SlideShare une entreprise Scribd logo
1  sur  55
Télécharger pour lire hors ligne
Angelo	Corsaro,	PhD	
Chief	Technology	Officer	
angelo.corsaro@prismtech.com
2.0
The Industrial Internet of Things Platform
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiarynews
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
acquires
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
As part of ADLINK will have the the
resources and scale to exploit the full
potential of the Vortex in Industrial IoT
(IIoT) markets.
You will see PrismTech becoming
stronger, larger and able to better
compete globally. 
You will also start to see, later in 2016, new
leading-edge IIoT system products
emerging from the combination of
PrismTech’s software and ADLINK’s
hardware technologies.
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This acquisition reinforces the traction and
relevance of the DDS Standard in IIoT. 
The combination of ADLINK’s and
PrismTech’s strengths offers a
tremendous opportunity to combine
software and hardware into system-level
solutions embracing the edge, mobile,
network and data center.
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryVortex 2.0
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex is a standard technology for
efficient, ubiquitous, interoperable,
secure and platform independent data
sharing across network connected
devices
in151
Characters
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
at a Glance
2.0
Plenty of Vortex Devices
goodies, including new
APIs, new features and
improved performances
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
at a Glance
2.0
More Integration with
analytics, IoT and Web
technologies
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
at a Glance
2.0
Extended and Improved
Tooling for monitoring,
management, testing,
record and playback
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
at a Glance
2.0
Fog Computing Support
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
at a Glance
2.0
Data-Centric Security
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Device
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Updated ISO-C++ with increased usability
and support for C++11 lambdas
Google Protocol Buffer support for topic
type declaration
Full support for coherent-updates
Improved performance and transparent
compression for durable data
6.6.0
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryTopic types can be expressed
using different syntaxes,
including IDL and ProtoBuf
Google
Protocol Buffers
message ShapeType {
option (.omg.dds.type) =
{name: "ShapeType"};
required string color = 0
[(.omg.dds.member).key = true];
required long x = 1;
required long y = 2;
required long shapesize = 3; }
struct ShapeType {
string color;
long x;
long y;
long shapesize; };
#pragma keylist ShapeType color
IDL
ProtoBuf
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
2.0.0
Support for 40+ platforms including
Windows, Linux, MacOS, ElinOS,
VxWorks, and QNX
Updated ISO-C++ with increased usability
and support for C++11 lambdas
Full Durability support including Transient
and Persistent Data
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
2.2.0
Support for Python Scripting (via Jython)
Extended support for X.509 certificates
and CA hierarchies
Extended Unicast-only discovery to
facilitate configuration in non-multicast
enabled environments
Improved throughput
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryIntegration
Native Integration with the
hottest real-time analytics
platforms and CEP Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
Integration with the popular
Node-RED framework
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
Integration with mainstream
Dashboard Technologies
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Fog
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Fog Computing
Vortex naturally fits with the fog
computing paradigm and is the
only fog-ready data-sharing
infrastructure
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
1.3.1
Transparently and dynamically integrates
a Fog subsystems while mediating
transport protocols and isolating
application from dynamics exposed by
different networks
Controls the topic exposed by a Fog
subsystem
Defines a security boundary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
1.3.1
Data leaves a Fog subsystem only if
remote interest is discovered —
through dynamic discovery.
Applications within a Fog cannot tell if
they are communicating with local or
remote applications. These applications
believe that they always communicate
“locally”
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Fog Deployment
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
location
transparency
Cloud Computing
Fog Computing
Device-to-Cloud
Communication
Device-to-Device
Communication
Fog-to-Cloud
Communication
Cloud-to-Cloud
Communication
Device-to-Device
Communication
Collect | Store | Analyse | Share
Collect | Store | Analyse | Share
Fog Computing
Fog Computing
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex device, such as Lite, Café,
and Web are used to share data
between different kinds of
applications within a car
Café and Web are typically used
Android / HTML5 based
infotainment
Lite in typically used in ECU,
sensors and onboard analytics
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex Fog is used to
transparently (for in car apps)
decouple and control the data
sharing within and across the
car
Vortex Fog also helps defining
security boundaries and
policies
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex Fog efficiently and
securely deals with car to car
communication
Vortex Fog allows to
decouple the transport used
for in-car communication
and that used for car-to-car
communication
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex Fog efficiently and
securely deals with cloud
connectivity adapting traffic
flows and protocols
Device-to-Cloud
Communication
Cloud Analytics
Fog Analytics
Fog Analytics
Fog Analytics
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex Cloud efficiently
and securely makes data
available to any device at
an Internet Scale
Cloud Analytics
Fog Analytics
Fog Analytics
Fog Analytics
Device-to-Cloud
Communication
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryData-Centric Security
Secure
Data-Level security with
Pluggable Authentication
Access Control and Crypto
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
Default Plug-ins
X.509 Public Key
Infrastructure (PKI) based
authentication
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
Default Plug-ins
Access Control List
available at a trusted/
authenticated URI
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
Default Plug-ins
Crypto based on TLS
Cipher Suite
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
Secure
Data-Security as opposed
to simply Transport-Level
security
Arthur Dent
Arthur Dent
Ford Prefect
Zaphod Beeblebrox
Marvin
Trillian
left/A(r,w), left/B(r)
left/A(r,w), left/B(r,w), left/X(r)
left/*(r,w)
left/*(r), right/(w)
left/A(r,w), left/B(r,w), right/C(r,w)
Ford Prefect
Zaphod Beeblebrox
Trillian
Marvin
A
B
A,B
X
*
*
A,B,C
Identity Access Rights
Sessions are authenticated
and communication is
encrypted
Only the Topic included as
part of the access rights are
visible and accessible
Secure
Fine-grained access control
over Partition/Topic regular
expressions
Arthur Dent
Arthur Dent
Ford Prefect
Zaphod Beeblebrox
Marvin
Trillian
left/A(r,w), left/B(r)
left/A(r,w), left/B(r,w), left/X(r)
left/*(r,w)
left/*(r), right/(w)
left/A(r,w), left/B(r,w), right/C(r,w)
Ford Prefect
Zaphod Beeblebrox
Trillian
Marvin
A
B
A,B
X
*
*
A,B,C
Identity Access Rights
Sessions are authenticated
and communication is
encrypted
Only the Topic included as
part of the access rights are
visible and accessible
Boundary Security
Boundary security support is
enabled by Vortex-Fog
Device-to-Cloud
Communication
Peer-to-Peer
(Broker-less)
Device-to-Device
Communication
Fog Computing Fog Computing
Fog Computing
TLS
TLS
Access
Control
Boundary Security
Separates security concerns at
different scales and controls
what information is exposed
Device-to-Cloud
Communication
Peer-to-Peer
(Broker-less)
Device-to-Device
Communication
Fog Computing Fog Computing
Fog Computing
TLS
TLS
Access
Control
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Data-Centric Security
Management
&Configuration
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Certificate
Management
Certificate Authority (CA)
hierarchies are supported
to facilitate certificate
management
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Certificate/Key
Management
Tool
Eases the creation of
Certificate Authorities
hierarchies as well as
service and device
certificates
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-to-Cloud
Communication
Peer-to-Peer
(Broker-less)
Device-to-Device
Communication
Fog Computing Fog Computing
Fog Computing
TLS
TLS
Applications belonging to
the same Fog subsystem
share the same identity and
the same access rights
Access
Control
Fog
Access Control
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-to-Cloud
Communication
Peer-to-Peer
(Broker-less)
Device-to-Device
Communication
Fog Computing Fog Computing
Fog Computing
TLS
TLS
So long as the Fog CA is
trusted the Fog instance
will be trusted to join the
Vortex infrastructure.
Access
Control
Fog
Access Control
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Access control for an
entire Fog can be easily
controlled by defining
rules for either a “Cluster
Subject Name” or a
“Cluster Id”
Fog
Access Control
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryPeer-to-Peer
(Broker-less)
Device-to-Device
Communication
Fog Computing Fog Computing
Fog Computing
TLS
TLS
Each device can have its own
identity or identities can be
shared per “security-level”
Access
Control
Device-to-Cloud
Communication
Device
Access Control
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryPeer-to-Peer
(Broker-less)
Device-to-Device
Communication
Fog Computing Fog Computing
Fog Computing
TLS
TLS
So long as the device’s CA is
trusted the device will be
trusted.
Access
Control
Device-to-Cloud
Communication
Device
Access Control
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Devices access control can
be defined using a
specific certificate name or
a regular expression on
the subject name
Device
Access Control
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryDemo
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
at a Glance
2.0
Vortex 2.0 is the most advanced data-
sharing infrastructure for IoT and IIoT
applications available on the market
It has off-the-shelf support for Fog
Computing, Data-Level Security,
integration with Analytics, and
extremely high performance
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary

Contenu connexe

Tendances

Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationData Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationAngelo Corsaro
 
Vortex II -- The Industrial IoT Connectivity Standard
Vortex II -- The  Industrial IoT  Connectivity StandardVortex II -- The  Industrial IoT  Connectivity Standard
Vortex II -- The Industrial IoT Connectivity StandardAngelo Corsaro
 
Building IoT Applications with Vortex and the Intel Edison Starter Kit
Building IoT Applications with Vortex and the Intel Edison Starter KitBuilding IoT Applications with Vortex and the Intel Edison Starter Kit
Building IoT Applications with Vortex and the Intel Edison Starter KitAngelo Corsaro
 
Smart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoTSmart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoTAngelo Corsaro
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technologyNikhil Sabu
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmIRJET Journal
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)Iffat Anjum
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Brighttalk Challenges In Cloud Security
Brighttalk Challenges In Cloud SecurityBrighttalk Challenges In Cloud Security
Brighttalk Challenges In Cloud Securityguestc416cd26
 
A Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsA Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsAM Publications
 
Cloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudCloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudSandip Karale
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET Journal
 
【1110ROS社群開講】ROS 2與DDS應用於工業領域_王健豪
【1110ROS社群開講】ROS 2與DDS應用於工業領域_王健豪【1110ROS社群開講】ROS 2與DDS應用於工業領域_王健豪
【1110ROS社群開講】ROS 2與DDS應用於工業領域_王健豪MAKERPRO.cc
 
Cloud Computing - Fundamentals and Applications
Cloud Computing - Fundamentals and ApplicationsCloud Computing - Fundamentals and Applications
Cloud Computing - Fundamentals and ApplicationsEmiliano Reynares
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveyHarshitParkar6677
 

Tendances (20)

Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationData Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
 
Vortex II -- The Industrial IoT Connectivity Standard
Vortex II -- The  Industrial IoT  Connectivity StandardVortex II -- The  Industrial IoT  Connectivity Standard
Vortex II -- The Industrial IoT Connectivity Standard
 
Building IoT Applications with Vortex and the Intel Edison Starter Kit
Building IoT Applications with Vortex and the Intel Edison Starter KitBuilding IoT Applications with Vortex and the Intel Edison Starter Kit
Building IoT Applications with Vortex and the Intel Edison Starter Kit
 
Smart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoTSmart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoT
 
Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Brighttalk Challenges In Cloud Security
Brighttalk Challenges In Cloud SecurityBrighttalk Challenges In Cloud Security
Brighttalk Challenges In Cloud Security
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
A Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsA Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and Solutions
 
Cloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudCloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To Multicloud
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
 
【1110ROS社群開講】ROS 2與DDS應用於工業領域_王健豪
【1110ROS社群開講】ROS 2與DDS應用於工業領域_王健豪【1110ROS社群開講】ROS 2與DDS應用於工業領域_王健豪
【1110ROS社群開講】ROS 2與DDS應用於工業領域_王健豪
 
Cloud Computing - Fundamentals and Applications
Cloud Computing - Fundamentals and ApplicationsCloud Computing - Fundamentals and Applications
Cloud Computing - Fundamentals and Applications
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation UnitMIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
 

En vedette

The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)Gerardo Pardo-Castellote
 
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...Real-Time Innovations (RTI)
 
How to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of ThingsHow to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of ThingsReal-Time Innovations (RTI)
 
Winning with the Industrial Internet of Things: How to accelerate the journey...
Winning with the Industrial Internet of Things: How to accelerate the journey...Winning with the Industrial Internet of Things: How to accelerate the journey...
Winning with the Industrial Internet of Things: How to accelerate the journey...accenture
 
NEXCOM_APPC_1533T-P20s_Exercise_Strict_Control_Monitoring_over_Steelmaking_Qu...
NEXCOM_APPC_1533T-P20s_Exercise_Strict_Control_Monitoring_over_Steelmaking_Qu...NEXCOM_APPC_1533T-P20s_Exercise_Strict_Control_Monitoring_over_Steelmaking_Qu...
NEXCOM_APPC_1533T-P20s_Exercise_Strict_Control_Monitoring_over_Steelmaking_Qu...Eric Lo
 
Eclipse IoT for Industry 4.0
Eclipse IoT for Industry 4.0Eclipse IoT for Industry 4.0
Eclipse IoT for Industry 4.0Ian Skerrett
 
Industrial Internet: Pushing the Boundaries of Minds and Machines
Industrial Internet: Pushing the Boundaries of Minds and MachinesIndustrial Internet: Pushing the Boundaries of Minds and Machines
Industrial Internet: Pushing the Boundaries of Minds and MachinesGE Measurement & Control
 
NEXCOM Industry 4.0 Solution Map and Topology
NEXCOM Industry 4.0 Solution Map and TopologyNEXCOM Industry 4.0 Solution Map and Topology
NEXCOM Industry 4.0 Solution Map and TopologyEric Lo
 
Industrial Internet of things - What’s at Stake?
Industrial Internet of things - What’s at Stake? Industrial Internet of things - What’s at Stake?
Industrial Internet of things - What’s at Stake? Karan Menon
 
Big Data Analytics for the Industrial Internet of Things
Big Data Analytics for the Industrial Internet of ThingsBig Data Analytics for the Industrial Internet of Things
Big Data Analytics for the Industrial Internet of ThingsAnthony Chen
 
Tracxn Research - Industrial Internet of Things Report, June 2017
Tracxn Research - Industrial Internet of Things Report, June 2017Tracxn Research - Industrial Internet of Things Report, June 2017
Tracxn Research - Industrial Internet of Things Report, June 2017Tracxn
 
Industrial Internet of Things by Edy Liongosari of Accenture
Industrial Internet of Things by Edy Liongosari of AccentureIndustrial Internet of Things by Edy Liongosari of Accenture
Industrial Internet of Things by Edy Liongosari of Accenturegogo6
 
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Ahmed Mahmoud
 

En vedette (16)

The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)
 
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
 
How to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of ThingsHow to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of Things
 
Watson IoT - IBM
Watson IoT - IBMWatson IoT - IBM
Watson IoT - IBM
 
Winning with the Industrial Internet of Things: How to accelerate the journey...
Winning with the Industrial Internet of Things: How to accelerate the journey...Winning with the Industrial Internet of Things: How to accelerate the journey...
Winning with the Industrial Internet of Things: How to accelerate the journey...
 
NEXCOM_APPC_1533T-P20s_Exercise_Strict_Control_Monitoring_over_Steelmaking_Qu...
NEXCOM_APPC_1533T-P20s_Exercise_Strict_Control_Monitoring_over_Steelmaking_Qu...NEXCOM_APPC_1533T-P20s_Exercise_Strict_Control_Monitoring_over_Steelmaking_Qu...
NEXCOM_APPC_1533T-P20s_Exercise_Strict_Control_Monitoring_over_Steelmaking_Qu...
 
Profinet and the Industrial Internet of Things (IIoT) - Peter Thomas - Sept ...
Profinet and the Industrial Internet of Things (IIoT) -  Peter Thomas - Sept ...Profinet and the Industrial Internet of Things (IIoT) -  Peter Thomas - Sept ...
Profinet and the Industrial Internet of Things (IIoT) - Peter Thomas - Sept ...
 
Eclipse IoT for Industry 4.0
Eclipse IoT for Industry 4.0Eclipse IoT for Industry 4.0
Eclipse IoT for Industry 4.0
 
Industrial Internet: Pushing the Boundaries of Minds and Machines
Industrial Internet: Pushing the Boundaries of Minds and MachinesIndustrial Internet: Pushing the Boundaries of Minds and Machines
Industrial Internet: Pushing the Boundaries of Minds and Machines
 
NEXCOM Industry 4.0 Solution Map and Topology
NEXCOM Industry 4.0 Solution Map and TopologyNEXCOM Industry 4.0 Solution Map and Topology
NEXCOM Industry 4.0 Solution Map and Topology
 
Industrial Internet of things - What’s at Stake?
Industrial Internet of things - What’s at Stake? Industrial Internet of things - What’s at Stake?
Industrial Internet of things - What’s at Stake?
 
Industry 4 and the industrial internet of things - Derek Lane
Industry 4 and the industrial internet of things - Derek LaneIndustry 4 and the industrial internet of things - Derek Lane
Industry 4 and the industrial internet of things - Derek Lane
 
Big Data Analytics for the Industrial Internet of Things
Big Data Analytics for the Industrial Internet of ThingsBig Data Analytics for the Industrial Internet of Things
Big Data Analytics for the Industrial Internet of Things
 
Tracxn Research - Industrial Internet of Things Report, June 2017
Tracxn Research - Industrial Internet of Things Report, June 2017Tracxn Research - Industrial Internet of Things Report, June 2017
Tracxn Research - Industrial Internet of Things Report, June 2017
 
Industrial Internet of Things by Edy Liongosari of Accenture
Industrial Internet of Things by Edy Liongosari of AccentureIndustrial Internet of Things by Edy Liongosari of Accenture
Industrial Internet of Things by Edy Liongosari of Accenture
 
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
 

Similaire à Vortex 2.0 -- The Industrial Internet of Things Platform

Nextcloud Open Source Collaborative Cloud Platform, OW2online, June2020
Nextcloud Open Source Collaborative Cloud Platform, OW2online, June2020Nextcloud Open Source Collaborative Cloud Platform, OW2online, June2020
Nextcloud Open Source Collaborative Cloud Platform, OW2online, June2020OW2
 
Top 6 Practices to Harden Docker Images to Enhance Security
Top 6 Practices to Harden Docker Images to Enhance SecurityTop 6 Practices to Harden Docker Images to Enhance Security
Top 6 Practices to Harden Docker Images to Enhance Security9 series
 
Cloud based multimedia content protection system
Cloud based multimedia content protection systemCloud based multimedia content protection system
Cloud based multimedia content protection systemjpstudcorner
 
Deep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Deep Learning Neural Network Acceleration at the Edge - Andrea GalloDeep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Deep Learning Neural Network Acceleration at the Edge - Andrea GalloLinaro
 
SoftCloud: A Tool for Visualizing Software Artifacts as Tag Clouds.pdf
SoftCloud: A Tool for Visualizing Software Artifacts as Tag Clouds.pdfSoftCloud: A Tool for Visualizing Software Artifacts as Tag Clouds.pdf
SoftCloud: A Tool for Visualizing Software Artifacts as Tag Clouds.pdfRa'Fat Al-Msie'deen
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEXAngelo Corsaro
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemIRJET Journal
 
Digital spectacle by using cloud computing
Digital spectacle by using cloud computingDigital spectacle by using cloud computing
Digital spectacle by using cloud computingMandar Pathrikar
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsIRJET Journal
 
IRJET- IOT Dune Buggy –Control it from Anywhere
IRJET- IOT Dune Buggy –Control it from AnywhereIRJET- IOT Dune Buggy –Control it from Anywhere
IRJET- IOT Dune Buggy –Control it from AnywhereIRJET Journal
 
IRJET- IOT Dune Buggy –Control it from Anywhere
IRJET-  	  IOT Dune Buggy –Control it from AnywhereIRJET-  	  IOT Dune Buggy –Control it from Anywhere
IRJET- IOT Dune Buggy –Control it from AnywhereIRJET Journal
 
Oftentimes, the process of implementing security opens one’s eyes to.docx
Oftentimes, the process of implementing security opens one’s eyes to.docxOftentimes, the process of implementing security opens one’s eyes to.docx
Oftentimes, the process of implementing security opens one’s eyes to.docxcarlibradley31429
 
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...IRJET Journal
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography NidhinRaj Saikripa
 

Similaire à Vortex 2.0 -- The Industrial Internet of Things Platform (20)

Nextcloud Open Source Collaborative Cloud Platform, OW2online, June2020
Nextcloud Open Source Collaborative Cloud Platform, OW2online, June2020Nextcloud Open Source Collaborative Cloud Platform, OW2online, June2020
Nextcloud Open Source Collaborative Cloud Platform, OW2online, June2020
 
Top 6 Practices to Harden Docker Images to Enhance Security
Top 6 Practices to Harden Docker Images to Enhance SecurityTop 6 Practices to Harden Docker Images to Enhance Security
Top 6 Practices to Harden Docker Images to Enhance Security
 
Cloud based multimedia content protection system
Cloud based multimedia content protection systemCloud based multimedia content protection system
Cloud based multimedia content protection system
 
journal in research
journal in research journal in research
journal in research
 
journal published
journal publishedjournal published
journal published
 
Deep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Deep Learning Neural Network Acceleration at the Edge - Andrea GalloDeep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Deep Learning Neural Network Acceleration at the Edge - Andrea Gallo
 
SoftCloud: A Tool for Visualizing Software Artifacts as Tag Clouds.pdf
SoftCloud: A Tool for Visualizing Software Artifacts as Tag Clouds.pdfSoftCloud: A Tool for Visualizing Software Artifacts as Tag Clouds.pdf
SoftCloud: A Tool for Visualizing Software Artifacts as Tag Clouds.pdf
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
Flyer
FlyerFlyer
Flyer
 
Digital spectacle by using cloud computing
Digital spectacle by using cloud computingDigital spectacle by using cloud computing
Digital spectacle by using cloud computing
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
Intercloud_Fabric
Intercloud_FabricIntercloud_Fabric
Intercloud_Fabric
 
IRJET- IOT Dune Buggy –Control it from Anywhere
IRJET- IOT Dune Buggy –Control it from AnywhereIRJET- IOT Dune Buggy –Control it from Anywhere
IRJET- IOT Dune Buggy –Control it from Anywhere
 
IRJET- IOT Dune Buggy –Control it from Anywhere
IRJET-  	  IOT Dune Buggy –Control it from AnywhereIRJET-  	  IOT Dune Buggy –Control it from Anywhere
IRJET- IOT Dune Buggy –Control it from Anywhere
 
Fog computing
Fog computingFog computing
Fog computing
 
Oftentimes, the process of implementing security opens one’s eyes to.docx
Oftentimes, the process of implementing security opens one’s eyes to.docxOftentimes, the process of implementing security opens one’s eyes to.docx
Oftentimes, the process of implementing security opens one’s eyes to.docx
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...An Stepped Forward Security System for Multimedia Content Material for Cloud ...
An Stepped Forward Security System for Multimedia Content Material for Cloud ...
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 

Plus de Angelo Corsaro

zenoh: The Edge Data Fabric
zenoh: The Edge Data Fabriczenoh: The Edge Data Fabric
zenoh: The Edge Data FabricAngelo Corsaro
 
zenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computezenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computeAngelo Corsaro
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolAngelo Corsaro
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolAngelo Corsaro
 
Cyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeCyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeAngelo Corsaro
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture FourAngelo Corsaro
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture ThreeAngelo Corsaro
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture TwoAngelo Corsaro
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture OneAngelo Corsaro
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsAngelo Corsaro
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security StandardAngelo Corsaro
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution ServiceAngelo Corsaro
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsAngelo Corsaro
 
DDS and OPC UA Explained
DDS and OPC UA ExplainedDDS and OPC UA Explained
DDS and OPC UA ExplainedAngelo Corsaro
 
Microservices Architecture with Vortex — Part II
Microservices Architecture with Vortex — Part IIMicroservices Architecture with Vortex — Part II
Microservices Architecture with Vortex — Part IIAngelo Corsaro
 

Plus de Angelo Corsaro (20)

Zenoh: The Genesis
Zenoh: The GenesisZenoh: The Genesis
Zenoh: The Genesis
 
zenoh: The Edge Data Fabric
zenoh: The Edge Data Fabriczenoh: The Edge Data Fabric
zenoh: The Edge Data Fabric
 
Zenoh Tutorial
Zenoh TutorialZenoh Tutorial
Zenoh Tutorial
 
zenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computezenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query compute
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
Eastern Sicily
Eastern SicilyEastern Sicily
Eastern Sicily
 
Cyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeCyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT Age
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture Four
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture Three
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture Two
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture One
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained Envionrments
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security Standard
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution Service
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming Ruminations
 
DDS In Action Part II
DDS In Action Part IIDDS In Action Part II
DDS In Action Part II
 
DDS and OPC UA Explained
DDS and OPC UA ExplainedDDS and OPC UA Explained
DDS and OPC UA Explained
 
Microservices Architecture with Vortex — Part II
Microservices Architecture with Vortex — Part IIMicroservices Architecture with Vortex — Part II
Microservices Architecture with Vortex — Part II
 
Happy 2016!
Happy 2016!Happy 2016!
Happy 2016!
 

Dernier

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 

Dernier (20)

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 

Vortex 2.0 -- The Industrial Internet of Things Platform

  • 2. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiarynews
  • 3. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary acquires
  • 4. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary As part of ADLINK will have the the resources and scale to exploit the full potential of the Vortex in Industrial IoT (IIoT) markets. You will see PrismTech becoming stronger, larger and able to better compete globally.  You will also start to see, later in 2016, new leading-edge IIoT system products emerging from the combination of PrismTech’s software and ADLINK’s hardware technologies.
  • 5. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary This acquisition reinforces the traction and relevance of the DDS Standard in IIoT.  The combination of ADLINK’s and PrismTech’s strengths offers a tremendous opportunity to combine software and hardware into system-level solutions embracing the edge, mobile, network and data center.
  • 6. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryVortex 2.0
  • 7. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Vortex is a standard technology for efficient, ubiquitous, interoperable, secure and platform independent data sharing across network connected devices in151 Characters
  • 8. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk at a Glance 2.0 Plenty of Vortex Devices goodies, including new APIs, new features and improved performances
  • 9. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk at a Glance 2.0 More Integration with analytics, IoT and Web technologies
  • 10. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk at a Glance 2.0 Extended and Improved Tooling for monitoring, management, testing, record and playback
  • 11. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk at a Glance 2.0 Fog Computing Support
  • 12. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk at a Glance 2.0 Data-Centric Security
  • 13. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Device
  • 14. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Updated ISO-C++ with increased usability and support for C++11 lambdas Google Protocol Buffer support for topic type declaration Full support for coherent-updates Improved performance and transparent compression for durable data 6.6.0
  • 15. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryTopic types can be expressed using different syntaxes, including IDL and ProtoBuf Google Protocol Buffers message ShapeType { option (.omg.dds.type) = {name: "ShapeType"}; required string color = 0 [(.omg.dds.member).key = true]; required long x = 1; required long y = 2; required long shapesize = 3; } struct ShapeType { string color; long x; long y; long shapesize; }; #pragma keylist ShapeType color IDL ProtoBuf
  • 16. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary 2.0.0 Support for 40+ platforms including Windows, Linux, MacOS, ElinOS, VxWorks, and QNX Updated ISO-C++ with increased usability and support for C++11 lambdas Full Durability support including Transient and Persistent Data
  • 17. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary 2.2.0 Support for Python Scripting (via Jython) Extended support for X.509 certificates and CA hierarchies Extended Unicast-only discovery to facilitate configuration in non-multicast enabled environments Improved throughput
  • 18. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryIntegration
  • 19. Native Integration with the hottest real-time analytics platforms and CEP Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk
  • 20. Integration with the popular Node-RED framework Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk
  • 21. Integration with mainstream Dashboard Technologies Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk
  • 22.
  • 23. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Fog
  • 24. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Fog Computing Vortex naturally fits with the fog computing paradigm and is the only fog-ready data-sharing infrastructure
  • 25. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary 1.3.1 Transparently and dynamically integrates a Fog subsystems while mediating transport protocols and isolating application from dynamics exposed by different networks Controls the topic exposed by a Fog subsystem Defines a security boundary
  • 26. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary 1.3.1 Data leaves a Fog subsystem only if remote interest is discovered — through dynamic discovery. Applications within a Fog cannot tell if they are communicating with local or remote applications. These applications believe that they always communicate “locally”
  • 27. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Fog Deployment
  • 28. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary location transparency Cloud Computing Fog Computing Device-to-Cloud Communication Device-to-Device Communication Fog-to-Cloud Communication Cloud-to-Cloud Communication Device-to-Device Communication Collect | Store | Analyse | Share Collect | Store | Analyse | Share Fog Computing Fog Computing
  • 29. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Vortex device, such as Lite, Café, and Web are used to share data between different kinds of applications within a car Café and Web are typically used Android / HTML5 based infotainment Lite in typically used in ECU, sensors and onboard analytics
  • 30. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Vortex Fog is used to transparently (for in car apps) decouple and control the data sharing within and across the car Vortex Fog also helps defining security boundaries and policies
  • 31. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Vortex Fog efficiently and securely deals with car to car communication Vortex Fog allows to decouple the transport used for in-car communication and that used for car-to-car communication
  • 32. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Vortex Fog efficiently and securely deals with cloud connectivity adapting traffic flows and protocols Device-to-Cloud Communication Cloud Analytics Fog Analytics Fog Analytics Fog Analytics
  • 33. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Vortex Cloud efficiently and securely makes data available to any device at an Internet Scale Cloud Analytics Fog Analytics Fog Analytics Fog Analytics Device-to-Cloud Communication
  • 34. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryData-Centric Security
  • 35. Secure Data-Level security with Pluggable Authentication Access Control and Crypto Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk
  • 36. Default Plug-ins X.509 Public Key Infrastructure (PKI) based authentication Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk
  • 37. Default Plug-ins Access Control List available at a trusted/ authenticated URI Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk
  • 38. Default Plug-ins Crypto based on TLS Cipher Suite Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk
  • 39. Secure Data-Security as opposed to simply Transport-Level security Arthur Dent Arthur Dent Ford Prefect Zaphod Beeblebrox Marvin Trillian left/A(r,w), left/B(r) left/A(r,w), left/B(r,w), left/X(r) left/*(r,w) left/*(r), right/(w) left/A(r,w), left/B(r,w), right/C(r,w) Ford Prefect Zaphod Beeblebrox Trillian Marvin A B A,B X * * A,B,C Identity Access Rights Sessions are authenticated and communication is encrypted Only the Topic included as part of the access rights are visible and accessible
  • 40. Secure Fine-grained access control over Partition/Topic regular expressions Arthur Dent Arthur Dent Ford Prefect Zaphod Beeblebrox Marvin Trillian left/A(r,w), left/B(r) left/A(r,w), left/B(r,w), left/X(r) left/*(r,w) left/*(r), right/(w) left/A(r,w), left/B(r,w), right/C(r,w) Ford Prefect Zaphod Beeblebrox Trillian Marvin A B A,B X * * A,B,C Identity Access Rights Sessions are authenticated and communication is encrypted Only the Topic included as part of the access rights are visible and accessible
  • 41. Boundary Security Boundary security support is enabled by Vortex-Fog Device-to-Cloud Communication Peer-to-Peer (Broker-less) Device-to-Device Communication Fog Computing Fog Computing Fog Computing TLS TLS Access Control
  • 42. Boundary Security Separates security concerns at different scales and controls what information is exposed Device-to-Cloud Communication Peer-to-Peer (Broker-less) Device-to-Device Communication Fog Computing Fog Computing Fog Computing TLS TLS Access Control
  • 43. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Data-Centric Security Management &Configuration
  • 44. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Certificate Management Certificate Authority (CA) hierarchies are supported to facilitate certificate management
  • 45. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Certificate/Key Management Tool Eases the creation of Certificate Authorities hierarchies as well as service and device certificates
  • 46. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Device-to-Cloud Communication Peer-to-Peer (Broker-less) Device-to-Device Communication Fog Computing Fog Computing Fog Computing TLS TLS Applications belonging to the same Fog subsystem share the same identity and the same access rights Access Control Fog Access Control
  • 47. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Device-to-Cloud Communication Peer-to-Peer (Broker-less) Device-to-Device Communication Fog Computing Fog Computing Fog Computing TLS TLS So long as the Fog CA is trusted the Fog instance will be trusted to join the Vortex infrastructure. Access Control Fog Access Control
  • 48. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Access control for an entire Fog can be easily controlled by defining rules for either a “Cluster Subject Name” or a “Cluster Id” Fog Access Control
  • 49. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryPeer-to-Peer (Broker-less) Device-to-Device Communication Fog Computing Fog Computing Fog Computing TLS TLS Each device can have its own identity or identities can be shared per “security-level” Access Control Device-to-Cloud Communication Device Access Control
  • 50. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryPeer-to-Peer (Broker-less) Device-to-Device Communication Fog Computing Fog Computing Fog Computing TLS TLS So long as the device’s CA is trusted the device will be trusted. Access Control Device-to-Cloud Communication Device Access Control
  • 51. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Devices access control can be defined using a specific certificate name or a regular expression on the subject name Device Access Control
  • 52. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryDemo
  • 53. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary
  • 54. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary at a Glance 2.0 Vortex 2.0 is the most advanced data- sharing infrastructure for IoT and IIoT applications available on the market It has off-the-shelf support for Fog Computing, Data-Level Security, integration with Analytics, and extremely high performance
  • 55. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary