SlideShare ist ein Scribd-Unternehmen logo
1 von 18
What do we need to
make the Internet of
Things really happen?
Opher Etzion
Head – Technological Empowerment
Institute (in establishment phases)
opher.etzion@gmail.com
OUTLINE
“Internet of Things” – what is it, what are the
difficulties in making it “Internet”?
What can be done about it? Introducing TEM
How does the “Technological Empowerment
Institute” get into the picture?
The Internet of everything for situation awareness
None of the
authorized drivers
location is near
the car’s location
theft is concluded
Whom to notify;
whether to
activate stopper
Use a built-in car
stopper to slow
the intruder and
dispatch the
security company
A person enters a car
and the car starts
moving;
the person does not
look like one of the
authorized drivers
Such applications
become possible
since everything is
connected
Anatomy of situation awareness system
Becoming aware of an event and then doing something about it.
Derive
Mechanisms
Single Event
Multiple
Events
Ancillary
Info
May need
multiple iterations
May require addition
reference / state
information
Something we
want to react
to
A Situation
Detect
Mechanism
Feedback
Events
Decide
Mechanism
Do
Mechanism
Event
of
Interest
Order
Should be
indicating
Entity State
Change
Should be
indicating
Decisions
Derived Event Trigger
sensors
Actuators
4
Does the “Internet of everything” really exhibit the benefits of the
Internet?
The success of the Internet is attributed to its relative
simplicity
 to connect
 to create content
 to search
Imagine that any search in the
Internet would have been done
using SQL queries…
How pervasive do you think the
Internet would have been?
For situational awareness….
we are not even in the SQL era
Event
Patterns
Listing 1.1 Example of the MonitorScript event programming language from Apama
if isAuto then {
DeliveryBid db;
on DeliveryBid(store=dr.store):db within(ASSIGNMENT_TIME){ #1
assignmentTimer.quit();
route Assignment(dr.requestId, #2
dr.store,
db.driver,
dr.addresseeLocationPointX,
dr.addresseeLocationPointY,
db.committedPickUpTime,
dr.requiredDeliveryTime);
watchForPickUp(dr, db.driver, db.committedPickUpTime);
watchForDelivery(dr, db.driver);
}
}
Most of the event-based
programming today is still ad-
hoc and hand-coded;
existing languages are rather
low level
“There is no Internet of Things yet”
While people typically are event-driven we tend to
think about computerized systems in request
driven way
Searching the web, database queries, use
of web services, use of mobile
applications
Difficulties in the way that most people would
approach it The event-driven vs.
request-driven nature
Effectiveness and
Efficiency issues
The temporal
oriented behavior
The hidden state
handling
The vision for Internet of Things
Shift governance from the programmer to the knowledge worker or customer
Governance occurs
through development
and maintenance of
program code
Governance occurs
through development
and maintenance of
event models
TODAY TOMORROW
CODE LEVEL
The basic requirements of event modeling
4. Automatic
translation to
code in regular
or specific
engine
language
3. Free of
implementation
assumptions
1. Rigorous
verifiable
structure
2. Represented
as a collection of
tables
Eliminating noise from the model
Current models are close to the
implementation models – and from pure
logic view contain “noise”.
Bringing data from current state
Query Enrichment
Inclusion in
events
Examples:
Determine what food-type
the container carries
Fetch the temperature
regulations for a specific
food type
Other noise : workarounds
The Technological Empowerment Institute in a
nutshell
Empowerment of people:
empowerment of wellness and quality
of life of people within developing
areas, such as: elderly people.
Empowerment of business: typical for
developing areas such as agriculture,
food industry, and small
manufactures.
Empowerment of opportunities:
Empowerment of R&D and education
in developing areas by creating R&D
partnerships and enhance education
systems in various levels.
Smart sensor-based system for situation awareness is
the means to empower.
The means – three legs
The multi-disciplinary research leg:
world class excellence center around smart systems –
with researchers cover the technology aspect, the
human aspect, and the different domains aspect
The implementation leg:
Partnership between academic institutes that will carry
out students' projects, the high-tech industry that
will contribute platforms and products, domain
experts, and potential customers
The education leg:
employ dedicated curriculum of courses in the
undergraduate level, focused graduate program,
second chance education for degree holders, and
education for the community. It will aid to establish
similar programs in developing areas.
Example of some target applications
Assistance for elderly or disabled people in independent living by
situational awareness that may alert them (e.g. to take
medications), alert their families, or alert healthcare staff. A
family or caretaker will be able to personalize the alerts to an
individual patient.
Monitoring of vibrations, strokes, container openings or cold
chain maintenance to improve quality of deliveries over the
supply chain
Control of humidity and temperature levels in alfalfa, hay, straw,
etc. to prevent fungus and other microbial contaminants
Monitoring of water quality and leaks
OUR DRIVING FORCE IS TO
HELP
EVERYBODY REALIZE THE
POWER OF EVENTS TO
CREATE A BETTER WORLD
For more details:
opher.etzion@gmail.com

Weitere ähnliche Inhalte

Andere mochten auch

Risk Management for events: an introduction
Risk Management for events:  an introductionRisk Management for events:  an introduction
Risk Management for events: an introductionWilliam O'Toole
 
Introduction to Events Management
Introduction to Events ManagementIntroduction to Events Management
Introduction to Events ManagementMike Joseph
 
Microsoft Project Beginners Workshop
Microsoft Project Beginners WorkshopMicrosoft Project Beginners Workshop
Microsoft Project Beginners Workshopdominiquechiu
 
Introduction to events management
Introduction to events managementIntroduction to events management
Introduction to events managementM. C.
 
Project Management Through Gantt & Pert Chart
Project Management Through Gantt & Pert ChartProject Management Through Gantt & Pert Chart
Project Management Through Gantt & Pert ChartVinay Prajapati
 
Ms project 2016 overview
Ms project 2016 overviewMs project 2016 overview
Ms project 2016 overviewMaher Almohamad
 
Event Management
Event Management Event Management
Event Management Joey Phuah
 
Event planning powerpoint
Event planning powerpointEvent planning powerpoint
Event planning powerpointkatelandturner
 
PMP Chap 7 - Project Cost Management - Part 1
PMP Chap 7 - Project Cost Management - Part 1PMP Chap 7 - Project Cost Management - Part 1
PMP Chap 7 - Project Cost Management - Part 1Anand Bobade
 

Andere mochten auch (13)

Risk Management for events: an introduction
Risk Management for events:  an introductionRisk Management for events:  an introduction
Risk Management for events: an introduction
 
Online event management system
Online event management systemOnline event management system
Online event management system
 
Introduction to Events Management
Introduction to Events ManagementIntroduction to Events Management
Introduction to Events Management
 
Microsoft Project Beginners Workshop
Microsoft Project Beginners WorkshopMicrosoft Project Beginners Workshop
Microsoft Project Beginners Workshop
 
Introduction to events management
Introduction to events managementIntroduction to events management
Introduction to events management
 
Project Management Through Gantt & Pert Chart
Project Management Through Gantt & Pert ChartProject Management Through Gantt & Pert Chart
Project Management Through Gantt & Pert Chart
 
Microsoft Project
Microsoft ProjectMicrosoft Project
Microsoft Project
 
Ms project 2016 overview
Ms project 2016 overviewMs project 2016 overview
Ms project 2016 overview
 
Event Management
Event Management Event Management
Event Management
 
Event planning powerpoint
Event planning powerpointEvent planning powerpoint
Event planning powerpoint
 
Event Management
Event ManagementEvent Management
Event Management
 
Event management
Event managementEvent management
Event management
 
PMP Chap 7 - Project Cost Management - Part 1
PMP Chap 7 - Project Cost Management - Part 1PMP Chap 7 - Project Cost Management - Part 1
PMP Chap 7 - Project Cost Management - Part 1
 

Ähnlich wie The Internet of Things and some introduction to the Technological Empowerment Institute

Activity Streaming as Information X-Docking
Activity Streaming as Information X-DockingActivity Streaming as Information X-Docking
Activity Streaming as Information X-DockingKai Riemer
 
Proposed high level solutions to counter online examination fraud using digit...
Proposed high level solutions to counter online examination fraud using digit...Proposed high level solutions to counter online examination fraud using digit...
Proposed high level solutions to counter online examination fraud using digit...Ivans Kigwana
 
003 P1 Friends Essay Thatsnotus. Online assignment writing service.
003 P1 Friends Essay  Thatsnotus. Online assignment writing service.003 P1 Friends Essay  Thatsnotus. Online assignment writing service.
003 P1 Friends Essay Thatsnotus. Online assignment writing service.Donna Sims
 
Women's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning TechniquesWomen's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning TechniquesIRJET Journal
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting InformationLaura Martin
 
Management And Business
Management And BusinessManagement And Business
Management And BusinessKristen Wilson
 
GCR Digital Transformation for Solutions for Education
GCR Digital Transformation for Solutions for EducationGCR Digital Transformation for Solutions for Education
GCR Digital Transformation for Solutions for EducationGCRMarketing
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,Jill Lyons
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemIlonaThornburg83
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docxsodhi3
 
Future IT Trends Talk @Stanford OIT 554 Class - Guest Speaker - 3.7.17
Future IT Trends Talk @Stanford OIT 554 Class - Guest Speaker - 3.7.17Future IT Trends Talk @Stanford OIT 554 Class - Guest Speaker - 3.7.17
Future IT Trends Talk @Stanford OIT 554 Class - Guest Speaker - 3.7.17Paul Hofmann
 
Adding Rules to Improve Flexibility and Effectively Manage Complex Events
Adding Rules to Improve Flexibility and Effectively Manage Complex EventsAdding Rules to Improve Flexibility and Effectively Manage Complex Events
Adding Rules to Improve Flexibility and Effectively Manage Complex EventsTim Bass
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfJustinBrown267905
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Syed Ubaid Ali Jafri
 
The Critical Role of Spatial Data in Today's Data Ecosystem
The Critical Role of Spatial Data in Today's Data EcosystemThe Critical Role of Spatial Data in Today's Data Ecosystem
The Critical Role of Spatial Data in Today's Data EcosystemSafe Software
 

Ähnlich wie The Internet of Things and some introduction to the Technological Empowerment Institute (20)

Activity Streaming as Information X-Docking
Activity Streaming as Information X-DockingActivity Streaming as Information X-Docking
Activity Streaming as Information X-Docking
 
Proposed high level solutions to counter online examination fraud using digit...
Proposed high level solutions to counter online examination fraud using digit...Proposed high level solutions to counter online examination fraud using digit...
Proposed high level solutions to counter online examination fraud using digit...
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
003 P1 Friends Essay Thatsnotus. Online assignment writing service.
003 P1 Friends Essay  Thatsnotus. Online assignment writing service.003 P1 Friends Essay  Thatsnotus. Online assignment writing service.
003 P1 Friends Essay Thatsnotus. Online assignment writing service.
 
Women's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning TechniquesWomen's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning Techniques
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
 
Management And Business
Management And BusinessManagement And Business
Management And Business
 
GCR Digital Transformation for Solutions for Education
GCR Digital Transformation for Solutions for EducationGCR Digital Transformation for Solutions for Education
GCR Digital Transformation for Solutions for Education
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,
 
eTracemate
eTracemateeTracemate
eTracemate
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
 
Future IT Trends Talk @Stanford OIT 554 Class - Guest Speaker - 3.7.17
Future IT Trends Talk @Stanford OIT 554 Class - Guest Speaker - 3.7.17Future IT Trends Talk @Stanford OIT 554 Class - Guest Speaker - 3.7.17
Future IT Trends Talk @Stanford OIT 554 Class - Guest Speaker - 3.7.17
 
Adding Rules to Improve Flexibility and Effectively Manage Complex Events
Adding Rules to Improve Flexibility and Effectively Manage Complex EventsAdding Rules to Improve Flexibility and Effectively Manage Complex Events
Adding Rules to Improve Flexibility and Effectively Manage Complex Events
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
 
The Critical Role of Spatial Data in Today's Data Ecosystem
The Critical Role of Spatial Data in Today's Data EcosystemThe Critical Role of Spatial Data in Today's Data Ecosystem
The Critical Role of Spatial Data in Today's Data Ecosystem
 
Wfh remote access tips
Wfh   remote access tipsWfh   remote access tips
Wfh remote access tips
 
Machines In America
Machines In AmericaMachines In America
Machines In America
 

Mehr von Opher Etzion

DEBS 2019 tutorial : correctness and consistency of event-based systems
DEBS 2019 tutorial  : correctness and consistency of event-based systems DEBS 2019 tutorial  : correctness and consistency of event-based systems
DEBS 2019 tutorial : correctness and consistency of event-based systems Opher Etzion
 
Sw architectures 2018 on microservices and eda
Sw architectures 2018    on microservices and edaSw architectures 2018    on microservices and eda
Sw architectures 2018 on microservices and edaOpher Etzion
 
ER 2017 tutorial - On Paradoxes, Autonomous Systems and dilemmas
ER 2017 tutorial - On Paradoxes, Autonomous Systems and dilemmasER 2017 tutorial - On Paradoxes, Autonomous Systems and dilemmas
ER 2017 tutorial - On Paradoxes, Autonomous Systems and dilemmasOpher Etzion
 
Event processing within the human body - Tutorial
Event processing within the human body - Tutorial Event processing within the human body - Tutorial
Event processing within the human body - Tutorial Opher Etzion
 
DEBS 2015 tutorial When Artificial Intelligence meets the Internet of Things
DEBS 2015 tutorial   When Artificial Intelligence meets the Internet of ThingsDEBS 2015 tutorial   When Artificial Intelligence meets the Internet of Things
DEBS 2015 tutorial When Artificial Intelligence meets the Internet of ThingsOpher Etzion
 
Has Internet of Things really happened?
Has Internet of Things really happened? Has Internet of Things really happened?
Has Internet of Things really happened? Opher Etzion
 
On the personalization of event-based systems
On the personalization of event-based systems On the personalization of event-based systems
On the personalization of event-based systems Opher Etzion
 
On Internet of Everything and Personalization. Talk in INTEROP 2014
On Internet of Everything and Personalization. Talk in INTEROP 2014On Internet of Everything and Personalization. Talk in INTEROP 2014
On Internet of Everything and Personalization. Talk in INTEROP 2014Opher Etzion
 
Introduction to the institute of technological empowerment
Introduction to the institute of technological empowermentIntroduction to the institute of technological empowerment
Introduction to the institute of technological empowermentOpher Etzion
 
DEBS 2014 tutorial on the Internet of Everything.
DEBS 2014 tutorial  on the Internet of Everything. DEBS 2014 tutorial  on the Internet of Everything.
DEBS 2014 tutorial on the Internet of Everything. Opher Etzion
 
ER 2013 tutorial: modeling the event driven world
ER 2013 tutorial:  modeling the event driven world ER 2013 tutorial:  modeling the event driven world
ER 2013 tutorial: modeling the event driven world Opher Etzion
 
Event semantics and model - multimedia events workshop
Event semantics and model -  multimedia events workshopEvent semantics and model -  multimedia events workshop
Event semantics and model - multimedia events workshopOpher Etzion
 
Debs 2013 tutorial : Why is event-driven thinking different from traditional ...
Debs 2013 tutorial : Why is event-driven thinking different from traditional ...Debs 2013 tutorial : Why is event-driven thinking different from traditional ...
Debs 2013 tutorial : Why is event-driven thinking different from traditional ...Opher Etzion
 
Debs 2012 gong show immortality
Debs 2012 gong show immortalityDebs 2012 gong show immortality
Debs 2012 gong show immortalityOpher Etzion
 
Debs 2012 basic proactive
Debs 2012 basic proactiveDebs 2012 basic proactive
Debs 2012 basic proactiveOpher Etzion
 
Debs 2012 uncertainty tutorial
Debs 2012 uncertainty tutorialDebs 2012 uncertainty tutorial
Debs 2012 uncertainty tutorialOpher Etzion
 
Proactive eth talk
Proactive eth talkProactive eth talk
Proactive eth talkOpher Etzion
 
Aaai 2011 event processing tutorial
Aaai 2011 event processing tutorialAaai 2011 event processing tutorial
Aaai 2011 event processing tutorialOpher Etzion
 
Debs 2011 pattern rewritingforeventprocessingoptimization
Debs 2011  pattern rewritingforeventprocessingoptimizationDebs 2011  pattern rewritingforeventprocessingoptimization
Debs 2011 pattern rewritingforeventprocessingoptimizationOpher Etzion
 

Mehr von Opher Etzion (20)

DEBS 2019 tutorial : correctness and consistency of event-based systems
DEBS 2019 tutorial  : correctness and consistency of event-based systems DEBS 2019 tutorial  : correctness and consistency of event-based systems
DEBS 2019 tutorial : correctness and consistency of event-based systems
 
Sw architectures 2018 on microservices and eda
Sw architectures 2018    on microservices and edaSw architectures 2018    on microservices and eda
Sw architectures 2018 on microservices and eda
 
ER 2017 tutorial - On Paradoxes, Autonomous Systems and dilemmas
ER 2017 tutorial - On Paradoxes, Autonomous Systems and dilemmasER 2017 tutorial - On Paradoxes, Autonomous Systems and dilemmas
ER 2017 tutorial - On Paradoxes, Autonomous Systems and dilemmas
 
Event processing within the human body - Tutorial
Event processing within the human body - Tutorial Event processing within the human body - Tutorial
Event processing within the human body - Tutorial
 
DEBS 2015 tutorial When Artificial Intelligence meets the Internet of Things
DEBS 2015 tutorial   When Artificial Intelligence meets the Internet of ThingsDEBS 2015 tutorial   When Artificial Intelligence meets the Internet of Things
DEBS 2015 tutorial When Artificial Intelligence meets the Internet of Things
 
Dynamic stories
Dynamic storiesDynamic stories
Dynamic stories
 
Has Internet of Things really happened?
Has Internet of Things really happened? Has Internet of Things really happened?
Has Internet of Things really happened?
 
On the personalization of event-based systems
On the personalization of event-based systems On the personalization of event-based systems
On the personalization of event-based systems
 
On Internet of Everything and Personalization. Talk in INTEROP 2014
On Internet of Everything and Personalization. Talk in INTEROP 2014On Internet of Everything and Personalization. Talk in INTEROP 2014
On Internet of Everything and Personalization. Talk in INTEROP 2014
 
Introduction to the institute of technological empowerment
Introduction to the institute of technological empowermentIntroduction to the institute of technological empowerment
Introduction to the institute of technological empowerment
 
DEBS 2014 tutorial on the Internet of Everything.
DEBS 2014 tutorial  on the Internet of Everything. DEBS 2014 tutorial  on the Internet of Everything.
DEBS 2014 tutorial on the Internet of Everything.
 
ER 2013 tutorial: modeling the event driven world
ER 2013 tutorial:  modeling the event driven world ER 2013 tutorial:  modeling the event driven world
ER 2013 tutorial: modeling the event driven world
 
Event semantics and model - multimedia events workshop
Event semantics and model -  multimedia events workshopEvent semantics and model -  multimedia events workshop
Event semantics and model - multimedia events workshop
 
Debs 2013 tutorial : Why is event-driven thinking different from traditional ...
Debs 2013 tutorial : Why is event-driven thinking different from traditional ...Debs 2013 tutorial : Why is event-driven thinking different from traditional ...
Debs 2013 tutorial : Why is event-driven thinking different from traditional ...
 
Debs 2012 gong show immortality
Debs 2012 gong show immortalityDebs 2012 gong show immortality
Debs 2012 gong show immortality
 
Debs 2012 basic proactive
Debs 2012 basic proactiveDebs 2012 basic proactive
Debs 2012 basic proactive
 
Debs 2012 uncertainty tutorial
Debs 2012 uncertainty tutorialDebs 2012 uncertainty tutorial
Debs 2012 uncertainty tutorial
 
Proactive eth talk
Proactive eth talkProactive eth talk
Proactive eth talk
 
Aaai 2011 event processing tutorial
Aaai 2011 event processing tutorialAaai 2011 event processing tutorial
Aaai 2011 event processing tutorial
 
Debs 2011 pattern rewritingforeventprocessingoptimization
Debs 2011  pattern rewritingforeventprocessingoptimizationDebs 2011  pattern rewritingforeventprocessingoptimization
Debs 2011 pattern rewritingforeventprocessingoptimization
 

The Internet of Things and some introduction to the Technological Empowerment Institute

  • 1. What do we need to make the Internet of Things really happen? Opher Etzion Head – Technological Empowerment Institute (in establishment phases) opher.etzion@gmail.com
  • 2. OUTLINE “Internet of Things” – what is it, what are the difficulties in making it “Internet”? What can be done about it? Introducing TEM How does the “Technological Empowerment Institute” get into the picture?
  • 3. The Internet of everything for situation awareness None of the authorized drivers location is near the car’s location theft is concluded Whom to notify; whether to activate stopper Use a built-in car stopper to slow the intruder and dispatch the security company A person enters a car and the car starts moving; the person does not look like one of the authorized drivers Such applications become possible since everything is connected
  • 4. Anatomy of situation awareness system Becoming aware of an event and then doing something about it. Derive Mechanisms Single Event Multiple Events Ancillary Info May need multiple iterations May require addition reference / state information Something we want to react to A Situation Detect Mechanism Feedback Events Decide Mechanism Do Mechanism Event of Interest Order Should be indicating Entity State Change Should be indicating Decisions Derived Event Trigger sensors Actuators 4
  • 5. Does the “Internet of everything” really exhibit the benefits of the Internet? The success of the Internet is attributed to its relative simplicity  to connect  to create content  to search Imagine that any search in the Internet would have been done using SQL queries… How pervasive do you think the Internet would have been?
  • 6. For situational awareness…. we are not even in the SQL era Event Patterns Listing 1.1 Example of the MonitorScript event programming language from Apama if isAuto then { DeliveryBid db; on DeliveryBid(store=dr.store):db within(ASSIGNMENT_TIME){ #1 assignmentTimer.quit(); route Assignment(dr.requestId, #2 dr.store, db.driver, dr.addresseeLocationPointX, dr.addresseeLocationPointY, db.committedPickUpTime, dr.requiredDeliveryTime); watchForPickUp(dr, db.driver, db.committedPickUpTime); watchForDelivery(dr, db.driver); } } Most of the event-based programming today is still ad- hoc and hand-coded; existing languages are rather low level
  • 7. “There is no Internet of Things yet”
  • 8. While people typically are event-driven we tend to think about computerized systems in request driven way Searching the web, database queries, use of web services, use of mobile applications
  • 9. Difficulties in the way that most people would approach it The event-driven vs. request-driven nature Effectiveness and Efficiency issues The temporal oriented behavior The hidden state handling
  • 10. The vision for Internet of Things Shift governance from the programmer to the knowledge worker or customer Governance occurs through development and maintenance of program code Governance occurs through development and maintenance of event models TODAY TOMORROW CODE LEVEL
  • 11. The basic requirements of event modeling 4. Automatic translation to code in regular or specific engine language 3. Free of implementation assumptions 1. Rigorous verifiable structure 2. Represented as a collection of tables
  • 12.
  • 13.
  • 14. Eliminating noise from the model Current models are close to the implementation models – and from pure logic view contain “noise”. Bringing data from current state Query Enrichment Inclusion in events Examples: Determine what food-type the container carries Fetch the temperature regulations for a specific food type Other noise : workarounds
  • 15. The Technological Empowerment Institute in a nutshell Empowerment of people: empowerment of wellness and quality of life of people within developing areas, such as: elderly people. Empowerment of business: typical for developing areas such as agriculture, food industry, and small manufactures. Empowerment of opportunities: Empowerment of R&D and education in developing areas by creating R&D partnerships and enhance education systems in various levels. Smart sensor-based system for situation awareness is the means to empower.
  • 16. The means – three legs The multi-disciplinary research leg: world class excellence center around smart systems – with researchers cover the technology aspect, the human aspect, and the different domains aspect The implementation leg: Partnership between academic institutes that will carry out students' projects, the high-tech industry that will contribute platforms and products, domain experts, and potential customers The education leg: employ dedicated curriculum of courses in the undergraduate level, focused graduate program, second chance education for degree holders, and education for the community. It will aid to establish similar programs in developing areas.
  • 17. Example of some target applications Assistance for elderly or disabled people in independent living by situational awareness that may alert them (e.g. to take medications), alert their families, or alert healthcare staff. A family or caretaker will be able to personalize the alerts to an individual patient. Monitoring of vibrations, strokes, container openings or cold chain maintenance to improve quality of deliveries over the supply chain Control of humidity and temperature levels in alfalfa, hay, straw, etc. to prevent fungus and other microbial contaminants Monitoring of water quality and leaks
  • 18. OUR DRIVING FORCE IS TO HELP EVERYBODY REALIZE THE POWER OF EVENTS TO CREATE A BETTER WORLD For more details: opher.etzion@gmail.com

Hinweis der Redaktion

  1. BVH: should the second example say “None of the authorized drivers for this car is in the car.” (Doesn’t all/not imply that some may be in it, but that this doesn’t count?)
  2. BVH: pre-SQL was procedural, which included loops (e.g., Get Next within Parent until GE status code), Go To, structured programming to avoid Go Tos, difficult to understand, even more difficult to manage change over time
  3. BVH: so our brains are smarter than our computer systems, imagine that! 
  4. BVH: I like the idea of “eliminating noise” Are all of these things noise: bring data, query, enrichment, inclusion in events, and other noise”What do we mean by “noise” – is it implementation details that are not necessary to consider when creating an implementation-independent representation?