345 research outputs found

    The web of things and database management systems

    Get PDF
    The Web of Things (WoT) is slowly gaining grounds and through the properties of barcodes, QR codes, RFID, active sensors and IPv6, objects are fitted with some form of readability and traceability. People are becoming part of digital global network driven by personal interests. The feeling being part of a community and the constant drive of getting connected from real life finds it continuation in digital networks. This paper investigates the concepts of the internet of things from the aspect of the autonomous mobile robots with an overview of the performances of the currently available database management systems

    Towards Addressing the Opportunities and Challenges of Web 2.0 for Health and Informatics

    Get PDF
    Objective: To provide an overview of Web 2.0 and Health 2.0, and so facilitate a widespread discussion of the nature of these concepts and their possible application within the health domain, and implications for health and biomedical informatics and for IMIA. Methods: IMIA, the International Medical Informatics Association, has established a Web 2.0 Exploratory Taskforce to bring together interested individuals from within and outside IMIA to explore the nature and potential of Web 2.0 applications. The Taskforce aims to develop background materials and sample uses of Web 2.0 applications, so as to propose specific lines of action for the IMIA Board and General Assembly. This paper provides a brief overview of Web 2.0 and related concepts, and examples of general and healthspecific Web 2.0 applications. Some examples of the issues, challenges and opportunities are introduced, to set the scene for a wider dialogue on if, how, and how best, IMIA, and the wider health and informatics communities, should use these new applications and approaches. Results and conclusions: This brief paper provides an introduction to, and overview of, the many issues involved in considering the application of Web 2.0 to health and informatics. All interested individuals and organisations are invited to use this as a starting point for engaging in wider discussion and contributing to the Taskforce and to IMIA\u27s future. Keywords IMIA, health informatics, medical informatics,IA,

    Emerging technologies for learning report (volume 3)

    Get PDF

    Next generation IT - Computing in the cloud life after jurassic OO middleware

    Get PDF
    It is painfully clear that current middleware cannot provide agility nor provide cost effective scalable commodity infrastructure. Current IT applications programming technology is too complex and too inefficient to leverage next generation infrastructures On top of this we are facing an acute shortage of skilled application developers. Hence we need to consider simpler alternative solutions, of which cloud computing and functional Infrastructure enabled Domain Oriented Programming seem to be the most promising on the horizon. Simple services enable agility and leverage scaleable commodity technology. Functional Services enable rapid application development and enable the service infrastructure to handle concurrency. Domain Oriented Programming enables domain specific service development on top of which Business Programming empowers business teams with embedded developers to deliver applications quickly

    Reimagining Development 3.0 for a Changing Planet

    Get PDF
    This working paper argues we need to reimagine development tactics to fashion Development 3.0, to match what business analysts now call World 3.0, a global system characterized by high turbulence and new threats. It begins by contrasting our former classification of countries spatially into First, Second and Third worlds with a new division of development epochs in sequence since the end of World War II. World 1.0 emphasized industrialization, urbanization, and modernization, lasting from 1945 to 1980. World 2.0 emphasized global trade, and a shift to private actors doing the work of development, from 1980 to the early 2000s. World 3.0 can be seen as superceding globalization by concern with emergent threats. World 1.0 privileged state actions to accelerate “nation building” within former colonies, whereas World 2.0 privileged private capital and free trade as engines for economic growth. Now, following wars, disasters, and the near meltdown of the global financial system in 2007/08, we enter World 3.0 as depicted by Ghemawat and others. We review thirteen major changes not recognized within World 2.0 or its accompanying Development 2.0 regime. The major changes include the rise of homeless capital, the Conservative counter-revolution of the 1980s, the implosion of the USSR, rise of modern China, emergence of BRIC nations, a pan-urban world, rise of identity politics, reemergence of Africa, shift to non-state warfare, growing threat of climate change, MENA nations experience Arab Spring, digital worlds expand, and velocity increases. They suggest coming turbulence and unexpected outcomes, or “mashups” (Ramo). These changes suggest a different emergent system, becoming World 3.0 which has profound differences from how we view our planet’s political economy (World 2.0). If so, the paper outlines implications which suggest the time has come to “take on board” our changed planetary circumstances, and thus begin crafting Development 3.0. “Where the wild things are”, introduces metaphors to change the ‘meta-narratives’ used for viewing World 3.0: “herding elephants,” “taming feral capital”, “swimming with tides” and “avoiding mashups”. They help us realize that long recognized problems (or “elephants”) may show unexpected behaviors to pose new threats within World 3.0. The main argument of the paper then lays out a baker’s dozen changes needed if we hope to fashion more effective ways to promote development for us all. We must “rebalance society” (ala Mintzberg), refashion aid, privilege sustainability, emphasize fair trade, tame feral capital, devise better metrics, include all nations & peoples, seat G-20 not G-8, recognize semi-sovereigns, focus on a pan-urban world, build coalitions in networks, involve women & youth, and rebuild community leadership. All of which assumes we can offset a strong tide towards return to the excesses of World 2.0

    Adapting Copyright for the Mashup Generation

    Get PDF

    The Penetration of Internet of Things in Robotics: Towards a Web of Robotic Things

    Get PDF
    As the Internet of Things (IoT) penetrates different domains and application areas, it has recently entered also the world of robotics. Robotics constitutes a modern and fast-evolving technology, increasingly being used in industrial, commercial and domestic settings. IoT, together with the Web of Things (WoT) could provide many benefits to robotic systems. Some of the benefits of IoT in robotics have been discussed in related work. This paper moves one step further, studying the actual current use of IoT in robotics, through various real-world examples encountered through a bibliographic research. The paper also examines the potential ofWoT, together with robotic systems, investigating which concepts, characteristics, architectures, hardware, software and communication methods of IoT are used in existing robotic systems, which sensors and actions are incorporated in IoT-based robots, as well as in which application areas. Finally, the current application of WoT in robotics is examined and discussed

    Sharing Human-Generated Observations by Integrating HMI and the Semantic Sensor Web

    Get PDF
    Current “Internet of Things” concepts point to a future where connected objects gather meaningful information about their environment and share it with other objects and people. In particular, objects embedding Human Machine Interaction (HMI), such as mobile devices and, increasingly, connected vehicles, home appliances, urban interactive infrastructures, etc., may not only be conceived as sources of sensor information, but, through interaction with their users, they can also produce highly valuable context-aware human-generated observations. We believe that the great promise offered by combining and sharing all of the different sources of information available can be realized through the integration of HMI and Semantic Sensor Web technologies. This paper presents a technological framework that harmonizes two of the most influential HMI and Sensor Web initiatives: the W3C’s Multimodal Architecture and Interfaces (MMI) and the Open Geospatial Consortium (OGC) Sensor Web Enablement (SWE) with its semantic extension, respectively. Although the proposed framework is general enough to be applied in a variety of connected objects integrating HMI, a particular development is presented for a connected car scenario where drivers’ observations about the traffic or their environment are shared across the Semantic Sensor Web. For implementation and evaluation purposes an on-board OSGi (Open Services Gateway Initiative) architecture was built, integrating several available HMI, Sensor Web and Semantic Web technologies. A technical performance test and a conceptual validation of the scenario with potential users are reported, with results suggesting the approach is soun

    SECURING THE DATA STORAGE AND PROCESSING IN CLOUD COMPUTING ENVIRONMENT

    Get PDF
    Organizations increasingly utilize cloud computing architectures to reduce costs and en- ergy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issues with publicly available cloud computing infrastructures have not been studied to a sufficient depth for or- ganizations and individuals to be fully informed of the risks; neither are private nor public clouds prepared to properly secure their connections as middle-men between mobile de- vices which use encryption and external data providers which neglect to encrypt their data. Furthermore, cloud computing providers are not well informed of the risks associated with policy and techniques they could implement to mitigate those risks. In this dissertation, we present a new layered understanding of public cloud comput- ing. On the high level, we concentrate on the overall architecture and how information is processed and transmitted. The key idea is to secure information from outside attack and monitoring. We use techniques such as separating virtual machine roles, re-spawning virtual machines in high succession, and cryptography-based access control to achieve a high-level assurance of public cloud computing security and privacy. On the low level, we explore security and privacy issues on the memory management level. We present a mechanism for the prevention of automatic virtual machine memory guessing attacks

    TechNews digests: Jan - Nov 2009

    Get PDF
    TechNews is a technology, news and analysis service aimed at anyone in the education sector keen to stay informed about technology developments, trends and issues. TechNews focuses on emerging technologies and other technology news. TechNews service : digests september 2004 till May 2010 Analysis pieces and News combined publish every 2 to 3 month
    • 

    corecore