SlideShare ist ein Scribd-Unternehmen logo
1 von 35
The use, disclosure, reproduction, modification, transfer, or transmittal of this work without the written permission of IASA is strictly prohibited. © IASA 2010
A Day in the Life
IASA is
 a non-profit professional association
 run by architects
 for all IT architects
 centrally governed and locally run
 technology and vendor agnostic
The
use, disclosure, reproduction,
modification, transfer, or
transmittal of this work
without the written
permission of IASA is strictly
Topics
 What is Cloud and IoT?
 What is the relationship between Cloud and IoT?
 Where is the „Smart‟ in Smart Cloud and Smart IoT?
 What is valuable about Cloud and IoT?
 How to include smart system thinking into designs
 How to get started with smart tools like inferencing, fuzzy, neural and other
technologies
 When to think smart and when to avoid
 Possible outcomes to strive for today in preparing your architecture for the
age of smart systems.
Cloud and IoT
 ‟
Cloud
 The umbrella term for anything available over a network
 Relevant attributes which typify and classify architectures
include
 Public or private
 Virtualized or non-virtualized
 Service oriented or person oriented
 Hardware oriented or platform oriented or software oriented
 Organizationally oriented or personally oriented
 Secure or unsecure
 Paid or free
 Paid by quality attribute or paid by operational attribute
 Guaranteed or unguaranteed
Internet of Things
 Identifying all physical and virtual objects on a network
 Relevant attributes which will typify and classify architectures
may include
 Type of IoT identity (hardware, network, software, service, invoker,
agent, intelligent agent, independent intelligent agent, provocateur)
 Size or scope of object (molecular -> planetary)
 Data type/volume consumption/production
 Power consumption/production
 Location and Mobility
 Object interaction power in virtual, physical or both
 Intention and Autonomy
Proposed Hierarchy of IoT Identities
 Provocateur - Intelligent agent with intention (human level)
 Independent Intelligent Agent - Intelligent agent acting without permission
 Intelligent Agent – Agent with a degree of reasoning capacity
 Agent – Invoker which changes addresses in some way
 Invoker – Service which calls other services
 Service – Software object which returns a complex response
 Software – Network object which returns a simple response
 Network – An object which is addressable over a network
 Hardware – An object which is identifiable over a network
Concepts and Relationships
 Cloud is the raw network access mechanism
 IoT is the type of things accessible
 Understanding these relationships requires a much more
sophisticated ontology and series of reference points
Google Acquires
Deep Mind
Why Is Smart Required for IoT and
Cloud?
How is Smart Implemented Now
 Advanced Search – Genetic, Graph Theory
 Inferencing (Deductive, Inductive)
 Fuzzy Reasoning
 Optimization
 Learning
 Interpreting and Language
 Negotiation
Searching for Information
 Our lives and companies are run with information
 Information has to be constructed from data and context
 There is more data and information in the world than we can
process
 Intelligent search is key to our ability to make use of information
 Common applications: business intelligence, lifestyle
optimization, interest optimization
The Rules We Live By
 Most companies have large numbers of commonly modified
rules
 Inferencing allows us to
 deduce new information within context (forward-chaining)
 induce information from existing data (backward-chaining)
 Common Applications: Insurance rates and converage, retail
pricing and discounts, purchase decisions, lifestyle choices
 “If the train is late let me sleep in”
Fuzzy Reasoning and Controllers
 Humans and business work on „fuzzy definitions‟ which is
simply that most things are both true and not true
 “It is cold in Sweden” may be true to a Texan but not an Eskimo!
 “A cup is also a bowl” can be more or less true
 “That hotel is extremely expensive” for me but Bill Gates?
 Allows our devices to be more precise and selective in decision
making and reasoning
 “Pre-heat the car when it is very cold”
 “We buy very high quality business supplies”
 Common Applications: Energy utilization, mechanical
controllers, human definitional input
Optimization
 Business processes, graph navigation, optimal path
traversal, and business integration all involve process
optimizations
 Multi-processes integration beyond the simplicity of a single
service (physical or virtual) control much of our lives
 Utilization of embedded process engines and optimization
allows for maximum flexibility of physical and virtual agents
 Common Applications: multi-partner business
transactions, automated delivery systems, personal travel
itineraries, multi-device automation
Learning
 More and more data and choice is available to system software
 As automation and autonomy become ubiquitous training in
desired outcomes is necessary for personal and business
 The vast amount of data and information requires
grouping, characterizing and classifying
 Neural networks and decision trees
 Common applications: Food, travel and personal
preferences, natural language processing, optimal energy
input/output, security threat detection
Thing to Thing Communication
 Language, dialect, grammar, vocabulary and pronunciation are
all relevant in IoT communications and configuration
 Knowledge and language ontology and dictionary will be
essential to self-configuration (and therefore adoption)
 This may be the single most difficult task in the IoT
 Even humans struggle with this constantly
 „Molecular‟ data element combinations are not solidified (what is an
address, a name, a birthday)
 Common applications: Thing configuration and communication,
business analytics, service orchestration, personal identity
management (pay for use)
Negotiation
 As systems begin to represent us there is more and more
conflict
 “What is the best price we can get for pencils for employees”
 Using negotiation techniques to avoid conflict with game theory
 Common applications: Device resource allocation and
utilization, purchasing
Considering Value and Risk
 Value to Who?
 Individuals
 Governments and NGOs
 Vendors and Service
Integrators
 For Profit – non-vendor
 What type of Value
 Lifestyle|Social Value
 Financial Value
 Customer|Operational
Value
 Societal|Human Value
 Risk to Who?
 Individual
 Corporation
 Governments
 What type of Risk?
 Physical
 Financial
 Societal
How Smart Becomes Value
 There is a world of „new‟ objects to sell to the world
 There is an unlimited number of ways to incorporate new
inventions into multiple channels, services and „products‟
 Learning about your customers and partners
 Dynamically allocating resources and processes
 Optimized pathing
 Planning and forecasting
 Configuration management and ease of use
 Human interaction and reasoning
Architecture Value
• Profitability
• Constituent Value
• Reuse
• Grow Market Size
• Grow Market Quality
What is “creates value”?
What is Good?
suitable or efficient for a purpose
beneficial or advantageous
Value Questions
 Financial Value
 How do our customers buy from us?
 When does a person „have‟ to be involved?
 How do our partners supply us?
 When do our customers have to think?
 When do our employees have to use a best guess or experience?
 Are there times we „diagnose‟ a problem?
 How can our systems interact on long-lasting complex transactions?
What does Smart Mean Tomorrow
 We must begin to consider systems as more than software
services
 Autonomy – the degree to which systems can act without
permission
 Power (to influence) – the amount of influence or size of outcomes a
system can achieve
 Resources (to command and use) – the size and makeup of objects
a system may use
 Motivation – as systems gain more power and autonomy we will
need to understand
 Combat – when systems with autonomy, power and resources
disagree about outcomes
Resources
 Books
 Designing the Internet of Things
 Practical Artificial Intelligence Programming with Java
 Rethinking the Internet of Things
 IoT – Global Technological and Societal Trends
 Tools/Frameworks
 Drools
 Weka
 JFuzzyLogic
 Fuzzylite
 Gambit
Skill Taxonomy
The use, disclosure, reproduction, modification, transfer, or transmittal of this work without the
written permission of IASA is strictly prohibited. © IASA 2009
Questions

Weitere ähnliche Inhalte

Was ist angesagt?

KM - Cognitive Computing overview by Ken Martin 13Apr2016
KM - Cognitive Computing overview by Ken Martin 13Apr2016KM - Cognitive Computing overview by Ken Martin 13Apr2016
KM - Cognitive Computing overview by Ken Martin 13Apr2016
HCL Technologies
 

Was ist angesagt? (20)

KM - Cognitive Computing overview by Ken Martin 13Apr2016
KM - Cognitive Computing overview by Ken Martin 13Apr2016KM - Cognitive Computing overview by Ken Martin 13Apr2016
KM - Cognitive Computing overview by Ken Martin 13Apr2016
 
Gene Villeneuve - Moving from descriptive to cognitive analytics
Gene Villeneuve - Moving from descriptive to cognitive analyticsGene Villeneuve - Moving from descriptive to cognitive analytics
Gene Villeneuve - Moving from descriptive to cognitive analytics
 
Ai in compliance
Ai in compliance Ai in compliance
Ai in compliance
 
Deploying AI Applications in Enterprises
Deploying AI Applications in EnterprisesDeploying AI Applications in Enterprises
Deploying AI Applications in Enterprises
 
Cognitive Assistants - Opportunities and Challenges - slides
Cognitive Assistants - Opportunities and Challenges - slidesCognitive Assistants - Opportunities and Challenges - slides
Cognitive Assistants - Opportunities and Challenges - slides
 
Machine learning in Banks
Machine learning in BanksMachine learning in Banks
Machine learning in Banks
 
Cognitive assistance at work
Cognitive assistance at workCognitive assistance at work
Cognitive assistance at work
 
Leading the Future
Leading the FutureLeading the Future
Leading the Future
 
Cognitive Work Assistants - Vision and Open Challenges
Cognitive Work Assistants - Vision and Open ChallengesCognitive Work Assistants - Vision and Open Challenges
Cognitive Work Assistants - Vision and Open Challenges
 
My Research through a BPM Lense
My Research through a BPM LenseMy Research through a BPM Lense
My Research through a BPM Lense
 
Gamifying Strategy - Enterprise AI use cases on agent-based simulation and re...
Gamifying Strategy - Enterprise AI use cases on agent-based simulation and re...Gamifying Strategy - Enterprise AI use cases on agent-based simulation and re...
Gamifying Strategy - Enterprise AI use cases on agent-based simulation and re...
 
Impact of AI on Business Intelligence
Impact of AI on Business IntelligenceImpact of AI on Business Intelligence
Impact of AI on Business Intelligence
 
Cognitive computing in Insurance
Cognitive computing in InsuranceCognitive computing in Insurance
Cognitive computing in Insurance
 
AntWorks Corporate Credentials
AntWorks Corporate CredentialsAntWorks Corporate Credentials
AntWorks Corporate Credentials
 
Ai - Artificial Intelligence predictions-2018-report - PWC
Ai - Artificial Intelligence predictions-2018-report - PWCAi - Artificial Intelligence predictions-2018-report - PWC
Ai - Artificial Intelligence predictions-2018-report - PWC
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Conversational AI versus AI Data Science
Conversational AI versus AI Data ScienceConversational AI versus AI Data Science
Conversational AI versus AI Data Science
 
Defeating online fraud and abuse – Continuous Intelligence in action
Defeating online fraud and abuse – Continuous Intelligence in actionDefeating online fraud and abuse – Continuous Intelligence in action
Defeating online fraud and abuse – Continuous Intelligence in action
 
Corporate Presentation
Corporate PresentationCorporate Presentation
Corporate Presentation
 
CORPORATE CREDENTIALS
CORPORATE CREDENTIALSCORPORATE CREDENTIALS
CORPORATE CREDENTIALS
 

Andere mochten auch

Agile architecture
Agile architectureAgile architecture
Agile architecture
Paul Preiss
 
Software Requirements Engineering Methodologies
Software Requirements Engineering MethodologiesSoftware Requirements Engineering Methodologies
Software Requirements Engineering Methodologies
Kiran Munir
 
All about ISO/IEC/IEEE 42010 (r5)
All about ISO/IEC/IEEE 42010 (r5)All about ISO/IEC/IEEE 42010 (r5)
All about ISO/IEC/IEEE 42010 (r5)
Rich Hilliard
 

Andere mochten auch (20)

Agile architecture
Agile architectureAgile architecture
Agile architecture
 
Enterprise Architecture Primer
Enterprise Architecture PrimerEnterprise Architecture Primer
Enterprise Architecture Primer
 
Integrated Requirements Management with Serena Dimensions RM 02-2016
Integrated Requirements Management with Serena Dimensions RM 02-2016Integrated Requirements Management with Serena Dimensions RM 02-2016
Integrated Requirements Management with Serena Dimensions RM 02-2016
 
Enterprise Architecture .vs. Collection of Architectures in Enterprise
Enterprise Architecture .vs. Collection of Architectures in EnterpriseEnterprise Architecture .vs. Collection of Architectures in Enterprise
Enterprise Architecture .vs. Collection of Architectures in Enterprise
 
Building Business & IT Architecture Roadmaps with ArchiMate & TOGAF
Building Business & IT Architecture Roadmaps with ArchiMate & TOGAFBuilding Business & IT Architecture Roadmaps with ArchiMate & TOGAF
Building Business & IT Architecture Roadmaps with ArchiMate & TOGAF
 
Business Agility and IT
Business Agility and ITBusiness Agility and IT
Business Agility and IT
 
Architecture and Iasa Introduction
Architecture and Iasa IntroductionArchitecture and Iasa Introduction
Architecture and Iasa Introduction
 
IASA Architecture Pillars - Quality Attributes
IASA Architecture Pillars - Quality AttributesIASA Architecture Pillars - Quality Attributes
IASA Architecture Pillars - Quality Attributes
 
Software Requirements Engineering Methodologies
Software Requirements Engineering MethodologiesSoftware Requirements Engineering Methodologies
Software Requirements Engineering Methodologies
 
SOA for Enterprise Architecture
SOA for Enterprise ArchitectureSOA for Enterprise Architecture
SOA for Enterprise Architecture
 
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFPractical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
 
All about ISO/IEC/IEEE 42010 (r5)
All about ISO/IEC/IEEE 42010 (r5)All about ISO/IEC/IEEE 42010 (r5)
All about ISO/IEC/IEEE 42010 (r5)
 
Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1
 
The Government of New Brunswick Enterprise Architecture Roadmap
The Government of New Brunswick Enterprise Architecture RoadmapThe Government of New Brunswick Enterprise Architecture Roadmap
The Government of New Brunswick Enterprise Architecture Roadmap
 
Usability Engineering
Usability EngineeringUsability Engineering
Usability Engineering
 
Software Architecture Views and Viewpoints
Software Architecture Views and ViewpointsSoftware Architecture Views and Viewpoints
Software Architecture Views and Viewpoints
 
SAP solutions for government contracting in Aerpspace & Defense
SAP solutions for government contracting in Aerpspace & DefenseSAP solutions for government contracting in Aerpspace & Defense
SAP solutions for government contracting in Aerpspace & Defense
 
Requirements Management
Requirements ManagementRequirements Management
Requirements Management
 
Cloud Computing for Enterprise Architects
Cloud Computing for Enterprise ArchitectsCloud Computing for Enterprise Architects
Cloud Computing for Enterprise Architects
 
Enterprise Architecture & IT standards
Enterprise Architecture &  IT standardsEnterprise Architecture &  IT standards
Enterprise Architecture & IT standards
 

Ähnlich wie The Future for Smart Technology Architects

Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...
Denodo
 
Digital Transformation Strategy
Digital Transformation StrategyDigital Transformation Strategy
Digital Transformation Strategy
James Woolwine
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
Patricia M Watson
 

Ähnlich wie The Future for Smart Technology Architects (20)

Evanta 2018 msp big 3 tech
Evanta 2018 msp big 3 techEvanta 2018 msp big 3 tech
Evanta 2018 msp big 3 tech
 
Artificial Intelligence disruption: How technologies are predicted to change ...
Artificial Intelligence disruption: How technologies are predicted to change ...Artificial Intelligence disruption: How technologies are predicted to change ...
Artificial Intelligence disruption: How technologies are predicted to change ...
 
AI in Talent Acquisition - Talent Connect 2017
AI in Talent Acquisition - Talent Connect 2017AI in Talent Acquisition - Talent Connect 2017
AI in Talent Acquisition - Talent Connect 2017
 
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...
 
Digital Transformation Major tech trends through the customer lens and relati...
Digital Transformation Major tech trends through the customer lens and relati...Digital Transformation Major tech trends through the customer lens and relati...
Digital Transformation Major tech trends through the customer lens and relati...
 
Emergingtreands class11 cs
Emergingtreands class11 csEmergingtreands class11 cs
Emergingtreands class11 cs
 
IoT Standards: The Next Generation
IoT Standards: The Next GenerationIoT Standards: The Next Generation
IoT Standards: The Next Generation
 
Internet of Things - Benefits for the Ummah
Internet of Things - Benefits for the UmmahInternet of Things - Benefits for the Ummah
Internet of Things - Benefits for the Ummah
 
Digital Transformation Strategy
Digital Transformation StrategyDigital Transformation Strategy
Digital Transformation Strategy
 
How AI and Machine Learning can Transform Organizations
How AI and Machine Learning can Transform OrganizationsHow AI and Machine Learning can Transform Organizations
How AI and Machine Learning can Transform Organizations
 
QAI brochure
QAI brochureQAI brochure
QAI brochure
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
 
Down to Business: Taking Action Quickly with Linked Data Services
Down to Business: Taking Action Quickly with Linked Data ServicesDown to Business: Taking Action Quickly with Linked Data Services
Down to Business: Taking Action Quickly with Linked Data Services
 
UU innovation masters november 2010
UU innovation masters november 2010UU innovation masters november 2010
UU innovation masters november 2010
 
Atos Consulting World Class IT Perspectives Technology Trends
Atos Consulting World Class IT Perspectives Technology TrendsAtos Consulting World Class IT Perspectives Technology Trends
Atos Consulting World Class IT Perspectives Technology Trends
 
Cloud Computing and CDO (April 29).pdf
 Cloud Computing and CDO (April 29).pdf Cloud Computing and CDO (April 29).pdf
Cloud Computing and CDO (April 29).pdf
 
Smart applications smart platforms, security, processes and interactions
Smart applications   smart platforms, security, processes and interactionsSmart applications   smart platforms, security, processes and interactions
Smart applications smart platforms, security, processes and interactions
 
Contextual intelligence
Contextual intelligenceContextual intelligence
Contextual intelligence
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

The Future for Smart Technology Architects

  • 1. The use, disclosure, reproduction, modification, transfer, or transmittal of this work without the written permission of IASA is strictly prohibited. © IASA 2010
  • 2. A Day in the Life
  • 3. IASA is  a non-profit professional association  run by architects  for all IT architects  centrally governed and locally run  technology and vendor agnostic The use, disclosure, reproduction, modification, transfer, or transmittal of this work without the written permission of IASA is strictly
  • 4. Topics  What is Cloud and IoT?  What is the relationship between Cloud and IoT?  Where is the „Smart‟ in Smart Cloud and Smart IoT?  What is valuable about Cloud and IoT?  How to include smart system thinking into designs  How to get started with smart tools like inferencing, fuzzy, neural and other technologies  When to think smart and when to avoid  Possible outcomes to strive for today in preparing your architecture for the age of smart systems.
  • 6. Cloud  The umbrella term for anything available over a network  Relevant attributes which typify and classify architectures include  Public or private  Virtualized or non-virtualized  Service oriented or person oriented  Hardware oriented or platform oriented or software oriented  Organizationally oriented or personally oriented  Secure or unsecure  Paid or free  Paid by quality attribute or paid by operational attribute  Guaranteed or unguaranteed
  • 7. Internet of Things  Identifying all physical and virtual objects on a network  Relevant attributes which will typify and classify architectures may include  Type of IoT identity (hardware, network, software, service, invoker, agent, intelligent agent, independent intelligent agent, provocateur)  Size or scope of object (molecular -> planetary)  Data type/volume consumption/production  Power consumption/production  Location and Mobility  Object interaction power in virtual, physical or both  Intention and Autonomy
  • 8. Proposed Hierarchy of IoT Identities  Provocateur - Intelligent agent with intention (human level)  Independent Intelligent Agent - Intelligent agent acting without permission  Intelligent Agent – Agent with a degree of reasoning capacity  Agent – Invoker which changes addresses in some way  Invoker – Service which calls other services  Service – Software object which returns a complex response  Software – Network object which returns a simple response  Network – An object which is addressable over a network  Hardware – An object which is identifiable over a network
  • 9. Concepts and Relationships  Cloud is the raw network access mechanism  IoT is the type of things accessible  Understanding these relationships requires a much more sophisticated ontology and series of reference points
  • 11. Why Is Smart Required for IoT and Cloud?
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. How is Smart Implemented Now  Advanced Search – Genetic, Graph Theory  Inferencing (Deductive, Inductive)  Fuzzy Reasoning  Optimization  Learning  Interpreting and Language  Negotiation
  • 18. Searching for Information  Our lives and companies are run with information  Information has to be constructed from data and context  There is more data and information in the world than we can process  Intelligent search is key to our ability to make use of information  Common applications: business intelligence, lifestyle optimization, interest optimization
  • 19. The Rules We Live By  Most companies have large numbers of commonly modified rules  Inferencing allows us to  deduce new information within context (forward-chaining)  induce information from existing data (backward-chaining)  Common Applications: Insurance rates and converage, retail pricing and discounts, purchase decisions, lifestyle choices  “If the train is late let me sleep in”
  • 20. Fuzzy Reasoning and Controllers  Humans and business work on „fuzzy definitions‟ which is simply that most things are both true and not true  “It is cold in Sweden” may be true to a Texan but not an Eskimo!  “A cup is also a bowl” can be more or less true  “That hotel is extremely expensive” for me but Bill Gates?  Allows our devices to be more precise and selective in decision making and reasoning  “Pre-heat the car when it is very cold”  “We buy very high quality business supplies”  Common Applications: Energy utilization, mechanical controllers, human definitional input
  • 21. Optimization  Business processes, graph navigation, optimal path traversal, and business integration all involve process optimizations  Multi-processes integration beyond the simplicity of a single service (physical or virtual) control much of our lives  Utilization of embedded process engines and optimization allows for maximum flexibility of physical and virtual agents  Common Applications: multi-partner business transactions, automated delivery systems, personal travel itineraries, multi-device automation
  • 22. Learning  More and more data and choice is available to system software  As automation and autonomy become ubiquitous training in desired outcomes is necessary for personal and business  The vast amount of data and information requires grouping, characterizing and classifying  Neural networks and decision trees  Common applications: Food, travel and personal preferences, natural language processing, optimal energy input/output, security threat detection
  • 23. Thing to Thing Communication  Language, dialect, grammar, vocabulary and pronunciation are all relevant in IoT communications and configuration  Knowledge and language ontology and dictionary will be essential to self-configuration (and therefore adoption)  This may be the single most difficult task in the IoT  Even humans struggle with this constantly  „Molecular‟ data element combinations are not solidified (what is an address, a name, a birthday)  Common applications: Thing configuration and communication, business analytics, service orchestration, personal identity management (pay for use)
  • 24. Negotiation  As systems begin to represent us there is more and more conflict  “What is the best price we can get for pencils for employees”  Using negotiation techniques to avoid conflict with game theory  Common applications: Device resource allocation and utilization, purchasing
  • 25. Considering Value and Risk  Value to Who?  Individuals  Governments and NGOs  Vendors and Service Integrators  For Profit – non-vendor  What type of Value  Lifestyle|Social Value  Financial Value  Customer|Operational Value  Societal|Human Value  Risk to Who?  Individual  Corporation  Governments  What type of Risk?  Physical  Financial  Societal
  • 26. How Smart Becomes Value  There is a world of „new‟ objects to sell to the world  There is an unlimited number of ways to incorporate new inventions into multiple channels, services and „products‟  Learning about your customers and partners  Dynamically allocating resources and processes  Optimized pathing  Planning and forecasting  Configuration management and ease of use  Human interaction and reasoning
  • 27. Architecture Value • Profitability • Constituent Value • Reuse • Grow Market Size • Grow Market Quality
  • 28. What is “creates value”? What is Good? suitable or efficient for a purpose beneficial or advantageous
  • 29.
  • 30. Value Questions  Financial Value  How do our customers buy from us?  When does a person „have‟ to be involved?  How do our partners supply us?  When do our customers have to think?  When do our employees have to use a best guess or experience?  Are there times we „diagnose‟ a problem?  How can our systems interact on long-lasting complex transactions?
  • 31. What does Smart Mean Tomorrow  We must begin to consider systems as more than software services  Autonomy – the degree to which systems can act without permission  Power (to influence) – the amount of influence or size of outcomes a system can achieve  Resources (to command and use) – the size and makeup of objects a system may use  Motivation – as systems gain more power and autonomy we will need to understand  Combat – when systems with autonomy, power and resources disagree about outcomes
  • 32. Resources  Books  Designing the Internet of Things  Practical Artificial Intelligence Programming with Java  Rethinking the Internet of Things  IoT – Global Technological and Societal Trends  Tools/Frameworks  Drools  Weka  JFuzzyLogic  Fuzzylite  Gambit
  • 33. Skill Taxonomy The use, disclosure, reproduction, modification, transfer, or transmittal of this work without the written permission of IASA is strictly prohibited. © IASA 2009
  • 34.

Hinweis der Redaktion

  1. Designing the Internet of Things by Adrian McEwen & Hakim CassimallyWake late – alarm has checked train scheduleTablet blinking on bottle lights for reminder mails doctorUmbrella lit up going to rainAt station phone notifies familyTraining shoes update cloud application and doctorIntegrates with online shopping to map calories
  2. We want people to be here
  3. Everything will have identity whether simple or complex‘who is my phone’ Everything will be able to act physically or virtually or both‘what can my phone do’Everything will be able to act dependently or independently or both‘what can my phone do with permission or without it’Everything will have more or less responsibility for everything it interacts with‘what does my phone do to other devices|people|systems
  4. Volumes of data require more advanced searching, analysis and transformation techniques
  5. Automation and availability of physical and virtual services require significantly complex process orchestration and optimization
  6. Competitive advantage in business will continue to require more awareness and ability within smaller opportunities
  7. All businesses of all sizes are technology businesses
  8. Both human and non-human provocateurs will take advantage of less sophisticated provocateurs
  9. ProfitabilityConstituent ValueReuseGrow Market SizeGrow Market Quality
  10. Architects often deal with form and function but they must connect it to something greater.
  11. Iasa Innovation Driven Programs