How Will Rebooting Computing Help IoT?
|
|
|
- Jean Richardson
- 9 years ago
- Views:
Transcription
1 This paper received the Best Presentation Award at the 18 th International ICIN Conference (ICIN 2015), February 2015, Paris, France. It is available from the ICIN 2015 Proceedings on IEEE Xplore. How Will Rebooting Computing Help IoT? Bichlien Hoang IEEE: Technical Activities Future Directions Piscataway, NJ, U.S.A. Sin-Kuen Hawkins IEEE: Technical Activities Future Directions Piscataway, NJ, U.S.A. Abstract The Internet of Things presents numerous challenges to achieve the vision of interconnecting all things, with the need for extreme miniaturization of computing devices that are energy efficient, human-to-computer interfaces that are natural, and processing of layers of intelligence while ensuring data security and privacy. This paper will describe "rebooting computing", an approach to rethinking the computer to address technical challenges of IoT and other key computing trends. Keywords IoT; rebooting computing; security; humancomputer interface, energy efficiency; neuromorphic computing, approximate computing; adiabatic computing I. INTRODUCTION The Internet of Things (IoT) promises a world where all things are interconnected. Some call IoT, the Internet of Everything as it creates a vision of unprecedented era of connectedness [1]. Advancements in networking and computing technologies will be one aspect to enabling IoT to become a reality, in addition to social acceptance and successful business models. This paper will describe "rebooting computing" (RC), an approach to rethinking computing technologies and approaches to address the technical challenges of IoT and other key computing trends. II. INTERNET OF THINGS A. Opportunities Is IoT a buzz phrase or really an opportunity? IoT has been called the most disruptive technological revolution since the advent of the Internet [1]. The Internet has been on a steady path of development and improvement, but IoT is its first real evolution that will drastically change the way people live, learn, work, and entertain themselves [2]. One projection suggests that IoT will have over 50 billion humans and objects, or nodes, interconnected by 2020 [1]. Another projection suggests 1 trillion connected devices by 2025 [3]. A plethora of data can be gathered from multiple devices and applications connected to an always-on network, and then fused and analyzed in real-time. The benefits of IoT seem without limits. IoT may increase the efficiency of a production line, provide 24x7 monitoring of a patient, enable data collection for longterm research, and provide a whole host of new services for consumers. IoT is transforming all industries, including transportation, healthcare and manufacturing with connected cars, connected homes, wearables, and industrial internet [4]. B. Challenges There are many technical challenges related to implementing a connected sensorized world. IoT may become the biggest system that mankind has ever built. From a networking perspective, there must be measurable service quality with guaranteed connectivity for a large number of mobile objects. An always-on network with a global footprint will require a balance of core communications systems with flexible infrastructure components that can keep a network robust and resilient. However, IoT is a network of networks [2] and any weak link can impact its services greatly. Having standard network protocols and interfaces that are agreeable and implemented by all the major manufacturers involved would certainly help drive a unified platform in a world of disparate objects and elements in the network. Standardization would help in the management of this large heterogeneous network, but reaching consensus amongst a group of competitors will not be easy. From a computing perspective, each of the IoT-connected devices, including the embedded sensors and processors, must be extremely miniaturized, energy efficient, and consume minimum power. These connected devices will capture data and generate data, producing oceans of data that will require a brain to analyze and transform the data into useful information. Pockets of personal data repositories everywhere will bring on the important issues of privacy and security. Identity management, access control, and data protection must be in place to ensure sensitive private and personal data do not fall into the wrong hands. Preventing hacking into the IoT connected devices will be a challenge when there are so many potential points of intrusion. The human-to-computer interfaces also need to be evolved to make the interactions less complex and truly natural. The ability to capture speech, touch, and gestures would enable users to interact with computing devices just as naturally as they interact with each other. Natural language translation and processing within the user s context while leveraging past and current user actions would further improve the user s experience [5]. III. REBOOTING COMPUTING A. What is it? Rebooting Computing is a new IEEE initiative [6] launched in 2012 by the IEEE Future Directions Committee to rethink the computer from soup to nuts including all aspects
2 from device to user interface. Though the term Rebooting Computing was identified independently as an inspiration for this new initiative, this term was previously coined by IEEE Life Fellow Peter Denning 1 in Information on the IEEE Rebooting Computing Initiative can be found on the Rebooting Computing portal Why the need to rethink the computer now? because there is a general consensus that the primary technology driver for almost 5 decades, Moore s Law for scaling of integrated circuits is finally ending. Performance had been increasing exponentially every 18 months with the number of transistors on a chip doubling, drastically decreasing the size of typical computing devices (see Fig. 1). However, CMOS appears to be reaching physical limits, including size and power density, and there is presently no technology available that can take its place [7]. Fig. 1. Scaling of computing devices in successive generations [7]. Rebooting Computing is rethinking the entire approach to computation, from design, function, performance, and energy efficiency, starting from a clean slate. RC takes a holistic look that addresses all aspects of computing, and as such, this is an inter-society effort with 9 IEEE Societies and Councils contributing. The RC committee consists of representatives and volunteers from IEEE Circuits and Systems Society, Computer Society, Council on Electronic Design Automation, Council on Superconductivity, Electron Devices Society, Magnetics Society, Nanotechnology Council, Reliability Society, and Solid-State Circuits Society. In addition, the RC Initiative collaborates with other organizations involved in looking at future trends in the technology of computing, such as the International Technology Roadmap for Semiconductors 2 (ITRS). The RC Committee organized a series of Rebooting Computing Summits (RCS), each with a theme, to discuss the future of computing with invited thought leaders, experts, and decision makers from government, industry, and academia. The first summit (RCS 1, December 2013) established the initial foundations with the 3 pillars of computing. The second 1 Rebooting Computing" was coined by IEEE Life Fellow Peter Denning as part of his National Science Foundation-sponsored initiative to revamp computing education. 2 ITRS is sponsored by five leading chip manufacturing regions in the world: Europe, Japan, Korea, Taiwan, and the United States. The objective of ITRS is to ensure cost-effective advancements in the performance of the integrated circuit and advanced products and applications that employ such devices. For more information, visit summit (RCS 2, May 2014) and the third summit (RCS 3, October 2014) drilled down further and focused on the engines and structures of future computation. This paper presents some of the concepts discussed in the three summits that are relevant and transferrable to supporting IoT design and development. In particular, information from the RCS 1 [8], RCS 2 [7] and RCS 3 [9] reports were used throughout this paper. B. Vision of Future Computing Three Pillars A vision identified in RCS 1 [8] consisted of ubiquitous computing that is fully integrated into the lives of people at all levels of society. Future generations of smartphones and networked sensors are connected via wireless broadband links to the Internet and with large computing engines in the Cloud. This is very much in line with the vision of IoT. To achieve this vision and other future visions of computing, three pillars must be addressed as the initial foundation: Energy Efficiency, Human-Computer Interface, and Security. 1) Energy Efficiency Energy efficiency is important so that recharging is relatively infrequent when there are potentially billions and even trillions of smart devices. Ideally, these smart devices at the periphery of the Internet are energy source aware, and consume power in proportion to the level of performance that they deliver, and only as much as their energy harvesting rate or expected charging power allows them [8]. The information and communication infrastructure (ICI) provides a core of large and powerful datacenters to the billions and possibly trillions of smart devices at the edge (see Fig. 2). Fig. 2. A conceptual diagram of cloud computing system (data centers) surrounded by a large number of edge devices (the IoT) [8]. An edge device is connected to the core via an intermediate edge infrastructure that is a trusted zone and resource-rich. Smart devices can access the intermediate edge and the core to enhance their own functionality, resiliency, and performance. For example, a device can harvest energy from this resource-
3 rich zone and be fully replenished in a seamless manner. A higher concentration of connectivity is expected where there are larger concentrations of people and thus, a greater need for energy harvesting [8]. Figure 2 also shows that the computational infrastructure within each chip will have advances over today s CMOS technology. The technology stack from devices to applications may be redesigned for power efficiency [8]. Sensors in these edge devices may be able to leverage the environment as potential sources of energy. Environmental elements such as vibrations, light, and airflow may generate sufficient electricity to enable the sensors to be self-sustaining [2]. Some computing/processing can be shifted to the Cloud to lessen the need of power for the edge devices. Data at the edges may be sent to the Cloud for more energy efficient processing. At the same time, energy efficiency in the core needs to be addressed or it might become a major cost of operation. Hardware and specialized computational devices embedded throughout the environment must be more robust and last longer in the future [8]. 2) Human-Computer Interface The earliest computers were large mainframes with batch processing used for scientific calculations in the late 40 s. The personal computer revolution started in late 60 s with the perspective changing to a one-to-one paradigm. Ubiquitous computing began 20 years later as microprocessors became integrated in a variety of devices [9]. We now move to the 4 th generation of computing, known as complementary computing, which further integrates computing devices into the human environment and blurs the distinction between humans and computers. The 4G computer network brings an increased level of individual self-sufficiency where any individual can have complete information on himself/herself, his environment, and the world [9]. As such, the human-to-computer interface (HCI) should be as natural as possible. Improved natural language processing and ability to capture multisensory input will be important aspects of advanced HCI [5]. The human-to-computer interaction is similar to having a best friend. The computer doesn t simply answer questions but anticipates needs as it learns and grows from the evolving history of interaction with the human [8]. It is also contextual aware to better aid the user [5]. The computer of the future acts as an aug-mentor, a computer mentor that augments human capabilities. The user never needs to ask for updates or think about synching devices. Information is automated and readily available to the user, and functions that are not needed or inefficient will be disabled when necessary [8]. The HCI would need to maintain a body of information for interaction with the user, such as user s preferences for various items and activities. The information is indexed and the user can ask questions of the computer or give commands. Having the user s evolving history of interaction with the computer and other data sources indexed in real time would create a higher computational load. This higher computational load might not be achievable without advances in rebooting computing technology [7]. 3) Dynamic Security If the computer of the future acts as an aug-mentor to the user, the concept of security and trust must go hand-in-hand. The user is trusting that the device has his or her best interests in mind and doing the right thing for the user [8]. In addition, with data moving freely between the worldwide network of devices and computers, security measures and solutions must be in place so that users can operate without fear of data diversion and eavesdropping [7]. Security cannot be an after-thought but be a key component and building block in the design and implementation process in all devices and networks. Security must be pervasive in every aspect of the components, systems, and networks. The number of intrusion points in a heterogeneous network with billions and possibly trillions of edge devices and core systems is staggering, and must be protected. In a world where ubiquitous computing is fully integrated into the lives of people at all levels of society, systems are expected to work correctly at all times despite possible hardware faults, software errors, and malicious intrusions [8]. Details need to be given at both hardware and software levels, with solutions that are dynamic and flexible to react and respond to new threats [9]. Special attention to mitigate high consequence failures must be taken into consideration as well [8]. Establishing forward-looking security standards and practices will help establish and implement a universal secured and trusted network of systems and devices. Current security systems represent a patchwork of solutions for different kinds of systems. Authenticating identity and privilege in platforms and applications and computation should be done universally and automatically. When there are flaws and exploitations, standard protocols must be devised for automatic updating of security software in new systems as well as legacy systems to minimize further damages [9]. C. Engines of Computation Mainstream and alternative computing technologies for future computing were discussed at RCS 2 and RCS 3. More R&D is needed for some of these technologies, but they have potential application in the development of IoT. 1) Augmenting CMOS The performance of CMOS devices and systems have been following Moore's law (doubling in performance every year or two) for the past several decades, together with device scaling to smaller dimensions and integration to larger scales. CMOS, however, appears to be reaching physical limits, including size and power density, but there is presently no technology available that can take its place [7]. The primary focus of the semiconductor industry has been on scaling digital integrated circuits. However, Moore s Law can be pursued at the system level by the use of orthogonal
4 scaling. One can focus on scaling the package and the board, instead of the chip [7]. One example of orthogonal scaling is when multiple memory chips are stacked (see Fig. 3). Fig. 3. Illustration of orthogonal scaling that continues to yield increased device density and performance even as Moore s Law device scaling seems to be ending [7]. This change in thinking in terms of scaling is in alignment with the work being developed by ITRS. ITRS is helping to guide the development of System in Package (SiP) technologies as a path to improve computing performance, power, cost, and size without dependence on conventional CMOS scaling. ITRS has a living document on SiP that is kept for use as a continuing reference to the state of the art in SiP. Stacked memory and logic devices and small modules have been the broadest adoption of SiP to date [10]. 2) Neuromorphic Computing Neuromorphic Computing is very different from conventional computing which is based on the classic von Neumann architecture where there is a separate arithmetic logic unit and a memory unit, and data is shuttled between these two units. In neuromorphic computing, logic and memory are closely integrated in the same basic device, the neuron, and in connections between neurons known as synapses. Neuromorphic computing leverages the organization of the brain (neurons, connecting synapses, hierarchies and levels of abstraction, etc.) to identify those features (massive device parallelism, adaptive circuitry, content addressable distributed memory) that may be emulated in electronic circuits [7]. The SyNAPSE project is a DARPA effort in neuromorphic computing. The SyNAPSE architecture (see Fig. 4) shows an example of the type of thinking behind neuromorphic computing, where CMOS circuits and adaptive crossbar junctions emulate the dynamic behavior of biological neurons and synapses [7]. Fig. 4. Memory/processing hierarchy in neural systems and in neuromorphic circuits [7]. Under DARPA s SyNAPSE, IBM researchers have designed a brain-inspired chip that has more than 5 billion transistors with a million electronic neurons and over 250 million synapses between neurons. Biological systems consume much less energy than current computers performing the same tasks. Each SyNAPSE-developed chip consumes less than 100 milliwatts of electrical power during operation. In one comparison using tasks of pattern recognition, the SyNAPSE-developed chip used two orders of magnitude less in energy than the traditional computing systems. This high energy efficiency is achieved partly by the chip running in an asynchronous manner similar to how the brain works, and processing and transmitting data only when needed. This new chip design and high energy efficiency makes it ideal for remote sensors where electrical power is limited [11]. Though we don t fully understand true intelligence and how the brain works yet, short-term progress can continue to be made in this field. Near-term efforts can focus on dynamic (unsupervised) machine learning, preferably in a low-power system such as a smartphone. This type of learning would have real application in image recognition, virtual reality, and anomaly detection [7]. Interdisciplinary collaboration with neuroscientists such as those working on the U.S. Brain Initiative would also be helpful [7]. 3) Approximate Computing Traditionally, computing hardware and software were designed for numerical calculations requiring a high degree of precision, but for many applications today such as image processing and data mining, a sufficiently good answer is enough. Conventional logic circuits are also highly sensitive to bit errors, but as devices get smaller, the likelihood of random errors increases. Approximate computing represents a variety of software and hardware approaches that seek to trade off accuracy for speed, efficiency, and error-tolerance [7]. Approximate computing is very similar to how the human brain works in terms of its ability to scale the degree of accuracy depending on the given task. Asking someone
5 whether dividing 500 by 21 is greater than one requires a lot less time and effort than asking if the answer is greater than 23 [12]. Since an approximate result can be obtained with decreased computation time, this translates to reduced power on devices. A computation that is only as accurate as needed will be lower in energy (and time) than one which always achieves maximum accuracy. This is important for edge devices that need to be energy efficient [7]. Researchers have shown to apply approximate computing to programmable processors. The interface between the software and hardware is altered to allow the software to tell the hardware the level of accuracy needed for a given task [12]. To progress further, the computer culture needs to adopt randomness/approximation more widely and permits it to be easily implemented. Embracing error holistically across the system stack, and in communication and storage, provide more opportunities to exploit the concept of approximation for more efficient and higher performance systems [9]. 4) Adiabatic/Reversible Computing One of the primary sources of power dissipation in digital circuits is associated with switching of transistors and other elements. Adiabatic and reversible computing describe a class of approaches to reducing power dissipation on the circuit level by minimizing and reusing switching energy, and applying supply voltages only when necessary [7]. Reductions in power can come from slowing down the clock speed of the circuits. This reduction in speed, which is opposite the traditional direction, can be compensated by increasing the integration scale and applying massive parallelism (see Table 1). A computer could be scaled from a 2D array of 10 8 gates in 1 cm 2, to a 3D array of gates in 1 cm 3. As reflected in Table 1, this type of scaling could lead to a power-efficiency improvement of While this is likely not possible with conventional CMOS and more research is needed, one might envision a 3D assembly with integrated logic and memory [7]. TABLE I. HOW TO GET ENHANCED COMPUTING PERFORMANCE USING ADIABATIC COMPUTING AND 3D DEVICE PACKAGING [7] Timeframe Today Changes Tomorrow Integration scale 10 8 logic transistors Clock speed 3 GHz 3000 slower Performance Chip is 2D comprised of 100 nm 2 gates logic transistors 3000 reduction in joules/op OR 3000 increase in energy efficiency 1 MHz Chip is 3D comprised of 100 nm 3 gates. On the software side, improved algorithms are an area that can provide energy-efficiency gains. Various algorithms may solve a particular computational problem, but they might utilize differing amount of time, memory, and energy. A reversible algorithm is one that can run forward or backward, and the theory is that when an algorithm is run backward, no energy is lost during the computation. For the new algorithms to work, they would need to run on a reversible computer with reversible components [13]. A tangential benefit to adiabatic/reversible computing is security. Energy is more uniformly distributed in this type of computing. Computer attacks that rely on figuring out how much and where energy is consumed will be tougher to achieve. Besides energy improvement, security will be another reason for companies to implement adiabatic/reversible computing in their infrastructure [13]. 5) Parallelism Current approaches in parallelism and supercomputing to improve computing performance can be limiting. High performance computing is based on massive parallelism which is inefficient and expensive due to the high cost of needed power and electricity. For example, present supercomputer hardware that is based on massive parallelism uses ~25 MW of power and costs about $25M. Programming of parallel computers is also inefficient due to the unpredictable effects of inhomogeneous heating. Temperatures can vary greatly which causes variance in clock speeds and uncontrolled latency [9]. To address some of these issues, new tools that will measure and predict distributions in latency and processor/memory execution will be helpful. Having software that provides users access to dynamically control processors and memory may better allow parallelism to work. Integrated processor and memory can also provide more effective parallelism with less data to move. Certainly, lower-power technology will be key to enabling even more massive parallelism [9]. Major hurdles will need to be overcome to achieve exascale computing, which is calculations per second. In a hearing held by the House Science Committee on America s Next Generation Supercomputer: The Exascale Challenge, one researcher/professor noted that the five major challenges to reaching exascale computing include: reducing power consumption by at least a factor of 50, increasing the parallelism of applications software and operating systems by at least a factor of 1000, developing new programming methods, improving memory performance and cost by a factor of 100, and improving systems reliability by at least a factor of 10. All components including processors, storage, wiring, and interconnections must be redesigned to achieve these factors [14]. IV. PATH TO INTERNET OF THINGS Several of the concepts discussed at the RC Summits have potential application to the development of an IoT environment. The three pillars of computing, which are
6 Energy Efficiency, Human-Computer Interface, and Security are important foundation in the Internet of Things. Similarly, the computing technologies and approaches discussed at the RC Summits may help in the maturation of the IoT. Each of the IoT-connected devices must be energy efficient and energy aware. The concept of the edge mobile devices harvesting energy from an intermediate edge infrastructure could be an architectural implementation design to be considered for IoT. Similarly, the oceans of data that need to be processed could be off-loaded to the core of large and powerful datacenters with advanced computing and processing to further minimizing power consumption of the edge devices so that energy harvesting is sufficient. At the same time, energy efficiency in the core or grid still need to be addressed or it might become a major cost of operation. Orthogonal Scaling and adiabatic computing with massive parallelism might help drive power reductions in the circuits in devices and systems not only in the core/grid but throughout the IoT environment. Applying the concept of dynamic and unsupervised machine learning in neuromorphic computing to the HCI and applications will most likely provide a better user-to-computer experience for the IoT edge device users. Some IoT applications can leverage approximate computing when an accurate answer is not necessary but a sufficiently good answer is enough to minimize energy consumption from user and network devices. Neuromorphic computing approaches offer great promises for efficiently analyzing large amounts of unstructured information under dynamic conditions that IoT demand. Circuit designs for the devices and systems in the IoT can leverage the approach of augmenting CMOS to enhance performance through orthogonal scaling of memory storage and processing power. Security is an important aspect in IoT as it may be the biggest system that mankind has ever built. With billions and perhaps trillions of nodes, security against unauthorized access or control must be distributed throughout the system. No centralized master protection system would be effective. Establishing forward-looking security standards and practices will help establish and implement a universal secured and trusted network of systems and devices. Each node must contain its own standardized security module that can automatically be updated with the latest protection algorithm. Furthermore, privacy must be maintained, which requires adequate encryption of data signals, as well as proper verification of authorized users. Below are some key elements to consider in the development of a fully secure IoT. Low power security Neuromorphic computing Machine learning Separation of devices/networks Fail properly techniques Anti-hacker techniques Leverage the physical in cyber/physical Aggressive response to attack (antibodies) Learn from fault tolerance Formal methods for simple systems Aggregation of data issues V. CONCLUSION Further R&D is needed for many of these promising Rebooting Computing technologies and approaches. They need to be further developed and matured before supplanting conventional CMOS and existing computing platforms, but their benefits in performance, power consumption, security, and human interaction are promising. At the same time, broader collaboration and partnership with organizations such as ITRS and the BRAIN initiative may help bring new ideas to the forefront to continue to further future computing technologies. Despite the apparent saturation of traditional Moore s Law device scaling, it seems clear that the exponential growth in numbers of devices connected to the Internet will continue for the foreseeable future. This is the vision of the Internet of Things (IoT), with seamless integration among edge devices, communication platforms, and high-performance computing engines. For these to work effectively, edge devices must be low-power or no-power (energy harvesting), while data centers must operate efficiently. The networks must operate autonomously, without centralized control or constant human monitoring. Furthermore, the networks must maintain security and foster trust. Finally, the IoT must be configured and programmed so as to improve the quality of life (health, information, education, entertainment, transportation, employment) for all citizens. We hope that the work done in the IEEE Rebooting Computing Initiative will contribute to the materialization of an effective, energy-efficient and secure IoT. ACKNOWLEDGMENT We thank the IEEE Rebooting Computing Steering Committee for allowing the use of the material from the Rebooting Computing Summits in this paper. REFERENCES [1] J. R. de Marca, "Coming Next: The Internet of Everything," IEEE the institute, 7 March [Online]. Available: [Accessed 28 October 2014]. [2] D. Evans, "The Internet of Things, How the Next Evolution of the Internet is Changing Everything," Cisco Internet Business Solutions Group (IBSG), April [Online]. Available: AL.pdf [Accessed 8 January 2015]. [3] S. Solur, "Internet of Things and Wearables," December [Online]. Available:
7 112.pdf [Accessed 8 January 2015]. [4] Goldman Sachs Global Investment Research, "What is the Internet of Things?," Goldman Sachs, September [Online]. Available: [Accessed 8 January 2015]. [5] IEEE Computer Society, "IEEE CS 2022 Report," IEEE, February [Online]. Available: [6] K. Pretz, "The Future of Computing," IEEE the institute, 8 March [Online]. Available: [Accessed 28 October 2014]. [7] A. Kadin and the IEEE Rebooting Computing Committee, "RCS 2 2nd Rebooting Computing Summit Summary Report," IEEE, June [Online]. Available: [8] R. Wedewer, "Rebooting Computing Summit - Event Summary," IEEE, December [Online]. Available: ng_computing_summary.pdf [9] A. Kadin and the IEEE Rebooting Computing Committee, "RCS 3 3rd Rebooting Computing Summit "Rethinking Structures of Computing" Summary Report," IEEE, Nov [Online] Available: naldraft9dec14.pdf [10] International Technology Roadmap for Semiconductors, "The Next Step in Assembly and Packaging: System Level Integration in the Package," [Online]. Available: [Accessed 9 January 2015]. [11] DARPA, "SyNAPSE Progam Develops Advanced Brain-inspired Chip," DARPA, 7 August [Online]. Available: [Accessed 9 January 2015]. [12] E. Venere, Approximate computing' improves efficiency, saves energy," Purdue University, 17 December [Online]. Available: [Accessed 10 January 2015]. [13] N. Stauffer, "Energy-efficient Computing," MIT Energy Initiative, 20 June [Online]. Available: [Accessed 11 January 2015]. [14] I. Wladawsky-Berger, "Parallel Supercomputing: Past, Present and Future," CIO Journal, 2 August [Online]. Available: [Accessed 11 January 2015].
NVM memory: A Critical Design Consideration for IoT Applications
NVM memory: A Critical Design Consideration for IoT Applications Jim Lipman Sidense Corp. Introduction The Internet of Things (IoT), sometimes called the Internet of Everything (IoE), refers to an evolving
CONTENTS. Introduction 3. IoT- the next evolution of the internet..3. IoT today and its importance..4. Emerging opportunities of IoT 5
#924, 5 A The catchy phrase Internet of Things (IoT) or the Web of Things has become inevitable to the modern world. Today wireless technology has reached its zenith making it possible to interact with
A Hurwitz white paper. Inventing the Future. Judith Hurwitz President and CEO. Sponsored by Hitachi
Judith Hurwitz President and CEO Sponsored by Hitachi Introduction Only a few years ago, the greatest concern for businesses was being able to link traditional IT with the requirements of business units.
Advanced Core Operating System (ACOS): Experience the Performance
WHITE PAPER Advanced Core Operating System (ACOS): Experience the Performance Table of Contents Trends Affecting Application Networking...3 The Era of Multicore...3 Multicore System Design Challenges...3
How To Understand The Power Of The Internet Of Things
Next Internet Evolution: Getting Big Data insights from the Internet of Things Internet of things are fast becoming broadly accepted in the world of computing and they should be. Advances in Cloud computing,
Accenture and Oracle: Leading the IoT Revolution
Accenture and Oracle: Leading the IoT Revolution ACCENTURE AND ORACLE The Internet of Things (IoT) is rapidly moving from concept to reality, as companies see the value of connecting a range of sensors,
Nanocomputer & Architecture
Nanocomputer & Architecture Yingjie Wei Western Michigan University Department of Computer Science CS 603 - Dr. Elise dedonckor Febrary 4 th, 2004 Nanocomputer Architecture Contents Overview of Nanotechnology
Enabling the SmartGrid through Cloud Computing
Enabling the SmartGrid through Cloud Computing April 2012 Creating Value, Delivering Results 2012 eglobaltech Incorporated. Tech, Inc. All rights reserved. 1 Overall Objective To deliver electricity from
THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS
THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein INNOVATORS START HERE. EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly growing data
NanopowerCommunications: Enabling the Internet of Things OBJECTS TALK
NanopowerCommunications: Enabling the Internet of Things OBJECTS TALK When objects can both sense the environment and communicate, they become tools for understanding complexity and responding to it swiftly.
Internet of Things: Consumerisation of Technology. www.avasant.com
: Consumerisation of Technology Technology democratization has weaved an ecosystem powered by intelligent systems, connectivity services, analytics, and technology infrastructure to deliver services. With
Circuit Protection is Key in Maintaining Growth for The Internet of Things
Circuit Protection is Key in Maintaining Growth for The Internet of Things INTRODUCTION The Internet of Things (IoT) promises a future that networks billions of smart, connected devices. The value of this
The Internet of Things: Opportunities & Challenges
The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is
On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma [email protected] CpE 6510 3/24/2016
On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma [email protected] CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT
An Open Architecture through Nanocomputing
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore An Open Architecture through Nanocomputing Joby Joseph1and A.
Data Center Network Evolution: Increase the Value of IT in Your Organization
White Paper Data Center Network Evolution: Increase the Value of IT in Your Organization What You Will Learn New operating demands and technology trends are changing the role of IT and introducing new
O p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s
EXECUTIVE BRIEF O p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s Adapted from IDC research by Eric Owen Click here to enter text. September 2014 INTRODUCTION
UPnP: The Discovery & Service Layer For The Internet of Things April 2015
UPnP: The Discovery & Service Layer For The Internet of Things April 2015 The First Chapter: The Connected Home In late 1999, the founding members of what would become the UPnP Forum started to put together
The Evolving Internet of Things Market
The Evolving Internet of Things Market Key Trends and Implications By Kevin Foley, Todd Bricker and Syed Raza The phrase Internet of Things (IoT) is firmly established in today s business lexicon but no
Energy Efficiency: The Common Denominator in the Internet of Things
Energy Efficiency: The Common Denominator in the Internet of Things March 2015 Lattice Semiconductor 5555 Northeast Moore Ct. Hillsboro, Oregon 97124 USA Telephone: (503) 268-8000 www.latticesemi.com 1
See what cloud can do for you.
See what cloud can do for you. Uncomplicating cloud business Table of contents Introduction 3 Why cloud is relevant for your business? 4 What is changing? 4 Why organizations are moving to cloud 5 What
In the pursuit of becoming smart
WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution
Intelligent Infrastructure Solutions. imvision. Infrastructure Management. Made Easy.
TM Intelligent Infrastructure Solutions imvision. Infrastructure Management. Made Easy. Every network must be managed. The question is HOW? The vision: Business success that starts with better-managed
Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID}
Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID} John Soldatos Associate Professor, Athens Information Technology
VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology
VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn
Predicting From the Edge in an
Predicting From the Edge in an IoT World IoT will produce 4,400 exabytes of data or 4,400 billion terabytes between 2013 and 2020. (IDC) Today, in the Internet of Things (IoT) era, the Internet touches
Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge
Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge This paper will present a case study of Lumeta s participation in an open
Database Security, Virtualization and Cloud Computing
Whitepaper Database Security, Virtualization and Cloud Computing The three key technology challenges in protecting sensitive data in modern IT architectures Including: Limitations of existing database
PKI: THE SECURITY SOLUTION FOR THE INTERNET OF THINGS
PKI: THE SECURITY SOLUTION FOR THE INTERNET OF THINGS TABLE OF CONTENTS 2 EXECUTIVE SUMMARY 3 THE EMERGENCE OF THE INTERNET OF THINGS 4 SECURITY RISKS IN NETWORKED DEVICES 6 PKI S FOUNDATION OF STRONG
CS144R/244R Network Design Project on Software Defined Networking for Computing
CS144R/244R Network Design Project on Software Defined Networking for Computing (introduction and course overview) 9/2/2015 Instructor: Professor HT Kung Harvard Paulson School of Engineering and Applied
Towards a common definition and taxonomy of the Internet of Things. Towards a common definition and taxonomy of the Internet of Things...
Towards a common definition and taxonomy of the Internet of Things Contents Towards a common definition and taxonomy of the Internet of Things... 1 Introduction... 2 Common characteristics of Internet
Sensing, monitoring and actuating on the UNderwater world through a federated Research InfraStructure Extending the Future Internet SUNRISE
Sensing, monitoring and actuating on the UNderwater world through a federated Research InfraStructure Extending the Future Internet SUNRISE Grant Agreement number 611449 Announcement of the Second Competitive
Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex
Reasons to Choose the Juniper ON Enterprise Network
Reasons to Choose the Juniper ON Enterprise Network Juniper s enterprise access products meet the always-on needs of today s enterprises by delivering solutions that are reliable, simple, and smart. The
Internet of Things From Idea to Scale
PRG Symposium Internet of Things From Idea to Scale September 12, 2014 [email protected] @AlexBlanter You are here today because you are interested in the Internet of Things and so is everybody
Understanding the impact of the connected revolution. Vodafone Power to you
Understanding the impact of the connected revolution Vodafone Power to you 02 Introduction With competitive pressures intensifying and the pace of innovation accelerating, recognising key trends, understanding
Internet of Things (IoT): A vision, architectural elements, and future directions
SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: [email protected] Table of contents Open challenges
Big Data Driven Knowledge Discovery for Autonomic Future Internet
Big Data Driven Knowledge Discovery for Autonomic Future Internet Professor Geyong Min Chair in High Performance Computing and Networking Department of Mathematics and Computer Science College of Engineering,
The 5G Infrastructure Public-Private Partnership
The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility
Chapter 4 IT Infrastructure: Hardware and Software
1 Chapter 4 IT Infrastructure: Hardware and Software LEARNING TRACK 1: THE EVOLUTION OF IT INFRASTRUCTURE Evolution of IT Infrastructure: 1950 2005 The IT infrastructure in organizations today is an outgrowth
The Vision for. the Internet of Things
The Vision for the Internet of Things CS525T Fall 2015 Internet of Things (IoT) CS525 IoT Vision 2 Cisco Commercial CS525 IoT Vision 3 A Few IoT Facts The phrase Internet of Things was first used in 1999.
Security and the Internet of Things (IoT)
Security and the Internet of Things (IoT) Analysis and Recommendations for IoT Manufacturers and IT/Business Executives Wei (Weslay) Xu Tuck School of Business at Dartmouth 03/20/2015 High Level Description
Security and the Internet of Things
Security and the Internet of Things Joe Sanford 1. Abstract More and more smart devices are being introduced to the market, allowing end-users to have more of the devices they use every day to be connected
Phase Change Memory for Neuromorphic Systems and Applications
Phase Change Memory for Neuromorphic Systems and Applications M. Suri 1, O. Bichler 2, D. Querlioz 3, V. Sousa 1, L. Perniola 1, D. Vuillaume 4, C. Gamrat 2, and B. DeSalvo 1 ([email protected], [email protected])
ANALYTICS BUILT FOR INTERNET OF THINGS
ANALYTICS BUILT FOR INTERNET OF THINGS Big Data Reporting is Out, Actionable Insights are In In recent years, it has become clear that data in itself has little relevance, it is the analysis of it that
The Internet of Things... Hype or not?
The Internet of Things... Hype or not? Filip De Maeyer Philip Leenders 2013 global revenues of USD 5.8 billion Client-centric, services-focused business 73% of Global Fortune 100 and 59% of Global Fortune
Summer projects for Dept. of IT students in the summer 2015
Summer projects for Dept. of IT students in the summer 2015 Here are 7 possible summer project topics for students. If you are interested in any of them, contact the person associated with the project
IBM and Dynamic Infrastructure. Doug Neilson, IBM Systems Group May 2009
IBM and Dynamic Infrastructure Doug Neilson, IBM Systems Group May 2009 IBM s Smarter Planet Strategy Every human being, company, organization, city, nation, natural system and man-made system is becoming
IoT: New Opportunities for Semiconductor Industry Growth. Andrew C. Russell Vice President Marketing Greater China
IoT: New Opportunities for Semiconductor Industry Growth Andrew C. Russell Vice President Marketing Greater China Agenda The Internet of Things ( IoT ): An Exciting, Disruptive Technology and Application
The Rise of Intelligent Systems: Connecting Enterprises and Smart Devices in Seamless Networks
I D C I V I E W The Rise of Intelligent Systems: Connecting Enterprises and Smart Devices in Seamless Networks April 2012 Content for this paper is excerpted directly from the IDC iview, "The Rise of Intelligent
DesignWare IP for IoT SoC Designs
DesignWare IP for IoT SoC Designs The Internet of Things (IoT) is connecting billions of intelligent things at our fingertips. The ability to sense countless amounts of information that communicates to
A New Chapter for System Designs Using NAND Flash Memory
A New Chapter for System Designs Using Memory Jim Cooke Senior Technical Marketing Manager Micron Technology, Inc December 27, 2010 Trends and Complexities trends have been on the rise since was first
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
WHITE PAPER OCTOBER 2014. Unified Monitoring. A Business Perspective
WHITE PAPER OCTOBER 2014 Unified Monitoring A Business Perspective 2 WHITE PAPER: UNIFIED MONITORING ca.com Table of Contents Introduction 3 Section 1: Today s Emerging Computing Environments 4 Section
IBM Enterprise Content Management Product Strategy
White Paper July 2007 IBM Information Management software IBM Enterprise Content Management Product Strategy 2 IBM Innovation Enterprise Content Management (ECM) IBM Investment in ECM IBM ECM Vision Contents
alcatel-lucent converged network solution The cost-effective, application fluent approach to network convergence
alcatel-lucent converged network solution The cost-effective, application fluent approach to network convergence the corporate network is under pressure Today, corporate networks are facing unprecedented
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
Simple. Extensible. Open.
White Paper Simple. Extensible. Open. Unleash the Value of Data with EMC ViPR Global Data Services Abstract The following paper opens with the evolution of enterprise storage infrastructure in the era
NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China
NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China Agenda The Internet of Things ( IoT ): a New and Exciting Application Space A typical IoT application Lighting for Home
Preparing your network for the mobile onslaught
IBM Global Technology Services Thought Leadership White Paper Preparing your network for the mobile onslaught How networks can overcome the security, delivery challenges posed by mobile devices 2 Preparing
Big data platform for IoT Cloud Analytics. Chen Admati, Advanced Analytics, Intel
Big data platform for IoT Cloud Analytics Chen Admati, Advanced Analytics, Intel Agenda IoT @ Intel End-to-End offering Analytics vision Big data platform for IoT Cloud Analytics Platform Capabilities
Machina Research Viewpoint. The critical role of connectivity platforms in M2M and IoT application enablement
Machina Research Viewpoint The critical role of connectivity platforms in M2M and IoT application enablement June 2014 Connected devices (billion) 2 Introduction The growth of connected devices in M2M
Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking
ProCurve Networking by HP Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking Introduction... 2 Today s Network Security Landscape... 2 Accessibility...
The Internet of Things (IoT)
The Internet of Things (IoT) The New New Thing October 2014 Smart Planet Green Environment Environmental Sensors Water, power leak detection Pollution, weather monitoring Smart Cities Connected Communities
Applying Mesh Networking to Wireless Lighting Control
White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
DESIGN CHALLENGES OF TECHNOLOGY SCALING
DESIGN CHALLENGES OF TECHNOLOGY SCALING IS PROCESS TECHNOLOGY MEETING THE GOALS PREDICTED BY SCALING THEORY? AN ANALYSIS OF MICROPROCESSOR PERFORMANCE, TRANSISTOR DENSITY, AND POWER TRENDS THROUGH SUCCESSIVE
Harmonizing Government Policies and Enterprise Strategies for IoT Business
Harmonizing Government Policies and Enterprise Strategies for IoT Business KEON CHUL PARK 1, JEMIN JUSTIN LEE 2, SANG HOO OH 1, BONG GYOU LEE 1 1 Graduate School of Information 2 Department of Technology
Sustainability and Energy Efficiency in Data Centers Design and Operation
Sustainability and Energy Efficiency in Data Centers Design and Operation Krishna Kant Intel and GMU [email protected] David Du University of Minnesota [email protected] Abstract The tutorial will provide
Business Intelligence of the Future. kpmg.com
Business Intelligence of the Future kpmg.com 1 Business Intelligence (BI) of the Future An Intelligent Enterprise What will Business Intelligence (BI) look like by year 2020? BI will become an innovation
GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015
GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015 IoT Innovation Lab Sponsors IoT 101 Defining the Internet s Next Big
A Look at the New Converged Data Center
Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable
BSC vision on Big Data and extreme scale computing
BSC vision on Big Data and extreme scale computing Jesus Labarta, Eduard Ayguade,, Fabrizio Gagliardi, Rosa M. Badia, Toni Cortes, Jordi Torres, Adrian Cristal, Osman Unsal, David Carrera, Yolanda Becerra,
Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战
Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: [email protected]
STMicroelectronics is pleased to present the. SENSational. Attend a FREE One-Day Technical Seminar Near YOU!
SENSational STMicroelectronics is pleased to present the SENSational Seminar Attend a FREE One-Day Technical Seminar Near YOU! Seminar Sensors and the Internet of Things are changing the way we interact
Top Six Considerations
Top Six Considerations for Upgrading to table of contents + Section I: Introduction Understanding...2 + Section II: Uses Cases for... 3 + Section III: Top 6 considerations for...5 + Section IV: Conclusion...
David Lawler Vice President Server, Access & Virtualization Group
Data Center & Cloud Computing David Lawler Vice President Server, Access & Virtualization Group 2009 Cisco Systems, Inc. All rights reserved. 1 We Are Facing Unparalleled Growth 1.7 billion+ people on
An Introduction to the Internet of Things (IoT)
An Introduction to the Internet of Things (IoT) Part 1. of The IoT Series November 2013 Lopez Research LLC 2269 Chestnut Street #202 San Francisco, CA 94123 T (866) 849-5750 E [email protected] W
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
I D C M A R K E T S P O T L I G H T
I D C M A R K E T S P O T L I G H T The New IP: Building the Foundation of Datacenter Network Automation March 2015 Adapted from Worldwide Enterprise Communications and Datacenter Network Infrastructure
Low-Overhead Hard Real-time Aware Interconnect Network Router
Low-Overhead Hard Real-time Aware Interconnect Network Router Michel A. Kinsy! Department of Computer and Information Science University of Oregon Srinivas Devadas! Department of Electrical Engineering
Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era
Sponsored by Oracle Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era Introduction About Survey Respondents The Internet of Things (IoT) and the rise of
The Impact of IoT on Semiconductor Companies
Advisory The Impact of IoT on Semiconductor Companies Rajesh Mani Director, Strategy and Operations April 15, 2015 The Internet of Things (IoT) has been defined in multiple ways here s our take! The collection
White Paper: Pervasive Power: Integrated Energy Storage for POL Delivery
Pervasive Power: Integrated Energy Storage for POL Delivery Pervasive Power Overview This paper introduces several new concepts for micro-power electronic system design. These concepts are based on the
FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE
FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE The demand for cloud infrastructure is rapidly increasing, the world of information is becoming application and
Visibility in the Modern Data Center // Solution Overview
Introduction The past two decades have seen dramatic shifts in data center design. As application complexity grew, server sprawl pushed out the walls of the data center, expanding both the physical square
Data Centric Systems (DCS)
Data Centric Systems (DCS) Architecture and Solutions for High Performance Computing, Big Data and High Performance Analytics High Performance Computing with Data Centric Systems 1 Data Centric Systems
THE Internet is a powerful tool used in all kinds of the
Proceedings of the Federated Conference on Computer Science and Information Systems pp. 1343 1348 DOI: 10.15439/2015F161 ACSIS, Vol. 5 Selected methods of artificial intelligence for Internet of Things
