SlideShare a Scribd company logo
1 of 66
Download to read offline
Building and Scaling Internet
of Things Applications
with
Angelo	
  Corsaro,	
  PhD	
  
Chief	
  Technology	
  Officer	
  
angelo.corsaro@prismtech.com
- Cloud
CopyrightPrismTech,2014
Cloud Messaging is a key architectural element at the foundation of any Internet
of Things (IoT) and Industrial Internet (I2) Systems
As the architectural element providing connectivity, its time and space efficiency,
elasticity, and fault-tolerance is key in operating and scaling Internet of Things
and Industrial Internet Applications
Cloud Messaging
CopyrightPrismTech,2014
E-Health
Hospital A
Analytics
Big	
  Data	
  Store
Hospital B
?
CopyrightPrismTech,2014
Smart City
?
Vortex
CopyrightPrismTech,2014
The Vortex Platform
Vortex enable seamless,
ubiquitous, efficient and
timely data sharing across
mobile, embedded,
desktop, cloud and web
applications
OpenSplice
Enterprise
CopyrightPrismTech,2014
One Standard, One set of Tools, One Goal — Ubiquitous Data Sharing
The Vortex Platform
VORTEX
Web
VORTEX
Lite
VORTEX
Gateway
VORTEX
Cloud
Private
Clouds
VORTEX
Tools
• Insight	
  
• Record/Replay	
  
• Tuner	
  
• Tester	
  
• Configurator
OpenSplice
Enterprise
VORTEX
Café
Vortex Cloud
CopyrightPrismTech,2014
Vortex Cloud provides a
universally accessible
“Internet Service” for
sharing data between
DDS-enabled applications
Vortex Cloud
CopyrightPrismTech,2014
!
Elastic and Fault-Tolerant
Public/Private Clouds
Deployments
Unicast and Multicast
Communication
Source Filtering
Customisable Load-Balancing
Vortex Cloud
CopyrightPrismTech,2014
!
Efficient Binary Protocol (DDSI)
Multiple Transports:
- UDP/IP
- TCP/IP
- WebSockets
Connectivity to MQTT, AMQP,
etc., via Vortex Gateway
Vortex Cloud
Architecture
CopyrightPrismTech,2014
At its core, Vortex-Cloud is made by two
building blocks:
Discovery Service: Deals with
transparently mediating and scaling
the match between applications as well
as establishing connectivity
Routing Service: Efficiently and
scalable mediates the communication
between DDS applications
Discovery and Routing Services
Discovery
Service
Routing
Service
CopyrightPrismTech,2014
The Discovery service, is an elastic and fault tolerant service that:
Controls access to information
Matches DataReaders and DataWriters while minimising the discovery
information propagated to end applications
Establish the optimal communication path between communicating end-points
Manages and load-balance the Routing Service instances
For a generic DDS application, the Discovery Service is completely transparent
Discovery Service
CopyrightPrismTech,2014
Discovery Service
Discovery Service
CopyrightPrismTech,2014
Discovery Service
Discovery Service
App1
DWX
DRY
CopyrightPrismTech,2014
Discovery Service
Discovery Service
LB
App1
DWX
DRY
CopyrightPrismTech,2014
Discovery Service
Discovery Service
DWX
DRY
App1
CopyrightPrismTech,2014
Discovery Service
Discovery Service
DWX
DRY
(DWX,DRY )
App1
CopyrightPrismTech,2014
Discovery Service
Discovery Service
DWX
DRY
(GUID1, DWX,DRY )
App1
CopyrightPrismTech,2014
Discovery Service
Discovery Service
DWX
DRY
App2
DWY
DRX
App1 (GUID1, DWX,DRY )
CopyrightPrismTech,2014
Discovery Service
Discovery Service
DWX
DRY
DWY
DRX
App1
LB
App2
(GUID1, DWX,DRY )
CopyrightPrismTech,2014
Discovery Service
Discovery Service
DWX
DRY
DWY
DRX
App2
App1 (GUID1, DWX,DRY )
CopyrightPrismTech,2014
Discovery Service
Discovery Service
DWX
DRY
DWY
DRX
(DWY,DRX ) App2
App1 (GUID1, DWX,DRY )
CopyrightPrismTech,2014
Discovery Service
Discovery Service
DWX
DRY
DWY
DRX
(GUID2, DWY,DRX )
App2
App1 (GUID1, DWX,DRY )
CopyrightPrismTech,2014
Discovery Service
Discovery Service
DWX
DRY
DWY
DRX
Match!
Match!
App1
App2
(GUID2, DWY,DRX )
(GUID1, DWX,DRY )
CopyrightPrismTech,2014
Discovery Service
Discovery Service
DWX
DRY
DWY
DRX
App2
DWA
DRB
App1
App2
(GUID2, DWY,DRX )
(GUID1, DWX,DRY )
CopyrightPrismTech,2014
Discovery Service
Discovery Service
DWX
DRY
DWY
DRX
DWA
DRB
App2
LB
App1
App2
(GUID2, DWY,DRX )
(GUID1, DWX,DRY )
CopyrightPrismTech,2014
Discovery Service
Discovery Service
DWX
DRY
DWY
DRX
DWA
DRB
App2
(DWA,DRB )
App1
App2
(GUID2, DWY,DRX )
(GUID1, DWX,DRY )
CopyrightPrismTech,2014
Discovery Service
Discovery Service
DWX
DRY
DWY
DRX
DWA
DRB
App3
(GUID3, DWA,DRB )App1
App2
(GUID2, DWY,DRX )
(GUID1, DWX,DRY )
CopyrightPrismTech,2014
Discovery Service
Discovery Service
DWX
DRY
DWY
DRX
DWA
DRB
App3
(GUID3, DWA,DRB )App1
App2
(GUID2, DWY,DRX )
(GUID1, DWX,DRY )
CopyrightPrismTech,2014
Discovery Service
Discovery Service
DWX
DRY
DWY
DRX
DWA
DRB
App3
(GUID3, DWA,DRB )App1
App2
(GUID2, DWY,DRX )
(GUID1, DWX,DRY )
CopyrightPrismTech,2014
Discovery Service
Discovery Service
DWX
DRY
DWY
DRX
DWA
DRB
App3
(GUID3, DWA,DRB )
App2
(GUID2, DWY,DRX )
(GUID1, DWX,DRY )
LB
App1
CopyrightPrismTech,2014
Discovery Service
Discovery Service
DWX
DRY
DWY
DRX
DWA
DRB
App3
(GUID3, DWA,DRB )
App2
(GUID2, DWY,DRX )
(GUID1, DWX,DRY )
App1
(DWX,DRY )
CopyrightPrismTech,2014
Discovery Service
Discovery Service
DWX
DRY
DWY
DRX
DWA
DRB
App3
(GUID3, DWA,DRB )
App2
(GUID2, DWY,DRX )
(GUID1, DWX,DRY )
App1
CopyrightPrismTech,2014
The Routing service, is an elastic and fault tolerant service that:
Efficiently routes information from producer to consumers
Provides configurable decoupling between producing and consuming
applications
For a generic DDS application, the Routing Service is completely transparent
Routing Service
CopyrightPrismTech,2014
Routing Service
Discovery Service Routing Service
DWX
DRY
DWY
DRX
Match!
Match!
App1
App2
(GUID2, DWY,DRX )
(GUID1, DWX,DRY )
CopyrightPrismTech,2014
Routing Service
Discovery Service Routing Service
DWX
DRY
DWY
DRX
App1
App2
(RS2,2, GUID1, GUID2)
(GUID2, DWY,DRX )
(GUID1, DWX,DRY )
CopyrightPrismTech,2014
Routing Service
Discovery Service Routing Service
DWX
DRY
DWY
DRX
(RS2,2)
(RS2,2)App1
App2
(RS2,2, GUID1, GUID2)
(GUID2, DWY,DRX )
(GUID1, DWX,DRY )
CopyrightPrismTech,2014
Routing Service
Discovery Service Routing Service
DWX
DRY
DWY
DRX
App1
App2
(GUID2, DWY,DRX )
(GUID1, DWX,DRY )
(RS2,2, GUID1, GUID2)
CopyrightPrismTech,2014
Routing Service
Discovery Service Routing Service
DWX
DRY
DWY
DRX
App1
App2
(GUID2, DWY,DRX )
(GUID1, DWX,DRY )
(RS2,2, GUID1, GUID2)
CopyrightPrismTech,2014
Routing Service
Discovery Service Routing Service
DWX
DRY
DWY
DRX
App1
App2
(GUID2, DWY,DRX )
(GUID1, DWX,DRY )
(RS2,2, GUID1, GUID2)
CopyrightPrismTech,2014
Routing Service
Discovery Service Routing Service
DWX
DRY
DWY
DRX
(RS2,2, GUID1, GUID2)
App1
App2
(GUID2, DWY,DRX )
(GUID1, DWX,DRY )
CopyrightPrismTech,2014
Routing Service
Discovery Service Routing Service
DWX
DRY
DWY
DRX
(RS2,1, GUID1, GUID2)
App1
App2
(GUID2, DWY,DRX )
(GUID1, DWX,DRY )
CopyrightPrismTech,2014
Routing Service
Discovery Service Routing Service
DWX
DRY
DWY
DRX
(RS2,1, GUID1, GUID2)
App1
App2
(GUID2, DWY,DRX )
(GUID1, DWX,DRY )
(RS2,1)
(RS2,1)
CopyrightPrismTech,2014
Routing Service
Discovery Service Routing Service
DWX
DRY
DWY
DRX
App1
App2
(GUID2, DWY,DRX )
(GUID1, DWX,DRY )
(RS2,2, GUID1, GUID2)
Deployments
CopyrightPrismTech,2014
Through configuration, Vortex Cloud can be used in a wide cast of deployment
scenarios. The main deployment cases can be classified as:
Single or Multi site (region) IaaS deployment
Federated Deployment
In-System Deployment
Deployment Scenarios
CopyrightPrismTech,2014
In IaaS deployments Vortex-Cloud is deployed on a private or public IaaS infrastructure such
as:
- Amazon EC2
- Linode
- Digital Ocean
- Google Cloud Platform
- Microsoft Azure
- …
Vortex-Cloud can be deployed as a single instance or federated across IaaS regions or even
providers (e.g. spanning across Linode and EC2)
IaaS Deployment
CopyrightPrismTech,2014
CopyrightPrismTech,2014
VORTEX
Cloud
IaaS
CopyrightPrismTech,2014
CopyrightPrismTech,2014
IaaS deployment is straight forward
First you need to decide how many
Discovery and Routing service
instance to run — You need two
instance of each to ensure fault-
tolerance
Then you simply need to start the
instance with the proper transport
and end-point configuration
IaaS Deployment Configuration
Discovery
Service
Routing
Service
CopyrightPrismTech,2014
Deployment of a Vortex-Cloud instance on a Linode server 88.80.185.102:
Example Configuration
java 
-jar 
-Dlog.level=INFO 
-Dcloud.discovery.user.tcp.port=7400 
-Dcloud.discovery.user.externalNetworkAddresses=88.80.185.102:7400 
-Dcloud.discovery.services.tcp.port=6400
discovery-service.jar
java 
-jar 
-Dlog.level=INFO 
-Dcloud.routing.user.tcp.port=5000
-Dcloud.routing.user.externalNetworkAddresses=88.80.185.102:5000 
-Dcloud.routing.services.tcp.port=5005
-Dcloud.routing.services.tcp.peers=88.80.185.102:6400 
routing-service.jar
CopyrightPrismTech,2014
Federated deployment allows to efficiently exchange data between systems
without relying on a centralised IaaS infrastructure
This deployment can be thought-of as if the servers typically available on a IaaS
platform were to be deployed on the edge of the systems being integrated
Another way of looking at this deployment is as a special kind of multi-site
private cloud deployment in which a single instance of Vortex-Cloud is
configured to span multiple sites
Federated Deployment
CopyrightPrismTech,2014
CopyrightPrismTech,2014
The federated deployment makes it possible to isolate and decouple subsystems
along to transparently integrate them
Sub-systems can take advantage of multicast, while communication among Vortex
Cloud can be carried over unicast (either UDP/IP or TCP/IP)
Federated deployment can be used to transparently connect to a Vortex-Cloud
instance deployed on a IaaS an entire subsystem
Deployment Options
Management
CopyrightPrismTech,2014
Management of Vortex-Cloud instances will be fully supported through Vortex-
Insight
In Vortex v1.0 a command line tool is available to inspect the status of an
instance of Vortex Cloud
- Discovered DataReader and DataWriters
- Discovery Service Instances
- Routing Service Instances
- Routes
Vortex Cloud Management
CopyrightPrismTech,2014
Cloud Management Tool
Live Demo!
http://demo-eu.prismtech.com:9000
bit.ly/vortex-chat
CopyrightPrismTech,2014
Vortex Demo
VORTEX
Café
VORTEX
Café
VORTEX
Web
VORTEX
Cloud
Private	
  Clouds
VORTEX
Café
CopyrightPrismTech,2014
Deployment of a Vortex-Cloud instance on a Linode server 88.80.185.102:
Cloud Configuration
java 
-jar 
-Dlog.level=INFO 
-Dcloud.discovery.user.tcp.port=7400 
-Dcloud.discovery.user.externalNetworkAddresses=88.80.185.102:7400 
-Dcloud.discovery.services.tcp.port=6400
discovery-service.jar
java 
-jar 
-Dlog.level=INFO 
-Dcloud.routing.user.tcp.port=5000
-Dcloud.routing.user.externalNetworkAddresses=88.80.185.102:5000 
-Dcloud.routing.services.tcp.port=5005
-Dcloud.routing.services.tcp.peers=88.80.185.102:6400 
routing-service.jar
CopyrightPrismTech,2014
Application Configuration
java 
-Dddsi.network.transport=tcp 
-Dddsi.discovery.tcp.peers=88.80.185.102:7400 
-Dddsi.discovery.externalNetworkAddresses=none 
-Ddds.partition=demo@vortex.io 
-DrefreshTimeout=40 
-Dddsi.discovery.externalNetworkAddresses=none 
-jar ./ishapes-2.0.0-SNAPSHOT.jar &>/dev/null
CopyrightPrismTech,2014
Vortex enable seamless, ubiquitous, efficient and timely data sharing across
mobile, embedded, desktop, cloud and web applications
It is the first platform to address the data-sharing needs of Business Critical IoT,
and Industrial Internet Systems
Vortex is fully interoperable with DDS compliant implementations
Concluding Remarks
Thanks!

More Related Content

What's hot

What's hot (20)

Desktop, Embedded and Mobile Apps with Vortex Café
Desktop, Embedded and Mobile Apps with Vortex CaféDesktop, Embedded and Mobile Apps with Vortex Café
Desktop, Embedded and Mobile Apps with Vortex Café
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security Standard
 
Vortex Cloud Beyond Cloud Messaging
Vortex Cloud Beyond Cloud MessagingVortex Cloud Beyond Cloud Messaging
Vortex Cloud Beyond Cloud Messaging
 
The Data Distribution Service Tutorial
The Data Distribution Service TutorialThe Data Distribution Service Tutorial
The Data Distribution Service Tutorial
 
Micro services Architecture with Vortex -- Part I
Micro services Architecture with Vortex -- Part IMicro services Architecture with Vortex -- Part I
Micro services Architecture with Vortex -- Part I
 
Building Reactive Applications with DDS
Building Reactive Applications with DDSBuilding Reactive Applications with DDS
Building Reactive Applications with DDS
 
DDS In Action Part II
DDS In Action Part IIDDS In Action Part II
DDS In Action Part II
 
OpenSplice DDS Tutorial -- Part II
OpenSplice DDS Tutorial -- Part IIOpenSplice DDS Tutorial -- Part II
OpenSplice DDS Tutorial -- Part II
 
DDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing StandardDDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing Standard
 
Connected Mobile and Web Applications with PrismTech Vortex Data Sharing Plat...
Connected Mobile and Web Applications with PrismTech Vortex Data Sharing Plat...Connected Mobile and Web Applications with PrismTech Vortex Data Sharing Plat...
Connected Mobile and Web Applications with PrismTech Vortex Data Sharing Plat...
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained Envionrments
 
Getting Started in DDS with C++ and Java
Getting Started in DDS with C++ and JavaGetting Started in DDS with C++ and Java
Getting Started in DDS with C++ and Java
 
Reactive Data Centric Architectures with Vortex, Spark and ReactiveX
Reactive Data Centric Architectures with Vortex, Spark and ReactiveXReactive Data Centric Architectures with Vortex, Spark and ReactiveX
Reactive Data Centric Architectures with Vortex, Spark and ReactiveX
 
Introducing Vortex Lite
Introducing Vortex LiteIntroducing Vortex Lite
Introducing Vortex Lite
 
IoT Protocols Integration with Vortex Gateway
IoT Protocols Integration with Vortex GatewayIoT Protocols Integration with Vortex Gateway
IoT Protocols Integration with Vortex Gateway
 
Getting Started with Vortex
Getting Started with VortexGetting Started with Vortex
Getting Started with Vortex
 
The Data Distribution Service Tutorial
The Data Distribution Service TutorialThe Data Distribution Service Tutorial
The Data Distribution Service Tutorial
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution Service
 
Vortex II -- The Industrial IoT Connectivity Standard
Vortex II -- The  Industrial IoT  Connectivity StandardVortex II -- The  Industrial IoT  Connectivity Standard
Vortex II -- The Industrial IoT Connectivity Standard
 
DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)
 

Viewers also liked

Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Vala Afshar
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
Mhae Lyn
 

Viewers also liked (17)

Iot for smart city
Iot for smart cityIot for smart city
Iot for smart city
 
Stream Processing with DDS and CEP
Stream Processing with  DDS and CEPStream Processing with  DDS and CEP
Stream Processing with DDS and CEP
 
Vortex Tutorial Part II
Vortex Tutorial Part IIVortex Tutorial Part II
Vortex Tutorial Part II
 
Advanced OpenSplice Programming - Part I
Advanced OpenSplice Programming - Part IAdvanced OpenSplice Programming - Part I
Advanced OpenSplice Programming - Part I
 
Advanced OpenSplice Programming - Part II
Advanced OpenSplice Programming - Part IIAdvanced OpenSplice Programming - Part II
Advanced OpenSplice Programming - Part II
 
Getting Started with OpenSplice DDS Community Ed.
Getting Started with OpenSplice DDS Community Ed.Getting Started with OpenSplice DDS Community Ed.
Getting Started with OpenSplice DDS Community Ed.
 
OpenSplice DDS v6
OpenSplice DDS v6OpenSplice DDS v6
OpenSplice DDS v6
 
20 Tips for OpenSplice Newbies
20 Tips for OpenSplice Newbies20 Tips for OpenSplice Newbies
20 Tips for OpenSplice Newbies
 
The DDS Tutorial Part II
The DDS Tutorial Part IIThe DDS Tutorial Part II
The DDS Tutorial Part II
 
The DDS Tutorial - Part I
The DDS Tutorial - Part IThe DDS Tutorial - Part I
The DDS Tutorial - Part I
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
Sviluppo IoT - Un approccio standard da Nerd ad Impresa, prove pratiche di Me...
Sviluppo IoT - Un approccio standard da Nerd ad Impresa, prove pratiche di Me...Sviluppo IoT - Un approccio standard da Nerd ad Impresa, prove pratiche di Me...
Sviluppo IoT - Un approccio standard da Nerd ad Impresa, prove pratiche di Me...
 
Cloud Computing Relation With Smart Cities
Cloud Computing Relation With Smart CitiesCloud Computing Relation With Smart Cities
Cloud Computing Relation With Smart Cities
 

Similar to Building and Scaling Internet of Things Applications with Vortex Cloud

Daroc Technology.pptx
Daroc Technology.pptxDaroc Technology.pptx
Daroc Technology.pptx
KETANJAMNAL2
 

Similar to Building and Scaling Internet of Things Applications with Vortex Cloud (20)

Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
Introduction to PrismTech's Vortex Intelligent Data Sharing Platform for the ...
Introduction to PrismTech's Vortex Intelligent Data Sharing Platform for the ...Introduction to PrismTech's Vortex Intelligent Data Sharing Platform for the ...
Introduction to PrismTech's Vortex Intelligent Data Sharing Platform for the ...
 
Desktop, Embedded and Mobile Apps with PrismTech Vortex Cafe
Desktop, Embedded and Mobile Apps with PrismTech Vortex CafeDesktop, Embedded and Mobile Apps with PrismTech Vortex Cafe
Desktop, Embedded and Mobile Apps with PrismTech Vortex Cafe
 
Droidcon London 2021 - Full Stack Dart
Droidcon London 2021   - Full Stack DartDroidcon London 2021   - Full Stack Dart
Droidcon London 2021 - Full Stack Dart
 
Disruptive Technology Trends - Cloud, Mobile, IoT and Beyond
Disruptive Technology Trends - Cloud, Mobile, IoT and BeyondDisruptive Technology Trends - Cloud, Mobile, IoT and Beyond
Disruptive Technology Trends - Cloud, Mobile, IoT and Beyond
 
Deploying deep learning models with Docker and Kubernetes
Deploying deep learning models with Docker and KubernetesDeploying deep learning models with Docker and Kubernetes
Deploying deep learning models with Docker and Kubernetes
 
DevCon5 (July 2014) - Acision SDK
DevCon5 (July 2014) - Acision SDKDevCon5 (July 2014) - Acision SDK
DevCon5 (July 2014) - Acision SDK
 
Neo4J with Docker and Azure - GraphConnect 2015
Neo4J with Docker and Azure - GraphConnect 2015Neo4J with Docker and Azure - GraphConnect 2015
Neo4J with Docker and Azure - GraphConnect 2015
 
The Right Tools for IoT Developers – Dan Gross @ Eclipse IoT Day ThingMonk 2016
The Right Tools for IoT Developers – Dan Gross @ Eclipse IoT Day ThingMonk 2016The Right Tools for IoT Developers – Dan Gross @ Eclipse IoT Day ThingMonk 2016
The Right Tools for IoT Developers – Dan Gross @ Eclipse IoT Day ThingMonk 2016
 
What is expected from Chief Cloud Officers?
What is expected from Chief Cloud Officers?What is expected from Chief Cloud Officers?
What is expected from Chief Cloud Officers?
 
Overseeing Ship's Surveys and Surveyors Globally Using IoT and Docker by Jay ...
Overseeing Ship's Surveys and Surveyors Globally Using IoT and Docker by Jay ...Overseeing Ship's Surveys and Surveyors Globally Using IoT and Docker by Jay ...
Overseeing Ship's Surveys and Surveyors Globally Using IoT and Docker by Jay ...
 
Docker Bday #5, SF Edition: Introduction to Docker
Docker Bday #5, SF Edition: Introduction to DockerDocker Bday #5, SF Edition: Introduction to Docker
Docker Bday #5, SF Edition: Introduction to Docker
 
Programming the world with Docker
Programming the world with DockerProgramming the world with Docker
Programming the world with Docker
 
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFVOVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
OVNC 2015-THE NEW IP - Open Networking Architecture with SDN & NFV
 
SolarWinds Federal Webinar: Technical Update & Demo of New Features
SolarWinds Federal Webinar: Technical Update & Demo of New FeaturesSolarWinds Federal Webinar: Technical Update & Demo of New Features
SolarWinds Federal Webinar: Technical Update & Demo of New Features
 
Edge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalersEdge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalers
 
Docker Orchestration: Welcome to the Jungle! JavaOne 2015
Docker Orchestration: Welcome to the Jungle! JavaOne 2015Docker Orchestration: Welcome to the Jungle! JavaOne 2015
Docker Orchestration: Welcome to the Jungle! JavaOne 2015
 
Daroc Technology.pptx
Daroc Technology.pptxDaroc Technology.pptx
Daroc Technology.pptx
 
pres_all_latest
pres_all_latestpres_all_latest
pres_all_latest
 
At the helm of kubernetes
At the helm of kubernetesAt the helm of kubernetes
At the helm of kubernetes
 

More from Angelo Corsaro

More from Angelo Corsaro (20)

Zenoh: The Genesis
Zenoh: The GenesisZenoh: The Genesis
Zenoh: The Genesis
 
zenoh: The Edge Data Fabric
zenoh: The Edge Data Fabriczenoh: The Edge Data Fabric
zenoh: The Edge Data Fabric
 
Zenoh Tutorial
Zenoh TutorialZenoh Tutorial
Zenoh Tutorial
 
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationData Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
 
zenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computezenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query compute
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingBreaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
 
Eastern Sicily
Eastern SicilyEastern Sicily
Eastern Sicily
 
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructurefog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructure
 
Cyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeCyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT Age
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing Platform
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture Four
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture Three
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture Two
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture One
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming Ruminations
 
Fog Computing Defined
Fog Computing DefinedFog Computing Defined
Fog Computing Defined
 
DDS in Action -- Part I
DDS in Action -- Part IDDS in Action -- Part I
DDS in Action -- Part I
 
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
The Cloudy, Foggy and Misty Internet of Things --  Toward Fluid IoT Architect...The Cloudy, Foggy and Misty Internet of Things --  Toward Fluid IoT Architect...
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 

Recently uploaded (20)

Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

Building and Scaling Internet of Things Applications with Vortex Cloud