SlideShare ist ein Scribd-Unternehmen logo
1 von 60
Downloaden Sie, um offline zu lesen
•
•
•
•
•
• MIKE@HEYDT.ORG MIKE@SEAMLESSTHINGIES.TECH
•
• HTTP://SEAMLESSTHINGIES.TECH
• HTTPS://WWW.LINKEDIN.COM/IN/MICHAELHEYDT
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Reason Humans Things
Become visible Increase popularity Publish information
Provide services
Find resources Find old and new friends Find information or services
Obtain context Get filtered information What is my environment?
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Communications Discovery Query Messaging Routing
Presence Community Orchestration Roles Ontology
Identity Trustworthiness Authorization Proxemics Ghosting
Management Policy
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
DiscoveryServices Service
Lookup
GPS
Message Nodes
Endpoints
Node 1
TCPUDP MQTT
Node 2
AllJoyn
Node 3
PubNub
•
•
•
•
•
•
•
•
•
•
•
•
HI!
Welcome!
•
•
Whodoyouknow?
Iknowtheseothertwo
•
•
•
•
•
•
•
Device 1 Device 2
GPS Publish
Service
Message
Node
MQTT
Endpoint
Message
Node 1
My App that
would like
GPS!
MQTT
Endpoint
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Attribute
Message ID Unique ID assigned by the sender.
Messages can be received multiple
times, so duplicates are ignored
Destination
Route
Sequence of device ID’s and possible
endpoint descriptions that the message
will be routed through to the ultimate
destination
Hops Places the message has been (device id,
endpoints, timestamps). Use for network
topology discovery and cycle prevention
Max Hops Only try sending through this many nodes
TTL Actual timespan for ttl
CorrelationID If message is a response to a request, this
facilitates the correlation
•
•
•
Endpoints have costs Transfer rate
Actual monetary cost
Backlog
Multiple endpoints Which endpoint is most efficient?
Which endpoint is online?
Location change I moved out of my
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Category Example
Digital distribution Distributing of digital content amongst a community
Signal nodes of availability, on-demand torrent distribution
Digital libraries Secure sharing of content within the community
Network computation Distributed and high-availability services, auto fail over and
an scaling
Dynamic composite
applications
Location and presence aware applications that defer
services to local facilities
Software defined
networks
Agents identify available services and modify network
infrastructure to most efficiently route application requests
to on-demand / dynamic services
Interactive Services Interactive television, movies, sports arenas.
Device libraries Now: Windows IoT, Raspberry Pi
Soon: Adruino, beaglebone, Photon
Proxy agents XBEE, Wormhole
Services Router
Community
Relay
Gateway
Discovery
Presence
Service hosting On device, plug-in architecture
Deployed in R-Pi for local services
Your own servers
Cloud deployed: AWS, Azure, Raskspace, VMWare
•
•
•
•
•
•
•
•
•
HTTP://STLTH.IO
Social Machines

Weitere ähnliche Inhalte

Ähnlich wie Social Machines

Bug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentBug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentDinesh O Bareja
 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & TestingDeepu S Nath
 
The Personal and Website Security Mindset
The Personal and Website Security MindsetThe Personal and Website Security Mindset
The Personal and Website Security MindsetAdam W. Warner
 
Online Marketing Presentation
Online Marketing PresentationOnline Marketing Presentation
Online Marketing PresentationTony McCreath
 
Ubiquitous Angels; ambient sensor networks to crowd source crisis response an...
Ubiquitous Angels; ambient sensor networks to crowd source crisis response an...Ubiquitous Angels; ambient sensor networks to crowd source crisis response an...
Ubiquitous Angels; ambient sensor networks to crowd source crisis response an...Anselm Hook
 
Noticing the Nuance: Designing intelligent systems that can understand semant...
Noticing the Nuance: Designing intelligent systems that can understand semant...Noticing the Nuance: Designing intelligent systems that can understand semant...
Noticing the Nuance: Designing intelligent systems that can understand semant...Elizabeth Murnane
 
Dama - Protecting Sensitive Data on a Database
Dama - Protecting Sensitive Data on a DatabaseDama - Protecting Sensitive Data on a Database
Dama - Protecting Sensitive Data on a Databasejohanswart1234
 
Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansRob Ragan
 
Greenwich Library Workshop PPC overview 11.17.15
Greenwich Library Workshop PPC overview 11.17.15Greenwich Library Workshop PPC overview 11.17.15
Greenwich Library Workshop PPC overview 11.17.15Search Smart Marketing
 
Greenwich library workshop SEO overview 11.3.15
Greenwich library workshop SEO overview 11.3.15Greenwich library workshop SEO overview 11.3.15
Greenwich library workshop SEO overview 11.3.15Search Smart Marketing
 
OmniAuth: From the Ground Up
OmniAuth: From the Ground UpOmniAuth: From the Ground Up
OmniAuth: From the Ground UpMichael Bleigh
 
Sucuri Webinar: Website Security for Web Agencies
Sucuri Webinar: Website Security for Web AgenciesSucuri Webinar: Website Security for Web Agencies
Sucuri Webinar: Website Security for Web AgenciesSucuri
 
Semantic search: from document retrieval to virtual assistants
Semantic search: from document retrieval to virtual assistantsSemantic search: from document retrieval to virtual assistants
Semantic search: from document retrieval to virtual assistantsPeter Mika
 
2014 SP TechCon San Francisco - Shifting the Paradigm of Requirements Gathering
2014 SP TechCon San Francisco - Shifting the Paradigm of Requirements Gathering2014 SP TechCon San Francisco - Shifting the Paradigm of Requirements Gathering
2014 SP TechCon San Francisco - Shifting the Paradigm of Requirements GatheringMichelle Caldwell, PSM, SSGB
 
Playing with metadata / Gavin Willshaw, Scott Renton (University of Edinburgh)
Playing with metadata / Gavin Willshaw, Scott Renton (University of Edinburgh)Playing with metadata / Gavin Willshaw, Scott Renton (University of Edinburgh)
Playing with metadata / Gavin Willshaw, Scott Renton (University of Edinburgh)CIGScotland
 

Ähnlich wie Social Machines (20)

Bug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentBug Bounty Programs : Good for Government
Bug Bounty Programs : Good for Government
 
Big data, big tourism
Big data, big tourismBig data, big tourism
Big data, big tourism
 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & Testing
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
The Personal and Website Security Mindset
The Personal and Website Security MindsetThe Personal and Website Security Mindset
The Personal and Website Security Mindset
 
Online Marketing Presentation
Online Marketing PresentationOnline Marketing Presentation
Online Marketing Presentation
 
Ubiquitous Angels; ambient sensor networks to crowd source crisis response an...
Ubiquitous Angels; ambient sensor networks to crowd source crisis response an...Ubiquitous Angels; ambient sensor networks to crowd source crisis response an...
Ubiquitous Angels; ambient sensor networks to crowd source crisis response an...
 
Selected Thoughts on Modern Discovery and Access
Selected Thoughts on Modern Discovery and AccessSelected Thoughts on Modern Discovery and Access
Selected Thoughts on Modern Discovery and Access
 
Noticing the Nuance: Designing intelligent systems that can understand semant...
Noticing the Nuance: Designing intelligent systems that can understand semant...Noticing the Nuance: Designing intelligent systems that can understand semant...
Noticing the Nuance: Designing intelligent systems that can understand semant...
 
black hat deephish
black hat deephishblack hat deephish
black hat deephish
 
Dama - Protecting Sensitive Data on a Database
Dama - Protecting Sensitive Data on a DatabaseDama - Protecting Sensitive Data on a Database
Dama - Protecting Sensitive Data on a Database
 
Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response Plans
 
Greenwich Library Workshop PPC overview 11.17.15
Greenwich Library Workshop PPC overview 11.17.15Greenwich Library Workshop PPC overview 11.17.15
Greenwich Library Workshop PPC overview 11.17.15
 
Greenwich library workshop SEO overview 11.3.15
Greenwich library workshop SEO overview 11.3.15Greenwich library workshop SEO overview 11.3.15
Greenwich library workshop SEO overview 11.3.15
 
OmniAuth: From the Ground Up
OmniAuth: From the Ground UpOmniAuth: From the Ground Up
OmniAuth: From the Ground Up
 
Sucuri Webinar: Website Security for Web Agencies
Sucuri Webinar: Website Security for Web AgenciesSucuri Webinar: Website Security for Web Agencies
Sucuri Webinar: Website Security for Web Agencies
 
Semantic search: from document retrieval to virtual assistants
Semantic search: from document retrieval to virtual assistantsSemantic search: from document retrieval to virtual assistants
Semantic search: from document retrieval to virtual assistants
 
2014 SP TechCon San Francisco - Shifting the Paradigm of Requirements Gathering
2014 SP TechCon San Francisco - Shifting the Paradigm of Requirements Gathering2014 SP TechCon San Francisco - Shifting the Paradigm of Requirements Gathering
2014 SP TechCon San Francisco - Shifting the Paradigm of Requirements Gathering
 
Playing with metadata / Gavin Willshaw, Scott Renton (University of Edinburgh)
Playing with metadata / Gavin Willshaw, Scott Renton (University of Edinburgh)Playing with metadata / Gavin Willshaw, Scott Renton (University of Edinburgh)
Playing with metadata / Gavin Willshaw, Scott Renton (University of Edinburgh)
 
Privacy
PrivacyPrivacy
Privacy
 

Mehr von Michael Heydt

Natural User Interfaces in a Nutshel
Natural User Interfaces in a NutshelNatural User Interfaces in a Nutshel
Natural User Interfaces in a NutshelMichael Heydt
 
Continuous and Seamless Applications
Continuous and Seamless ApplicationsContinuous and Seamless Applications
Continuous and Seamless ApplicationsMichael Heydt
 
Using Azure for Computationally Intensive Workloads
Using Azure for Computationally Intensive WorkloadsUsing Azure for Computationally Intensive Workloads
Using Azure for Computationally Intensive WorkloadsMichael Heydt
 
NUX Presentation from TechMixer Birmingham 2011
NUX Presentation from TechMixer Birmingham 2011NUX Presentation from TechMixer Birmingham 2011
NUX Presentation from TechMixer Birmingham 2011Michael Heydt
 
C# 3.0 and LINQ Tech Talk
C# 3.0 and LINQ Tech TalkC# 3.0 and LINQ Tech Talk
C# 3.0 and LINQ Tech TalkMichael Heydt
 
Presentation on Cloud Mashups
Presentation on Cloud MashupsPresentation on Cloud Mashups
Presentation on Cloud MashupsMichael Heydt
 
Agile india 2014 Presentation
Agile india 2014 PresentationAgile india 2014 Presentation
Agile india 2014 PresentationMichael Heydt
 

Mehr von Michael Heydt (7)

Natural User Interfaces in a Nutshel
Natural User Interfaces in a NutshelNatural User Interfaces in a Nutshel
Natural User Interfaces in a Nutshel
 
Continuous and Seamless Applications
Continuous and Seamless ApplicationsContinuous and Seamless Applications
Continuous and Seamless Applications
 
Using Azure for Computationally Intensive Workloads
Using Azure for Computationally Intensive WorkloadsUsing Azure for Computationally Intensive Workloads
Using Azure for Computationally Intensive Workloads
 
NUX Presentation from TechMixer Birmingham 2011
NUX Presentation from TechMixer Birmingham 2011NUX Presentation from TechMixer Birmingham 2011
NUX Presentation from TechMixer Birmingham 2011
 
C# 3.0 and LINQ Tech Talk
C# 3.0 and LINQ Tech TalkC# 3.0 and LINQ Tech Talk
C# 3.0 and LINQ Tech Talk
 
Presentation on Cloud Mashups
Presentation on Cloud MashupsPresentation on Cloud Mashups
Presentation on Cloud Mashups
 
Agile india 2014 Presentation
Agile india 2014 PresentationAgile india 2014 Presentation
Agile india 2014 Presentation
 

Kürzlich hochgeladen

IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 

Kürzlich hochgeladen (9)

IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 

Social Machines