SlideShare a Scribd company logo
What do we need to
make the Internet of
Things really happen?
Opher Etzion
Head – Technological Empowerment
Institute (in establishment phases)
opher.etzion@gmail.com
OUTLINE
“Internet of Things” – what is it, what are the
difficulties in making it “Internet”?
What can be done about it? Introducing TEM
How does the “Technological Empowerment
Institute” get into the picture?
The Internet of everything for situation awareness
None of the
authorized drivers
location is near
the car’s location
theft is concluded
Whom to notify;
whether to
activate stopper
Use a built-in car
stopper to slow
the intruder and
dispatch the
security company
A person enters a car
and the car starts
moving;
the person does not
look like one of the
authorized drivers
Such applications
become possible
since everything is
connected
Anatomy of situation awareness system
Becoming aware of an event and then doing something about it.
Derive
Mechanisms
Single Event
Multiple
Events
Ancillary
Info
May need
multiple iterations
May require addition
reference / state
information
Something we
want to react
to
A Situation
Detect
Mechanism
Feedback
Events
Decide
Mechanism
Do
Mechanism
Event
of
Interest
Order
Should be
indicating
Entity State
Change
Should be
indicating
Decisions
Derived Event Trigger
sensors
Actuators
4
Does the “Internet of everything” really exhibit the benefits of the
Internet?
The success of the Internet is attributed to its relative
simplicity
 to connect
 to create content
 to search
Imagine that any search in the
Internet would have been done
using SQL queries…
How pervasive do you think the
Internet would have been?
For situational awareness….
we are not even in the SQL era
Event
Patterns
Listing 1.1 Example of the MonitorScript event programming language from Apama
if isAuto then {
DeliveryBid db;
on DeliveryBid(store=dr.store):db within(ASSIGNMENT_TIME){ #1
assignmentTimer.quit();
route Assignment(dr.requestId, #2
dr.store,
db.driver,
dr.addresseeLocationPointX,
dr.addresseeLocationPointY,
db.committedPickUpTime,
dr.requiredDeliveryTime);
watchForPickUp(dr, db.driver, db.committedPickUpTime);
watchForDelivery(dr, db.driver);
}
}
Most of the event-based
programming today is still ad-
hoc and hand-coded;
existing languages are rather
low level
“There is no Internet of Things yet”
While people typically are event-driven we tend to
think about computerized systems in request
driven way
Searching the web, database queries, use
of web services, use of mobile
applications
Difficulties in the way that most people would
approach it The event-driven vs.
request-driven nature
Effectiveness and
Efficiency issues
The temporal
oriented behavior
The hidden state
handling
The vision for Internet of Things
Shift governance from the programmer to the knowledge worker or customer
Governance occurs
through development
and maintenance of
program code
Governance occurs
through development
and maintenance of
event models
TODAY TOMORROW
CODE LEVEL
The basic requirements of event modeling
4. Automatic
translation to
code in regular
or specific
engine
language
3. Free of
implementation
assumptions
1. Rigorous
verifiable
structure
2. Represented
as a collection of
tables
The Internet of Things and some introduction to the Technological Empowerment Institute
The Internet of Things and some introduction to the Technological Empowerment Institute
Eliminating noise from the model
Current models are close to the
implementation models – and from pure
logic view contain “noise”.
Bringing data from current state
Query Enrichment
Inclusion in
events
Examples:
Determine what food-type
the container carries
Fetch the temperature
regulations for a specific
food type
Other noise : workarounds
The Technological Empowerment Institute in a
nutshell
Empowerment of people:
empowerment of wellness and quality
of life of people within developing
areas, such as: elderly people.
Empowerment of business: typical for
developing areas such as agriculture,
food industry, and small
manufactures.
Empowerment of opportunities:
Empowerment of R&D and education
in developing areas by creating R&D
partnerships and enhance education
systems in various levels.
Smart sensor-based system for situation awareness is
the means to empower.
The means – three legs
The multi-disciplinary research leg:
world class excellence center around smart systems –
with researchers cover the technology aspect, the
human aspect, and the different domains aspect
The implementation leg:
Partnership between academic institutes that will carry
out students' projects, the high-tech industry that
will contribute platforms and products, domain
experts, and potential customers
The education leg:
employ dedicated curriculum of courses in the
undergraduate level, focused graduate program,
second chance education for degree holders, and
education for the community. It will aid to establish
similar programs in developing areas.
Example of some target applications
Assistance for elderly or disabled people in independent living by
situational awareness that may alert them (e.g. to take
medications), alert their families, or alert healthcare staff. A
family or caretaker will be able to personalize the alerts to an
individual patient.
Monitoring of vibrations, strokes, container openings or cold
chain maintenance to improve quality of deliveries over the
supply chain
Control of humidity and temperature levels in alfalfa, hay, straw,
etc. to prevent fungus and other microbial contaminants
Monitoring of water quality and leaks
OUR DRIVING FORCE IS TO
HELP
EVERYBODY REALIZE THE
POWER OF EVENTS TO
CREATE A BETTER WORLD
For more details:
opher.etzion@gmail.com

More Related Content

PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PPTX
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
PPTX
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PPTX
PACE-IT, Security+2.9: Goals of Security Controls
PPTX
PACE-IT, Security+2.8: Risk Management Best Practices
PPTX
PACE-IT, Security+ 2.5: Incident Response Concepts
PDF
An Introduction to creative event management
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+2.9: Goals of Security Controls
PACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT, Security+ 2.5: Incident Response Concepts
An Introduction to creative event management

Viewers also liked (13)

PPT
Risk Management for events: an introduction
PPTX
Online event management system
PPTX
Introduction to Events Management
PDF
Microsoft Project Beginners Workshop
PPTX
Introduction to events management
PPTX
Project Management Through Gantt & Pert Chart
PPTX
PPTX
Ms project 2016 overview
PPT
Event Management
KEY
Event planning powerpoint
PPTX
Event Management
PPT
Event management
PDF
PMP Chap 7 - Project Cost Management - Part 1
Risk Management for events: an introduction
Online event management system
Introduction to Events Management
Microsoft Project Beginners Workshop
Introduction to events management
Project Management Through Gantt & Pert Chart
Ms project 2016 overview
Event Management
Event planning powerpoint
Event Management
Event management
PMP Chap 7 - Project Cost Management - Part 1
Ad

Similar to The Internet of Things and some introduction to the Technological Empowerment Institute (20)

PPT
Activity Streaming as Information X-Docking
PDF
Proposed high level solutions to counter online examination fraud using digit...
PPT
Information Leakage - A knowledge Based Approach
PDF
How Reunification Software and Student Dismissal Managers Strengthen School C...
PDF
003 P1 Friends Essay Thatsnotus. Online assignment writing service.
PDF
Women's Maltreatment Redressal System based on Machine Learning Techniques
PDF
Securing And Protecting Information
PDF
Management And Business
PPSX
GCR Digital Transformation for Solutions for Education
PDF
According To The Author Of “Build A Streamlined Refinery”,
PDF
eTracemate
DOCX
Module 02 Performance Risk-based Analytics With all the advancem
DOCX
Replies Required for below Posting 1 user security awarene.docx
PPTX
Future IT Trends Talk @Stanford OIT 554 Class - Guest Speaker - 3.7.17
PPT
Adding Rules to Improve Flexibility and Effectively Manage Complex Events
PDF
10.1.1.436.3364.pdf
PDF
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
PDF
Final Year Projects Computer Science (Information security) -2015
PDF
The Critical Role of Spatial Data in Today's Data Ecosystem
PDF
Wfh remote access tips
Activity Streaming as Information X-Docking
Proposed high level solutions to counter online examination fraud using digit...
Information Leakage - A knowledge Based Approach
How Reunification Software and Student Dismissal Managers Strengthen School C...
003 P1 Friends Essay Thatsnotus. Online assignment writing service.
Women's Maltreatment Redressal System based on Machine Learning Techniques
Securing And Protecting Information
Management And Business
GCR Digital Transformation for Solutions for Education
According To The Author Of “Build A Streamlined Refinery”,
eTracemate
Module 02 Performance Risk-based Analytics With all the advancem
Replies Required for below Posting 1 user security awarene.docx
Future IT Trends Talk @Stanford OIT 554 Class - Guest Speaker - 3.7.17
Adding Rules to Improve Flexibility and Effectively Manage Complex Events
10.1.1.436.3364.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
Final Year Projects Computer Science (Information security) -2015
The Critical Role of Spatial Data in Today's Data Ecosystem
Wfh remote access tips
Ad

More from Opher Etzion (20)

PPTX
DEBS 2019 tutorial : correctness and consistency of event-based systems
PPTX
Sw architectures 2018 on microservices and eda
PPTX
ER 2017 tutorial - On Paradoxes, Autonomous Systems and dilemmas
PPTX
Event processing within the human body - Tutorial
PPTX
DEBS 2015 tutorial When Artificial Intelligence meets the Internet of Things
PPTX
Dynamic stories
PPTX
Has Internet of Things really happened?
PPTX
On the personalization of event-based systems
PPTX
On Internet of Everything and Personalization. Talk in INTEROP 2014
PPTX
Introduction to the institute of technological empowerment
PPTX
DEBS 2014 tutorial on the Internet of Everything.
PPTX
ER 2013 tutorial: modeling the event driven world
PPTX
Event semantics and model - multimedia events workshop
PDF
Debs 2013 tutorial : Why is event-driven thinking different from traditional ...
PPT
Debs 2012 gong show immortality
PPT
Debs 2012 basic proactive
PDF
Debs 2012 uncertainty tutorial
PPT
Proactive eth talk
PPT
Aaai 2011 event processing tutorial
PPT
Debs 2011 pattern rewritingforeventprocessingoptimization
DEBS 2019 tutorial : correctness and consistency of event-based systems
Sw architectures 2018 on microservices and eda
ER 2017 tutorial - On Paradoxes, Autonomous Systems and dilemmas
Event processing within the human body - Tutorial
DEBS 2015 tutorial When Artificial Intelligence meets the Internet of Things
Dynamic stories
Has Internet of Things really happened?
On the personalization of event-based systems
On Internet of Everything and Personalization. Talk in INTEROP 2014
Introduction to the institute of technological empowerment
DEBS 2014 tutorial on the Internet of Everything.
ER 2013 tutorial: modeling the event driven world
Event semantics and model - multimedia events workshop
Debs 2013 tutorial : Why is event-driven thinking different from traditional ...
Debs 2012 gong show immortality
Debs 2012 basic proactive
Debs 2012 uncertainty tutorial
Proactive eth talk
Aaai 2011 event processing tutorial
Debs 2011 pattern rewritingforeventprocessingoptimization

The Internet of Things and some introduction to the Technological Empowerment Institute

  • 1. What do we need to make the Internet of Things really happen? Opher Etzion Head – Technological Empowerment Institute (in establishment phases) opher.etzion@gmail.com
  • 2. OUTLINE “Internet of Things” – what is it, what are the difficulties in making it “Internet”? What can be done about it? Introducing TEM How does the “Technological Empowerment Institute” get into the picture?
  • 3. The Internet of everything for situation awareness None of the authorized drivers location is near the car’s location theft is concluded Whom to notify; whether to activate stopper Use a built-in car stopper to slow the intruder and dispatch the security company A person enters a car and the car starts moving; the person does not look like one of the authorized drivers Such applications become possible since everything is connected
  • 4. Anatomy of situation awareness system Becoming aware of an event and then doing something about it. Derive Mechanisms Single Event Multiple Events Ancillary Info May need multiple iterations May require addition reference / state information Something we want to react to A Situation Detect Mechanism Feedback Events Decide Mechanism Do Mechanism Event of Interest Order Should be indicating Entity State Change Should be indicating Decisions Derived Event Trigger sensors Actuators 4
  • 5. Does the “Internet of everything” really exhibit the benefits of the Internet? The success of the Internet is attributed to its relative simplicity  to connect  to create content  to search Imagine that any search in the Internet would have been done using SQL queries… How pervasive do you think the Internet would have been?
  • 6. For situational awareness…. we are not even in the SQL era Event Patterns Listing 1.1 Example of the MonitorScript event programming language from Apama if isAuto then { DeliveryBid db; on DeliveryBid(store=dr.store):db within(ASSIGNMENT_TIME){ #1 assignmentTimer.quit(); route Assignment(dr.requestId, #2 dr.store, db.driver, dr.addresseeLocationPointX, dr.addresseeLocationPointY, db.committedPickUpTime, dr.requiredDeliveryTime); watchForPickUp(dr, db.driver, db.committedPickUpTime); watchForDelivery(dr, db.driver); } } Most of the event-based programming today is still ad- hoc and hand-coded; existing languages are rather low level
  • 7. “There is no Internet of Things yet”
  • 8. While people typically are event-driven we tend to think about computerized systems in request driven way Searching the web, database queries, use of web services, use of mobile applications
  • 9. Difficulties in the way that most people would approach it The event-driven vs. request-driven nature Effectiveness and Efficiency issues The temporal oriented behavior The hidden state handling
  • 10. The vision for Internet of Things Shift governance from the programmer to the knowledge worker or customer Governance occurs through development and maintenance of program code Governance occurs through development and maintenance of event models TODAY TOMORROW CODE LEVEL
  • 11. The basic requirements of event modeling 4. Automatic translation to code in regular or specific engine language 3. Free of implementation assumptions 1. Rigorous verifiable structure 2. Represented as a collection of tables
  • 14. Eliminating noise from the model Current models are close to the implementation models – and from pure logic view contain “noise”. Bringing data from current state Query Enrichment Inclusion in events Examples: Determine what food-type the container carries Fetch the temperature regulations for a specific food type Other noise : workarounds
  • 15. The Technological Empowerment Institute in a nutshell Empowerment of people: empowerment of wellness and quality of life of people within developing areas, such as: elderly people. Empowerment of business: typical for developing areas such as agriculture, food industry, and small manufactures. Empowerment of opportunities: Empowerment of R&D and education in developing areas by creating R&D partnerships and enhance education systems in various levels. Smart sensor-based system for situation awareness is the means to empower.
  • 16. The means – three legs The multi-disciplinary research leg: world class excellence center around smart systems – with researchers cover the technology aspect, the human aspect, and the different domains aspect The implementation leg: Partnership between academic institutes that will carry out students' projects, the high-tech industry that will contribute platforms and products, domain experts, and potential customers The education leg: employ dedicated curriculum of courses in the undergraduate level, focused graduate program, second chance education for degree holders, and education for the community. It will aid to establish similar programs in developing areas.
  • 17. Example of some target applications Assistance for elderly or disabled people in independent living by situational awareness that may alert them (e.g. to take medications), alert their families, or alert healthcare staff. A family or caretaker will be able to personalize the alerts to an individual patient. Monitoring of vibrations, strokes, container openings or cold chain maintenance to improve quality of deliveries over the supply chain Control of humidity and temperature levels in alfalfa, hay, straw, etc. to prevent fungus and other microbial contaminants Monitoring of water quality and leaks
  • 18. OUR DRIVING FORCE IS TO HELP EVERYBODY REALIZE THE POWER OF EVENTS TO CREATE A BETTER WORLD For more details: opher.etzion@gmail.com

Editor's Notes

  • #4: BVH: should the second example say “None of the authorized drivers for this car is in the car.” (Doesn’t all/not imply that some may be in it, but that this doesn’t count?)
  • #7: BVH: pre-SQL was procedural, which included loops (e.g., Get Next within Parent until GE status code), Go To, structured programming to avoid Go Tos, difficult to understand, even more difficult to manage change over time
  • #9: BVH: so our brains are smarter than our computer systems, imagine that! 
  • #15: BVH: I like the idea of “eliminating noise” Are all of these things noise: bring data, query, enrichment, inclusion in events, and other noise”What do we mean by “noise” – is it implementation details that are not necessary to consider when creating an implementation-independent representation?