with
Machine Intelligence
By: Mike Varney
Executive Director, Product Management & Strategic Initiatives at Bit Stew
2 Bit Stew Systems Inc. Confidential and Proprietary
The Problem with Big Data
With 50 billion devices connected to the
Internet by 2020 rapid data proliferation will
continue to choke the progress of data
analytics projects.
Analytics is only the tip of the iceberg. Data
integration, data quality, and challenges in
extracting value lurk beneath the surface
and are amplified by the growth of
Industrial data from IIoT.
Analytics are the tip
of the iceberg
Data cleansing
and quality
challenges lurk
beneath the
surface
3 Bit Stew Systems Inc. Confidential and Proprietary
Two Different Worlds, One Common Problem
Operational Technology
(OT)
Information Technology
(IT)
Industrial IoT
• Asset Performance
• Real-Time Status Monitoring
• Diagnostics & Service
• Predictive Maintenance
• Software Updates
• Data Integration
• Data Cleansing
• Systems Management
• Analytics
• Value-Added Services
0101010
010101
01
01
4 Bit Stew Systems Inc. Confidential and Proprietary
Hidden Cost of Integration
• Industrial data is not easy
• Complex data, variable size, frequency, and format
• Disparate sources
• No view of data relationships across the enterprise
• Often rely on traditional ETL or BI tools
• Large integration teams costing thousands of dollars
5 Bit Stew Systems Inc. Confidential and Proprietary
Complex Environments Lead to Complex Data
Why is Industrial Data so complicated?
Variety of source types Messy Data Complex Data
Relations
Different Sizes Massive Volume Varied Frequency
6 Bit Stew Systems Inc. Confidential and Proprietary
Traditional ETL Compounds the Problem
This model does not work for large
volumes of complex OT and IT data
Extracts source data
without contextual
understanding
Then a team of
integrators, architects,
and data scientists apply
transformations
After which, finally
it can be provided
to business and
operational teams
7 Bit Stew Systems Inc. Confidential and Proprietary
Why MIx Core?
Small teams can solve BIG industrial problems with MIx Core™
• No longer need large and costly integration teams
• IoT endpoints are being added at an accelerated pace that is
unmanageable by human computing
• Machine Intelligence solves the compounding data problem
in Industrial environments
8 Bit Stew Systems Inc. Confidential and Proprietary
Using Machine Intelligence to Automate Data Integration
• Comprehensive Semantic Model
• Automatic sensing of data and mapping to Semantic Model
• Dynamic and adaptive to source data
• Examine, transform and clean data
Machine
Intelligence
Create Semantic Model
Siloed Data Sources
Intelligent Integration to
Target Model
• Integrate with APIs, services, files, streams and
network traffic
• Embedded guaranteed messaging
• Interactive UI for viewing and editing
9 Bit Stew Systems Inc. Confidential and Proprietary
Step 1: Create Feature Vector
– Source data is read and sent to the Hierarchical Feature
Extractor
– The Hierarchical Feature Extractor produces Feature Vectors
– The Hierarchical Feature Extractor can be customized for
domain specific feature extraction and machine learning.
– Feature vectors are used to fingerprint and classify the input
data.
Step 2: Store denormalized data into the Data Index
– The Feature Vectors are stored into the Data Index
– Data is denormalized and fed into the Relationship Association
– A Relationship Matrix is created and stored into the Data Index
How it Works?
10 Bit Stew Systems Inc. Confidential and Proprietary
How it Works?
Step 3: Create Semantic Model
– The Feature Vectors are sent to the Field Classifier
– The Field Classifier uses supervised and unsupervised machine
learning algorithms to relate and map data
– Each algorithm gets a vote to determine the best model
– The related and mapped data is sent to the Modeler to create a
Semantic Model
Step 4: Publish the Semantic Model to Target Systems
– Model is published and available for use in the platform
– The semantic model may be exported to 3rd party systems for
further analysis
– Changes to published model are tracked over time for the system
to learn how relationships in the data change over time
11 Bit Stew Systems Inc. Confidential and Proprietary
Learn more about Bit Stew
Visit www.info.bitstew.com
Follow us on
Download the whitepaper: http://info.bitstew.com/whitepaper-mike-machine-intelligence
12 Bit Stew Systems Inc. Confidential and Proprietary
Mike Varney spent over 20 years in the US Navy, where his experience
included commanding the most advanced nuclear-powered submarines
in complex operations around the globe, leading a special operations
team in reconstruction efforts in Afghanistan, and directing a Naval
Operations Centre. He has also served as a Strategic Advisor for the US
Department of Defense, a Senior Evaluation Officer at nuclear power
plants, and an advisor to companies providing smart grid technologies to
the energy industry.
Mike holds Bachelor of Science degrees in Nuclear and Marine
Engineering as well as Master of Science degrees in Engineering
Management and National Security Strategy. Today, Mike is the Executive
Director, Product Management & Strategic Initiatives, where he leads the
strategy for Bit Stew Systems MIx Core platform, MIx Developer Network
and Bit Stew University.
About the Author

More Related Content

What's hot

EthCon Korea 28 May 2019
EthCon Korea 28 May 2019EthCon Korea 28 May 2019
EthCon Korea 28 May 2019iExec
 
Integris software ppt
Integris software pptIntegris software ppt
Integris software pptintegrisus
 
The iEx.ec Distributed Cloud: Latest Developments and Perspectives
The iEx.ec Distributed Cloud: Latest Developments and PerspectivesThe iEx.ec Distributed Cloud: Latest Developments and Perspectives
The iEx.ec Distributed Cloud: Latest Developments and PerspectivesGilles Fedak
 
Cisco data analytics in ioe_rajiv niles_2015 nov
Cisco data analytics in ioe_rajiv niles_2015 novCisco data analytics in ioe_rajiv niles_2015 nov
Cisco data analytics in ioe_rajiv niles_2015 novCiscoKorea
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurSri Ambati
 
Iot & security automation-by Er. Nashet Ali
Iot &  security  automation-by  Er. Nashet  AliIot &  security  automation-by  Er. Nashet  Ali
Iot & security automation-by Er. Nashet AliNashet Ali
 
Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
 
The truth about IoT field gateways (Sam Vanhoutte @IoT Convention Europe 2017)
The truth about IoT field gateways (Sam Vanhoutte @IoT Convention Europe 2017) The truth about IoT field gateways (Sam Vanhoutte @IoT Convention Europe 2017)
The truth about IoT field gateways (Sam Vanhoutte @IoT Convention Europe 2017) Codit
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
 
Introduction to IOT in Google Cloud | Yogesh Ojha
Introduction to IOT in Google Cloud | Yogesh OjhaIntroduction to IOT in Google Cloud | Yogesh Ojha
Introduction to IOT in Google Cloud | Yogesh OjhaYogesh Ojha
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use casesAbhishek Sood
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloudUlf Mattsson
 
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...Kenneth Moore
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths Vish Nandlall
 

What's hot (20)

EthCon Korea 28 May 2019
EthCon Korea 28 May 2019EthCon Korea 28 May 2019
EthCon Korea 28 May 2019
 
Integris software ppt
Integris software pptIntegris software ppt
Integris software ppt
 
The iEx.ec Distributed Cloud: Latest Developments and Perspectives
The iEx.ec Distributed Cloud: Latest Developments and PerspectivesThe iEx.ec Distributed Cloud: Latest Developments and Perspectives
The iEx.ec Distributed Cloud: Latest Developments and Perspectives
 
Cisco data analytics in ioe_rajiv niles_2015 nov
Cisco data analytics in ioe_rajiv niles_2015 novCisco data analytics in ioe_rajiv niles_2015 nov
Cisco data analytics in ioe_rajiv niles_2015 nov
 
Why Cisco- for-Intelligence
Why Cisco- for-IntelligenceWhy Cisco- for-Intelligence
Why Cisco- for-Intelligence
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoT
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith Barthur
 
Adopting Emerging Technologies
Adopting Emerging TechnologiesAdopting Emerging Technologies
Adopting Emerging Technologies
 
Iot & security automation-by Er. Nashet Ali
Iot &  security  automation-by  Er. Nashet  AliIot &  security  automation-by  Er. Nashet  Ali
Iot & security automation-by Er. Nashet Ali
 
Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
The truth about IoT field gateways (Sam Vanhoutte @IoT Convention Europe 2017)
The truth about IoT field gateways (Sam Vanhoutte @IoT Convention Europe 2017) The truth about IoT field gateways (Sam Vanhoutte @IoT Convention Europe 2017)
The truth about IoT field gateways (Sam Vanhoutte @IoT Convention Europe 2017)
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
Introduction to IOT in Google Cloud | Yogesh Ojha
Introduction to IOT in Google Cloud | Yogesh OjhaIntroduction to IOT in Google Cloud | Yogesh Ojha
Introduction to IOT in Google Cloud | Yogesh Ojha
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use cases
 
Sect f43
Sect f43Sect f43
Sect f43
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 
Az-Internet of things
Az-Internet of thingsAz-Internet of things
Az-Internet of things
 
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths
 

Similar to Solving Industrial Data Integration with Machine Intelligence

Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...SolarWinds
 
SP Network Automation: Automated Operations Overview
SP Network Automation: Automated Operations Overview SP Network Automation: Automated Operations Overview
SP Network Automation: Automated Operations Overview Cisco Service Provider
 
What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?Precisely
 
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15MLconf
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Sutedjo Tjahjadi
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITPrecisely
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceSolarWinds
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityTapan Biswas
 
IBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationIBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationPaula Koziol
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...Enterprise Management Associates
 
Powering the Internet of Things with Apache Hadoop
Powering the Internet of Things with Apache HadoopPowering the Internet of Things with Apache Hadoop
Powering the Internet of Things with Apache HadoopCloudera, Inc.
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceSolarWinds
 
MongoDB IoT CITY Tour EINDHOVEN: Machina Research
MongoDB IoT CITY Tour EINDHOVEN: Machina ResearchMongoDB IoT CITY Tour EINDHOVEN: Machina Research
MongoDB IoT CITY Tour EINDHOVEN: Machina ResearchMongoDB
 
influence of AI in IS
influence of AI in ISinfluence of AI in IS
influence of AI in ISISACA Riyadh
 
Improving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsImproving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsSolarWinds
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKUlf Mattsson
 

Similar to Solving Industrial Data Integration with Machine Intelligence (20)

Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
 
SP Network Automation: Automated Operations Overview
SP Network Automation: Automated Operations Overview SP Network Automation: Automated Operations Overview
SP Network Automation: Automated Operations Overview
 
What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?
 
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe IT
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
IBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationIBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver Innovation
 
AI in the Enterprise at Scale
AI in the Enterprise at ScaleAI in the Enterprise at Scale
AI in the Enterprise at Scale
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 
Powering the Internet of Things with Apache Hadoop
Powering the Internet of Things with Apache HadoopPowering the Internet of Things with Apache Hadoop
Powering the Internet of Things with Apache Hadoop
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
MongoDB IoT CITY Tour EINDHOVEN: Machina Research
MongoDB IoT CITY Tour EINDHOVEN: Machina ResearchMongoDB IoT CITY Tour EINDHOVEN: Machina Research
MongoDB IoT CITY Tour EINDHOVEN: Machina Research
 
influence of AI in IS
influence of AI in ISinfluence of AI in IS
influence of AI in IS
 
Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?
 
Improving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsImproving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWinds
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 

Recently uploaded

Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...rajkumar669520
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamtakuyayamamoto1800
 
iGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by SkilrockiGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by SkilrockSkilrock Technologies
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke
 
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAGAI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAGAlluxio, Inc.
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfmbmh111980
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Krakówbim.edu.pl
 
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1KnowledgeSeed
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILNatan Silnitsky
 
AI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAlluxio, Inc.
 
GraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisGraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisNeo4j
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownloadvrstrong314
 
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdfA Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdfkalichargn70th171
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?XfilesPro
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfOrtus Solutions, Corp
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...Alluxio, Inc.
 
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...Abortion Clinic
 

Recently uploaded (20)

Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
iGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by SkilrockiGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by Skilrock
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAGAI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Kraków
 
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
AI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in Michelangelo
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
GraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisGraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysis
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdfA Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
 
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
 

Solving Industrial Data Integration with Machine Intelligence

  • 1. 1 Bit Stew Systems Inc. Confidential and Proprietary Solving Industrial Data Integration with Machine Intelligence By: Mike Varney Executive Director, Product Management & Strategic Initiatives at Bit Stew
  • 2. 2 Bit Stew Systems Inc. Confidential and Proprietary The Problem with Big Data With 50 billion devices connected to the Internet by 2020 rapid data proliferation will continue to choke the progress of data analytics projects. Analytics is only the tip of the iceberg. Data integration, data quality, and challenges in extracting value lurk beneath the surface and are amplified by the growth of Industrial data from IIoT. Analytics are the tip of the iceberg Data cleansing and quality challenges lurk beneath the surface
  • 3. 3 Bit Stew Systems Inc. Confidential and Proprietary Two Different Worlds, One Common Problem Operational Technology (OT) Information Technology (IT) Industrial IoT • Asset Performance • Real-Time Status Monitoring • Diagnostics & Service • Predictive Maintenance • Software Updates • Data Integration • Data Cleansing • Systems Management • Analytics • Value-Added Services 0101010 010101 01 01
  • 4. 4 Bit Stew Systems Inc. Confidential and Proprietary Hidden Cost of Integration • Industrial data is not easy • Complex data, variable size, frequency, and format • Disparate sources • No view of data relationships across the enterprise • Often rely on traditional ETL or BI tools • Large integration teams costing thousands of dollars
  • 5. 5 Bit Stew Systems Inc. Confidential and Proprietary Complex Environments Lead to Complex Data Why is Industrial Data so complicated? Variety of source types Messy Data Complex Data Relations Different Sizes Massive Volume Varied Frequency
  • 6. 6 Bit Stew Systems Inc. Confidential and Proprietary Traditional ETL Compounds the Problem This model does not work for large volumes of complex OT and IT data Extracts source data without contextual understanding Then a team of integrators, architects, and data scientists apply transformations After which, finally it can be provided to business and operational teams
  • 7. 7 Bit Stew Systems Inc. Confidential and Proprietary Why MIx Core? Small teams can solve BIG industrial problems with MIx Core™ • No longer need large and costly integration teams • IoT endpoints are being added at an accelerated pace that is unmanageable by human computing • Machine Intelligence solves the compounding data problem in Industrial environments
  • 8. 8 Bit Stew Systems Inc. Confidential and Proprietary Using Machine Intelligence to Automate Data Integration • Comprehensive Semantic Model • Automatic sensing of data and mapping to Semantic Model • Dynamic and adaptive to source data • Examine, transform and clean data Machine Intelligence Create Semantic Model Siloed Data Sources Intelligent Integration to Target Model • Integrate with APIs, services, files, streams and network traffic • Embedded guaranteed messaging • Interactive UI for viewing and editing
  • 9. 9 Bit Stew Systems Inc. Confidential and Proprietary Step 1: Create Feature Vector – Source data is read and sent to the Hierarchical Feature Extractor – The Hierarchical Feature Extractor produces Feature Vectors – The Hierarchical Feature Extractor can be customized for domain specific feature extraction and machine learning. – Feature vectors are used to fingerprint and classify the input data. Step 2: Store denormalized data into the Data Index – The Feature Vectors are stored into the Data Index – Data is denormalized and fed into the Relationship Association – A Relationship Matrix is created and stored into the Data Index How it Works?
  • 10. 10 Bit Stew Systems Inc. Confidential and Proprietary How it Works? Step 3: Create Semantic Model – The Feature Vectors are sent to the Field Classifier – The Field Classifier uses supervised and unsupervised machine learning algorithms to relate and map data – Each algorithm gets a vote to determine the best model – The related and mapped data is sent to the Modeler to create a Semantic Model Step 4: Publish the Semantic Model to Target Systems – Model is published and available for use in the platform – The semantic model may be exported to 3rd party systems for further analysis – Changes to published model are tracked over time for the system to learn how relationships in the data change over time
  • 11. 11 Bit Stew Systems Inc. Confidential and Proprietary Learn more about Bit Stew Visit www.info.bitstew.com Follow us on Download the whitepaper: http://info.bitstew.com/whitepaper-mike-machine-intelligence
  • 12. 12 Bit Stew Systems Inc. Confidential and Proprietary Mike Varney spent over 20 years in the US Navy, where his experience included commanding the most advanced nuclear-powered submarines in complex operations around the globe, leading a special operations team in reconstruction efforts in Afghanistan, and directing a Naval Operations Centre. He has also served as a Strategic Advisor for the US Department of Defense, a Senior Evaluation Officer at nuclear power plants, and an advisor to companies providing smart grid technologies to the energy industry. Mike holds Bachelor of Science degrees in Nuclear and Marine Engineering as well as Master of Science degrees in Engineering Management and National Security Strategy. Today, Mike is the Executive Director, Product Management & Strategic Initiatives, where he leads the strategy for Bit Stew Systems MIx Core platform, MIx Developer Network and Bit Stew University. About the Author