SlideShare a Scribd company logo
Angelo Corsaro, PhD
Chief Technology Officer
Advanced Technology Office


angelo@adlink-labs.tech
Data
The
Edge
Fabric
<
Abstract
Zenoh is rapidly growing Eclipse project that uni
fi
es data in motion,
data at rest and computations. It elegantly blends traditional pub/sub
with geo distributed storage, queries and computations, while
retaining a level of time and space ef
fi
ciency that is well beyond any of
the mainstream stacks. This presentation will provide an introduction to
Eclipse Zenoh along with a crisp explanation of the challenges that
motivated the creation of this project. We will go through a series of
real-world use cases that demonstrate the advantages brought by
Zenoh in enabling and optimising typical edge scenarios and in
simplifying the development of any scale distributed applications.
Speaker Bio
Angelo Corsaro, Ph.D. is Chief Technology Of
fi
cer (CTO) at ADLINK Technology Inc. where he
looks after corporate technology strategy and innovation, leads the Advanced Technology
Of
fi
ce and the Software and Technology Business Unit.


Angelo is a world top expert in edge/fog computing and a well known researcher in the area of
high performance and large scale distributed systems. Angelo has over 100 publications on
referred journals, conferences, workshops, and magazines. Angelo has co-authored over ten
international standards.


Specialties: Fog/Edge Computing, Industrial and Consumer Internet of Things, Innovation and
Innovation Management, Product Strategy, Open Source, High Performance Computing, Large
Scale Mission/Business Critical Distributed Systems, Real-Time Systems, Software Patterns,
Functional Programming Languages
Context
The Data Journey
Store
Distribute
Produce
Compute
…
…
…
…
Moving and Resting
Technologies for dealing with
data in motion and data at rest
have belonged historically to
different families


Publish/Subscribe is today the
leading paradigm for dealing
with with data in motion


Databases (SQL and NoSQL)
are the leading paradigm to
deal with data at rest
Data in Motion
Data at Rest
Pushing and Pulling
Technologies for dealing
with data in motion and
data at rest also distinguish
in another dimension:


Data in motion is Pushed
to interested parties


Data at rest is Pulled when
needed
Push
Data at Rest
Pull
Technological Fragmentation
The technological
fragmentation exist in
several Data
Distribution, Data
Storage and the
integration of the two


Push
Data at Rest
Pull
Decentralisation
The increasing availability of and
storage, compute capabilities on
devices is creating new
opportunities for computing
and storing and data much
closer its production


Existing technologies for data in
motion and data at rest fall short
in supporting this scenario.
More importantly fail to provide a
uni
fi
ed data management.
Example
Robotics
Robotics applications are quickly
evolving to require swarm
coordination, Internet-Scale
management and teleoperation


Robots are increasingly operating in
swarms and over constantly
expanding geographical regions
Computation Offloading
Next generation robotics (and
autonomous driving) applications
need to leverage surrounding
infrastructure to of
fl
oad
computations and facilitate
coordination
Key Differences
• Many


• Moving


• Geo-Distributed


• Collaborative


• Internet Scale


• Open Environment


• Distributed Computing
• One


• Fixed


• Geo-localised


• Stand-Alone


• LAN Scale


• Closed Environment


• Cloud Computing
One More Example
Smart Home Today
Data produced locally is sent to the cloud
where it is processed and stored


The core of the application logic runs on the
cloud.


Most if not all of the interactions with devices
that are close to you are through the cloud


This leads to several problems, including
energy waste, availability in case of
connectivity issues, privacy concerns…
Exploiting Locality
Ideally we would want communication to be local
whenever possible.


Ideally we would want to place computations
closer to data sources


Ideally we would want most of the data to be kept
in our house… But still access it from anywhere — if
I have the rights to do so


Some could be still processed or stored on the
cloud — but that should be a choice not the only
option.
Managing a Residence
Let’s assume for a moment that we want to exploit data and computation
locality at each house, yet we would like to easily monitor or query any
kind of data — for which we have the rights. How can I do that?
Traditional Approach #1
Replicate all data on the cloud
and use that as the location to
access information on the
houses


The drawbacks of this solution
is that all data is duplicated,
energy is wasted to send data
across the cloud, and privacy is
again at risk …
Traditional Approach #2
Data is kept on the house and
when needing to access it the
house of interest is addressed


The drawbacks of this solution
is there is no location
transparency. What if I want to
keep some of the data on an
edge server? Or even the
cloud?
…
Wouldn’t be nice if…
We could keep data where it
makes sense an retrieve it when
needed in a location transparent
manner — just naming the data


Wouldn’t it be nice if we could
provision application logic
wherever it made sense on this
computing fabric?
Status Quo
Technological Gap
The ecosystem of technologies available
today for data plane are unable to cover
the needs of these large scale
distributed systems because either
cannot work at the proper scale, e.g.
DDS, or are inherently depending on
broker technologies, e.g. MQTT, AMQP


Additionally none of this technologies
help with dealing with geo-distributed
data at rest
Filling the Gap
Uni
fi
es data in motion, data in-use, data at
rest and computations.


It carefully blends traditional pub/sub with
distributed queries, while retaining a level of
time and space ef
fi
ciency that is well beyond
any of the mainstream stacks.


It provides built-in support for geo-distributed
storages and distributed computations
Provides a high level API for pub/sub and
distributed queries, data representation
transcoding, an implementation of geo-distributed
storage and distributed computed values
zenoh Data Link
Network
Transport
Physical
zenoh
zenoh.net
Implements a networking layer capable of running
above a Data Link, Network or Transport Layer. This
protocol provides primitives for ef
fi
cient pub/sub
and distributed queries. It supports fragmentation
and ordered reliable delivery.
zenoh.net
Communication Models
Peer-to-peer communication
Peer
Peer
Peer
Peer
Peer
Peer
Peer
Peer
Peer
Peer
Peers Scouting:


• Multicast


• Gossip
Clique Mesh
Brokered Communication
Router and peers can
help with brokering
communication
between clients as
well as between
clients and mesh of
peers
Router
Client
Client
Client
Peer
Peer
Peer
Peer
Peer
Client
Client
Client
Peer
Peer
Peer
Peer
Router
Router
Router
Router
Router
Router
Peer
Peer
Peer
Peer
Peer
Peer
Peer
Peer
Peer
Peer
Router
Generalised Topology
Client
Client
Client
Client
Client
Client
Client
Client Client
Client
Client
Client
Client
Abstractions
Naming Data
Following the tradition of Named Data Networking protocols, data is
named by a sequence of byte arrays — called key — such as:
/home/kitchen/sensors/temp


/home/kitchen/sensors/C202
Data interest and intents are expressed by means of keys regular expressions,
such as:
/home/*/sensors/temp


/home/**/C202
Selecting Data
Uses selector to de
fi
nes data sets. A selector is composed by a key
expression, and optionally a predicate, a projection and a set of
properties
/myhome/*/sensor/temp?value>25


/mycar/dynamics?speed>25#acceleration


The key-expression is used to route the query, while predicate, properties,
projection, etc., are interpreted only by the entity that executes the query. It also
provide different policies to control query consolidation and completeness
and potentially quorums
Primitives: Entities
Resource. A named data, in other term a (key,value)
Publisher. A spring of values for a key expression
Subscriber. A sink of values for a key expression
Queryable. A well of values for a key expression
(e.g.	/home/kitchen/sensor/temp,	21.5
(e.g.	/home/kitchen/sensor/temp
	/home/kitchen/sensor/hum,	0.67)
/home/kitchen/sensor/*	)
(e.g.	/home/kitchen/sensor/temp
/home/kitchen/sensor/*)
(e.g.	/home/**)
Primitives: Operations
open/close — Open/Close a zenoh.net session
scout — Looks for zenoh entities, the kinds of relevant nodes, e.g. peers,
router, etc., is speci
fi
ed by a bit-mask.
declare/undeclare — Declare/Undeclare resource, publisher, subscriber and
queryable. Declarations are used for discovery and various optimisations. For
subscribers the declare primitive registers a user provided call-back that will
be triggered when data is available. For queryable, the declare primitive register
a user provided call-back triggered whenever a query needs to be answered.
Primitives: Operations
write — Writes data for a key expression
query — Issues a distributed query and returns a stream of results. The
query target, coverage and consolidation depends on policies
pull — Pulls data for a pull subscriber.
Storage
A storage is de
fi
ned by:


Selector. De
fi
nes the set of
resources keys that stores this
storage


Back-end. De
fi
nes the storage
technology used
/myhome/status/**
…
Storage Back-end
Storage Selector
zenoh	storages	can	be	created	via	the	
administration	API	anywhere	on	the	network	
and	back-ends	are	dynamically	loaded	plugins.
zenoh	storages	automatically	align	their	
initial	state,	but	can	also	be	bound	to	
existing	data-bases
Eval
An eval is de
fi
ned by:


Selector. De
fi
nes the set of
resources keys that will trigger
this computation


Implementation. The user
code implementing the
computation
Eval Implementation
/myhome/energy-cons
Eval Selector
Data Link
Network
Transport
Physical
zenoh
zenoh.net Queryable
Subscriber Subscriber
Write Queryable
Storage Eval
Put Subscriber
Query
Get
zenoh protocol
zZ
Publisher Storage
Querier
Pull


Subscriber
Subscriber
Subscriber
/louvre/**/sensor/temp
/louvre/1/42/sensor/temp
/louvre/1/42/anomaly
/louvre/2/42/sensor/temp
/louvre/1/42/sensor/temp
Publisher
/louvre/2/42/sensor/temp
/louvre/2/**
/louvre/1/**
Storage
Eval
zZ
Publisher Queryable


+


Subscriber
Queryable
Querier
Pull


Subscriber
Subscriber
Subscriber
Queryable


+


Subscriber
/louvre/**/sensor/temp
/louvre/1/42/sensor/temp
/louvre/2/**
/louvre/1/**
/louvre/1/42/anomaly
/louvre/2/42/sensor/temp
/louvre/1/42/sensor/temp
Publisher
/louvre/2/42/sensor/temp
zZ
Publisher Queryable


+


Subscriber
Queryable
Querier
Pull


Subscriber
Subscriber
Subscriber
Queryable


+


Subscriber
/louvre/**/sensor/temp
/louvre/1/42/sensor/temp
/louvre/1/42/anomaly
/louvre/2/42/sensor/temp
/louvre/1/42/sensor/temp
Publisher
/louvre/2/42/sensor/temp
/louvre/2/**
/louvre/1/**
zZ
Publisher Queryable


+


Subscriber
Queryable
Querier
Pull


Subscriber
Subscriber
Subscriber
Queryable


+


Subscriber
/louvre/**/sensor/temp
/louvre/1/42/sensor/temp
/louvre/1/42/anomaly
/louvre/2/42/sensor/temp
/louvre/1/42/sensor/temp
Publisher
/louvre/2/42/sensor/temp
/louvre/2/**
/louvre/1/**
zZ
Publisher Queryable


+


Subscriber
Queryable
Querier
Pull


Subscriber
Subscriber
Subscriber
Queryable


+


Subscriber
/louvre/**/sensor/temp
/louvre/1/42/sensor/temp
/louvre/1/42/anomaly
/louvre/2/42/sensor/temp
/louvre/1/42/sensor/temp
Publisher
/louvre/2/42/sensor/temp
/louvre/2/**
/louvre/1/**
get	/Louvre/*/42/sensor/temp
zZ
Publisher Queryable


+


Subscriber
Queryable
Querier
Pull


Subscriber
Subscriber
Subscriber
Queryable


+


Subscriber
/louvre/**/sensor/temp
/louvre/1/42/sensor/temp
/louvre/1/42/anomaly
/louvre/2/42/sensor/temp
/louvre/1/42/sensor/temp
Publisher
/louvre/2/42/sensor/temp
/louvre/2/**
/louvre/1/**
get	/Louvre/*/42/sensor/temp
Protocol Summary Highlights
Most wire/power/memory ef
fi
cient protocol in the market to provide
connectivity to extremely constrained targets


Supports push and pull pub/sub along with distributed queries


Resource keys are represented as integers on the wire, these integer
are local to a session => good for wire ef
fi
ciency


Supports for peer-to-peer and routed communication.


Support for zero-copy.


Ordered reliable data delivery and fragmentation.


Minimal wire overhead for user data is 4-6 bytes


Data Link
Network
Transport
Physical
zenoh
zenoh.net
Performance
Throughput (msg/s)
Test	ran	on	11/03/2021	on


Centos	8


AMD	Ryzen


32GB	RAM
Pub
Sub
Host
Throughput (Gb/s)
Test	ran	on	11/03/2021	on


Centos	8


AMD	Ryzen


32GB	RAM
Pub
Sub
Host
Round Trip Time (us)
Test	ran	on	11/03/2021	on


Centos	8


AMD	Ryzen


32GB	RAM
Pub
Sub
Host
Zenoh vs MQTT (msg/s)
Test	ran	on	11/03/2021	on


Centos	8


AMD	Ryzen


32GB	RAM
Pub
Rtr
Host
Sub
Zenoh vs MQTT (Gb/s)
Test	ran	on	11/03/2021	on


Centos	8


AMD	Ryzen


32GB	RAM
Pub
Rtr
Host
Sub
Code Lab
Comi
ng
Up
In
progr
ess
APIs
zenoh	runs	on	any	RUST	supported	platform	plus	a	few	
embedded	targets	such	as	Zephyr.	Zenoh	also	offers	a	
REST	API	for	programming	and	administration.


/demo/us-west/**


/demo/us-east/**


/demo/eu/**
/demo/ap/**
Example:


• Put data: curl -X PUT -d 'Hello World!' http://us-west.zenoh.io:8000/demo/eu/test


• Get data: curl http://ap.zenoh.io:8000/demo/*/test
us-west.zenoh.io
us-east.zenoh.io
eu.zenoh.io
ap.zenoh.io
Greetings
from zenoh import Zenoh


# Get a zenoh session


zs = Zenoh({‘peer’: ‘tcp/eu.zenoh.io:7447’})


z = zs.workspace()


# play around


z.put(“/demo/eu/greet/italian”, “Ciao!”)
More Greetings…
z.put(“/demo/us-east/greet/american”, “Hi!")


z.put(“/demo/us-west/greet/american”, “What’s Up!”)


z.put(“/demo/ap/greet/japanese”, “Aisatsu!”)
Getting Greetings
from zenoh import Zenoh, ChangeKind


# Define the listener


def listener(change):


print("{} : {} (encoding: {} , timestamp: {})”


.format(change.path,


"DELETED" if change.kind == ChangeKind.DELETE


else change.value.get_content(),


"none" if change.kind == ChangeKind.DELETE


else change.value.encoding_descr(),


change.timestamp))


z.subscribe(“/demo/**/greet/*“, listener)
Finding out Greetings
# How do people greet in EU?


workspace.get(“/demo/eu/**/greet”)


# How about American?


workspace.get(“/demo/us-*/**/greet”)


# Just get me all you know about greeting…


workspace.get(“/demo/**/greet”)


/demo/us-west/**


/demo/us-east/**


/demo/eu/**
/demo/ap/**
us-west.zenoh.io
us-east.zenoh.io
eu.zenoh.io
ap.zenoh.io
workspace.get(“/demo/eu/**/greet”)


/demo/us-west/**


/demo/us-east/**


/demo/eu/**
/demo/ap/**
us-west.zenoh.io
us-east.zenoh.io
eu.zenoh.io
ap.zenoh.io
workspace.get(“/demo/eu/**/greet”)


workspace.get(““/demo/us-*/**/greet””)
workspace.get(“/demo/us-*/**/greet”)




/demo/us-west/**


/demo/us-east/**


/demo/eu/**
/demo/ap/**
us-west.zenoh.io
us-east.zenoh.io
eu.zenoh.io
ap.zenoh.io
workspace.get(“/demo/eu/**/greet”)


workspace.get(“/demo/**/greet”)
Greeting of the Day
Imagine you want to do a greeting of the day that each time
somebody tries to query it generates a random quote, or a
daily quote, etc.


We could do that with an eval, here is how:
def quote_eval(request):


make_a_cute_quote(request)


z.register_eval(“/demo/*/greet/*/daily”, quote_eval)


/demo/us-west/**


/demo/us-east/**


/demo/eu/**
/demo/ap/**
us-west.zenoh.io
us-east.zenoh.io
eu.zenoh.io
ap.zenoh.io
workspace.get(““/demo/*/greet/italian/daily””)


workspace.get(“/demo/*/greet/american/daily”)


To	resolve	this	query	zenoh	will	pick	the	eval	that	
happens	to	be	“closer”	to	the	querier.


This	is	true	in	general	as	queries	can	target	at	the	
same	time	evals	and	storages.
Application Domains
ROS2 and
ROS2 based robots can leverage zenoh
into two ways (1) by leveraging a ROS2
RMW for zenoh, or (2) by leveraging the
zenoh-bridge-dds which transparently
moves R2X communication over zenoh


The latter case does not require any
change to your robot, not even a
recompile / re-link


Zenoh also supports full interoperability
with ROS2 in the sense than you can
read/write data from/into ROS2 via native
zenoh API
Discovery Traffic Reduction
Zenoh drastically
reduces DDS
discovery overhead
– from 97% to
99,9%
Internet Scale Robotics
Zenoh enables for mesh peer-
to-peer communication when
useful, routed communication
when necessary and in general
enables ef
fi
cient Internet-scale


Additionally, it does not require
any changes to your existing
ROS2 systems.
In Action
Indy Autonomous Challenge
Zenoh used for R2X
communication
Final Thoughts
zenoh is an innovative and performant
protocol that solves some of they problems
at the very core of IoT and Edge Computing


Its open architecture enables to easily
expand both storage back-ends as well as
protocols that are routed and integrated into
the zenoh world


If you like zenoh, star our repo and start
hacking some code!
References
“Patience, persistence and
perspiration make an
unbeatable combination for
success.”

More Related Content

What's hot

Introduction to RTI DDS
Introduction to RTI DDSIntroduction to RTI DDS
Introduction to RTI DDS
Real-Time Innovations (RTI)
 
The Art and Science of DDS Data Modelling
The Art and Science of DDS Data ModellingThe Art and Science of DDS Data Modelling
The Art and Science of DDS Data Modelling
Angelo Corsaro
 
Cyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeCyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT Age
Angelo Corsaro
 
RTI Data-Distribution Service (DDS) Master Class 2011
RTI Data-Distribution Service (DDS) Master Class 2011RTI Data-Distribution Service (DDS) Master Class 2011
RTI Data-Distribution Service (DDS) Master Class 2011
Gerardo Pardo-Castellote
 
DDS In Action Part II
DDS In Action Part IIDDS In Action Part II
DDS In Action Part II
Angelo Corsaro
 
DDS Over Low Bandwidth Data Links
DDS Over Low Bandwidth Data LinksDDS Over Low Bandwidth Data Links
DDS Over Low Bandwidth Data Links
Real-Time Innovations (RTI)
 
Fast DDS Features & Tools
Fast DDS Features & ToolsFast DDS Features & Tools
Fast DDS Features & Tools
eProsima
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution Service
Angelo Corsaro
 
Best Practices Using RTI Connext DDS
Best Practices Using RTI Connext DDSBest Practices Using RTI Connext DDS
Best Practices Using RTI Connext DDS
Real-Time Innovations (RTI)
 
DDS in Action -- Part I
DDS in Action -- Part IDDS in Action -- Part I
DDS in Action -- Part I
Angelo Corsaro
 
The DDS Tutorial - Part I
The DDS Tutorial - Part IThe DDS Tutorial - Part I
The DDS Tutorial - Part I
Angelo Corsaro
 
Data-Centric and Message-Centric System Architecture
Data-Centric and Message-Centric System ArchitectureData-Centric and Message-Centric System Architecture
Data-Centric and Message-Centric System Architecture
Rick Warren
 
Apache Spark Data Source V2 with Wenchen Fan and Gengliang Wang
Apache Spark Data Source V2 with Wenchen Fan and Gengliang WangApache Spark Data Source V2 with Wenchen Fan and Gengliang Wang
Apache Spark Data Source V2 with Wenchen Fan and Gengliang Wang
Databricks
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security Standard
Angelo Corsaro
 
Getting Started in DDS with C++ and Java
Getting Started in DDS with C++ and JavaGetting Started in DDS with C++ and Java
Getting Started in DDS with C++ and Java
Angelo Corsaro
 
Apache Spark in Depth: Core Concepts, Architecture & Internals
Apache Spark in Depth: Core Concepts, Architecture & InternalsApache Spark in Depth: Core Concepts, Architecture & Internals
Apache Spark in Depth: Core Concepts, Architecture & Internals
Anton Kirillov
 
DDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing StandardDDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing Standard
Angelo Corsaro
 
OpenSplice DDS Tutorial -- Part II
OpenSplice DDS Tutorial -- Part IIOpenSplice DDS Tutorial -- Part II
OpenSplice DDS Tutorial -- Part II
Angelo Corsaro
 
RTI DDS Intro with DDS Secure
RTI DDS Intro with DDS SecureRTI DDS Intro with DDS Secure
RTI DDS Intro with DDS Secure
John Breitenbach
 
RPC Over DDS
RPC Over DDSRPC Over DDS

What's hot (20)

Introduction to RTI DDS
Introduction to RTI DDSIntroduction to RTI DDS
Introduction to RTI DDS
 
The Art and Science of DDS Data Modelling
The Art and Science of DDS Data ModellingThe Art and Science of DDS Data Modelling
The Art and Science of DDS Data Modelling
 
Cyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeCyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT Age
 
RTI Data-Distribution Service (DDS) Master Class 2011
RTI Data-Distribution Service (DDS) Master Class 2011RTI Data-Distribution Service (DDS) Master Class 2011
RTI Data-Distribution Service (DDS) Master Class 2011
 
DDS In Action Part II
DDS In Action Part IIDDS In Action Part II
DDS In Action Part II
 
DDS Over Low Bandwidth Data Links
DDS Over Low Bandwidth Data LinksDDS Over Low Bandwidth Data Links
DDS Over Low Bandwidth Data Links
 
Fast DDS Features & Tools
Fast DDS Features & ToolsFast DDS Features & Tools
Fast DDS Features & Tools
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution Service
 
Best Practices Using RTI Connext DDS
Best Practices Using RTI Connext DDSBest Practices Using RTI Connext DDS
Best Practices Using RTI Connext DDS
 
DDS in Action -- Part I
DDS in Action -- Part IDDS in Action -- Part I
DDS in Action -- Part I
 
The DDS Tutorial - Part I
The DDS Tutorial - Part IThe DDS Tutorial - Part I
The DDS Tutorial - Part I
 
Data-Centric and Message-Centric System Architecture
Data-Centric and Message-Centric System ArchitectureData-Centric and Message-Centric System Architecture
Data-Centric and Message-Centric System Architecture
 
Apache Spark Data Source V2 with Wenchen Fan and Gengliang Wang
Apache Spark Data Source V2 with Wenchen Fan and Gengliang WangApache Spark Data Source V2 with Wenchen Fan and Gengliang Wang
Apache Spark Data Source V2 with Wenchen Fan and Gengliang Wang
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security Standard
 
Getting Started in DDS with C++ and Java
Getting Started in DDS with C++ and JavaGetting Started in DDS with C++ and Java
Getting Started in DDS with C++ and Java
 
Apache Spark in Depth: Core Concepts, Architecture & Internals
Apache Spark in Depth: Core Concepts, Architecture & InternalsApache Spark in Depth: Core Concepts, Architecture & Internals
Apache Spark in Depth: Core Concepts, Architecture & Internals
 
DDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing StandardDDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing Standard
 
OpenSplice DDS Tutorial -- Part II
OpenSplice DDS Tutorial -- Part IIOpenSplice DDS Tutorial -- Part II
OpenSplice DDS Tutorial -- Part II
 
RTI DDS Intro with DDS Secure
RTI DDS Intro with DDS SecureRTI DDS Intro with DDS Secure
RTI DDS Intro with DDS Secure
 
RPC Over DDS
RPC Over DDSRPC Over DDS
RPC Over DDS
 

Similar to zenoh: The Edge Data Fabric

Construire une « data fabric » pour les environnements edge
Construire une « data fabric » pour les environnements edgeConstruire une « data fabric » pour les environnements edge
Construire une « data fabric » pour les environnements edge
Open Source Experience
 
Seed block algorithm
Seed block algorithmSeed block algorithm
Seed block algorithmDipak Badhe
 
The Proliferation And Advances Of Computer Networks
The Proliferation And Advances Of Computer NetworksThe Proliferation And Advances Of Computer Networks
The Proliferation And Advances Of Computer Networks
Jessica Deakin
 
Evolution from EDA to Data Mesh: Data in Motion
Evolution from EDA to Data Mesh: Data in MotionEvolution from EDA to Data Mesh: Data in Motion
Evolution from EDA to Data Mesh: Data in Motion
confluent
 
Java Abs Peer To Peer Design & Implementation Of A Tuple S
Java Abs   Peer To Peer Design & Implementation Of A Tuple SJava Abs   Peer To Peer Design & Implementation Of A Tuple S
Java Abs Peer To Peer Design & Implementation Of A Tuple S
ncct
 
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
Java Abs   Peer To Peer Design & Implementation Of A Tuple SpaceJava Abs   Peer To Peer Design & Implementation Of A Tuple Space
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
ncct
 
A Comprehensive Study On Data Mining Process With Distribution
A Comprehensive Study On Data Mining Process With DistributionA Comprehensive Study On Data Mining Process With Distribution
A Comprehensive Study On Data Mining Process With Distribution
Lori Mitchell
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
 
Dynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsDynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT Environments
PayamBarnaghi
 
How Consistent Data Services Deliver Simplicity, Compatibility, And Lower Cost
How Consistent Data Services Deliver Simplicity, Compatibility, And Lower CostHow Consistent Data Services Deliver Simplicity, Compatibility, And Lower Cost
How Consistent Data Services Deliver Simplicity, Compatibility, And Lower Cost
Dana Gardner
 
Data Virtualization to Survive a Multi and Hybrid Cloud World
Data Virtualization to Survive a Multi and Hybrid Cloud WorldData Virtualization to Survive a Multi and Hybrid Cloud World
Data Virtualization to Survive a Multi and Hybrid Cloud World
Denodo
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
thilaganga
 
Introduction to Modern Data Virtualization (US)
Introduction to Modern Data Virtualization (US)Introduction to Modern Data Virtualization (US)
Introduction to Modern Data Virtualization (US)
Denodo
 
CouchBase The Complete NoSql Solution for Big Data
CouchBase The Complete NoSql Solution for Big DataCouchBase The Complete NoSql Solution for Big Data
CouchBase The Complete NoSql Solution for Big Data
Debajani Mohanty
 
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET Journal
 
Data processing in Cyber-Physical Systems
Data processing in Cyber-Physical SystemsData processing in Cyber-Physical Systems
Data processing in Cyber-Physical Systems
Bob Marcus
 
CC LECTURE NOTES (1).pdf
CC LECTURE NOTES (1).pdfCC LECTURE NOTES (1).pdf
CC LECTURE NOTES (1).pdf
HasanAfwaaz1
 
White Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum DatabaseWhite Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum Database
EMC
 

Similar to zenoh: The Edge Data Fabric (20)

Construire une « data fabric » pour les environnements edge
Construire une « data fabric » pour les environnements edgeConstruire une « data fabric » pour les environnements edge
Construire une « data fabric » pour les environnements edge
 
Seed block algorithm
Seed block algorithmSeed block algorithm
Seed block algorithm
 
The Proliferation And Advances Of Computer Networks
The Proliferation And Advances Of Computer NetworksThe Proliferation And Advances Of Computer Networks
The Proliferation And Advances Of Computer Networks
 
Evolution from EDA to Data Mesh: Data in Motion
Evolution from EDA to Data Mesh: Data in MotionEvolution from EDA to Data Mesh: Data in Motion
Evolution from EDA to Data Mesh: Data in Motion
 
Java Abs Peer To Peer Design & Implementation Of A Tuple S
Java Abs   Peer To Peer Design & Implementation Of A Tuple SJava Abs   Peer To Peer Design & Implementation Of A Tuple S
Java Abs Peer To Peer Design & Implementation Of A Tuple S
 
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
Java Abs   Peer To Peer Design & Implementation Of A Tuple SpaceJava Abs   Peer To Peer Design & Implementation Of A Tuple Space
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
 
A Comprehensive Study On Data Mining Process With Distribution
A Comprehensive Study On Data Mining Process With DistributionA Comprehensive Study On Data Mining Process With Distribution
A Comprehensive Study On Data Mining Process With Distribution
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
 
Dynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsDynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT Environments
 
How Consistent Data Services Deliver Simplicity, Compatibility, And Lower Cost
How Consistent Data Services Deliver Simplicity, Compatibility, And Lower CostHow Consistent Data Services Deliver Simplicity, Compatibility, And Lower Cost
How Consistent Data Services Deliver Simplicity, Compatibility, And Lower Cost
 
Data Virtualization to Survive a Multi and Hybrid Cloud World
Data Virtualization to Survive a Multi and Hybrid Cloud WorldData Virtualization to Survive a Multi and Hybrid Cloud World
Data Virtualization to Survive a Multi and Hybrid Cloud World
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
 
Introduction to Modern Data Virtualization (US)
Introduction to Modern Data Virtualization (US)Introduction to Modern Data Virtualization (US)
Introduction to Modern Data Virtualization (US)
 
CouchBase The Complete NoSql Solution for Big Data
CouchBase The Complete NoSql Solution for Big DataCouchBase The Complete NoSql Solution for Big Data
CouchBase The Complete NoSql Solution for Big Data
 
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFS
 
Data processing in Cyber-Physical Systems
Data processing in Cyber-Physical SystemsData processing in Cyber-Physical Systems
Data processing in Cyber-Physical Systems
 
Grid Computing
Grid ComputingGrid Computing
Grid Computing
 
CC LECTURE NOTES (1).pdf
CC LECTURE NOTES (1).pdfCC LECTURE NOTES (1).pdf
CC LECTURE NOTES (1).pdf
 
White Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum DatabaseWhite Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum Database
 

More from Angelo Corsaro

Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationData Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Angelo Corsaro
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
Angelo Corsaro
 
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingBreaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Angelo Corsaro
 
Eastern Sicily
Eastern SicilyEastern Sicily
Eastern Sicily
Angelo Corsaro
 
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructurefog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructure
Angelo Corsaro
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing Platform
Angelo Corsaro
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture Four
Angelo Corsaro
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture Three
Angelo Corsaro
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture Two
Angelo Corsaro
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture One
Angelo Corsaro
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained Envionrments
Angelo Corsaro
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming Ruminations
Angelo Corsaro
 
Vortex II -- The Industrial IoT Connectivity Standard
Vortex II -- The  Industrial IoT  Connectivity StandardVortex II -- The  Industrial IoT  Connectivity Standard
Vortex II -- The Industrial IoT Connectivity Standard
Angelo Corsaro
 
Fog Computing Defined
Fog Computing DefinedFog Computing Defined
Fog Computing Defined
Angelo Corsaro
 
DDS and OPC UA Explained
DDS and OPC UA ExplainedDDS and OPC UA Explained
DDS and OPC UA Explained
Angelo Corsaro
 
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
The Cloudy, Foggy and Misty Internet of Things --  Toward Fluid IoT Architect...The Cloudy, Foggy and Misty Internet of Things --  Toward Fluid IoT Architect...
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
Angelo Corsaro
 
Fluid IoT Architectures
Fluid IoT ArchitecturesFluid IoT Architectures
Fluid IoT Architectures
Angelo Corsaro
 
Building IoT Applications with Vortex and the Intel Edison Starter Kit
Building IoT Applications with Vortex and the Intel Edison Starter KitBuilding IoT Applications with Vortex and the Intel Edison Starter Kit
Building IoT Applications with Vortex and the Intel Edison Starter Kit
Angelo Corsaro
 
Microservices Architecture with Vortex — Part II
Microservices Architecture with Vortex — Part IIMicroservices Architecture with Vortex — Part II
Microservices Architecture with Vortex — Part II
Angelo Corsaro
 
Happy 2016!
Happy 2016!Happy 2016!
Happy 2016!
Angelo Corsaro
 

More from Angelo Corsaro (20)

Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationData Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingBreaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
 
Eastern Sicily
Eastern SicilyEastern Sicily
Eastern Sicily
 
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructurefog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructure
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing Platform
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture Four
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture Three
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture Two
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture One
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained Envionrments
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming Ruminations
 
Vortex II -- The Industrial IoT Connectivity Standard
Vortex II -- The  Industrial IoT  Connectivity StandardVortex II -- The  Industrial IoT  Connectivity Standard
Vortex II -- The Industrial IoT Connectivity Standard
 
Fog Computing Defined
Fog Computing DefinedFog Computing Defined
Fog Computing Defined
 
DDS and OPC UA Explained
DDS and OPC UA ExplainedDDS and OPC UA Explained
DDS and OPC UA Explained
 
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
The Cloudy, Foggy and Misty Internet of Things --  Toward Fluid IoT Architect...The Cloudy, Foggy and Misty Internet of Things --  Toward Fluid IoT Architect...
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
 
Fluid IoT Architectures
Fluid IoT ArchitecturesFluid IoT Architectures
Fluid IoT Architectures
 
Building IoT Applications with Vortex and the Intel Edison Starter Kit
Building IoT Applications with Vortex and the Intel Edison Starter KitBuilding IoT Applications with Vortex and the Intel Edison Starter Kit
Building IoT Applications with Vortex and the Intel Edison Starter Kit
 
Microservices Architecture with Vortex — Part II
Microservices Architecture with Vortex — Part IIMicroservices Architecture with Vortex — Part II
Microservices Architecture with Vortex — Part II
 
Happy 2016!
Happy 2016!Happy 2016!
Happy 2016!
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 

zenoh: The Edge Data Fabric