Iot Or Ubiquitous Computing ■A Sudden Surge of Interest in Iot, Or Ubiquitous Computing Around the Year 2000 in Japan

Total Page:16

File Type:pdf, Size:1020Kb

Iot Or Ubiquitous Computing ■A Sudden Surge of Interest in Iot, Or Ubiquitous Computing Around the Year 2000 in Japan Japppan’s Perspective on IoT and Ubiquitous Computing International Experience Session. The Internet of Things Europe 2010 Ken Sakamura Professor, the University of Tokyo Director/CEO of YRP Ubiquitous Networking Laboratory Chair, TT--EngineEngine Forum, and uID Center TRON Project (since 1984) ■“…most machines in our surrounding environment including pieces of furniture will use computers. It is conceivable that 100 computers for a man will exist.” … ● Ken Sakamura: “The Objectives of the TRON Project”, in TRON Project 1987, Springer-Verlag, 1987, pp. 3-16. 2 Copyright © 2010 by Ken Sakamura 1 Year 2000: IoT or Ubiquitous Computing ■A sudden surge of interest in IoT, or Ubiquitous Computing around the year 2000 in Japan. ■Why? ● New generation of very small passive RFID tags. ━Internet had become popular. ━Small, powerful embedded computer systems used in mobile phones, sensors, etc.. ● The expectation of new application area using new devices. 3 New Generation of Passive RFID Chips ■ RFID technology has been around for a long time. ● But they had been large hardware. ━ Card-like shape. ━ Bulky tag like UHF tag. ■ Hitachi‘s mu-chip tag (2.45 GHz) changed the perception. ━ Small (0 .4mm ×04mm0.4mm) ━ Inexpensive (now 10-20 cents / unit). ■ People began to think really seriously about putting these tag chips to objects like individual goods finally. 4 Copyright © 2010 by Ken Sakamura 2 How to Use the New RFID Chips? ■Very s mall amou nt o f me mo ry. A doze n bytes or so at most. ■The concept of “uID Architecture” using Ubiquitous Communicator. ● Store only the short identifier inside the tag chip. ● The information associated with the ID is stored on remote servers on the network, and is fetched by applications when they need it. 5 ■Is such approach tenable? ● Supporting Technology ━The network : The Internet had become popular. ━The mobile user device: powerful mobile phones had become popular in Japan. We can embed R/W is such a device. 6 Copyright © 2010 by Ken Sakamura 3 The Vision of Ubiquitous Communicator Terminal ■“UC” for short ■A mobile communication terminal with reader/writer device of RFID tag and networking capability. 7 uID architecture as General Framework for Many Applications ■Everyyybody circa the y ear 2000 claimed that RID tag chips were too expensive. ■In order to lower the cost, we needed an application architecture that is ● as general as possible ● TbTo be use did in many appli litications. ■This also led to the development of uID architecture as a simple and general architecture applicable to many applications. 8 Copyright © 2010 by Ken Sakamura 4 uID Architecture uID Architecture: Principle of Operations 10 Copyright © 2010 by Ken Sakamura 5 Features of uID Architecture ■ A Computer Application Framework ■ Major features ● Tag-agnostics : any tags can be used (including barcode, passive RFID tags, etc.) ● Tags carry only an identifier, ucode, a simple number. ● Objects and places are marked with tags for identification. ● Information about objects and places are stored in remote servers, and are fetched from remote servers after “Resolution”. ● Simple ■ A bridge between the real world (tagged objects and places) and the virtual world (information about the objects and locations). 11 Some Merits of uID Architecture ■ucode, the identifier is 128 bits (only 16 octets). IitbdtthiInexpensive tags can be used store this identifier. ■uID architecture doesn’t impose any meaning to the bit fields of ucode. ucode is a plain number without any meaning. (Non-semantic code) ■It is easy to embed existing legacy product code systems within ucode since there is no a priori meaning to the bit-fields, and 128bits are wide enough. 12 Copyright © 2010 by Ken Sakamura 6 Ubiquitous Networking: One Assumption behind uID Architecture ■The use of network is mandatory for the resolution process in uID architecture. ■Comment ● In 2010, network access is ubiquitous. 3G, WiFi, Wi-Max, and other broadband network technology. ● Not storing information inside tags, and storing it in the information server has an advantage: less powerful tags can be used, and network security practice to control access to information can be employed. 13 Open Architecture ■uID Architecture is “Open” ● Technical specifications will be made freely available to the public. ● Technology for social infrastructure should be under the control of the masses. ● It should not be under the control of single or a few parties. ■Thus the “Open Architecture” 14 Copyright © 2010 by Ken Sakamura 7 YRP UNL an d its R&D Agenda Back to the history from 2000 15 Establishing YRP UNL to Codify Well- understood Application Practices ■People began asking then how and for what the uID architecture can be used ■YRP Ubiquitous Networking Laboratory (UNL for short). ■I serve as the director/CEO since its inception in FY 2001. ■A laboratory for R&D on Ubiquitous Computing (IoT in other words) with researchers from both industry and academia. 16 Copyright © 2010 by Ken Sakamura 8 UNL’s Goals: New Applications ■We set out to codify how uID architecture can be applied to various application issues. ■We eventually found two important classes of applications of uID architecture . ● Applications for Objects ● Applications for Places 17 Application for Objects ■Ttthdt“Objt”Tags are attached to “Objects”. ● Traceability (Food, Medical Drug, etc.) ● Maintenance ● Inventory Control ■Observ ation: ● In Japan, SCM is shadowed by maintenance and inventory control (in warehouses, and such) in terms of interest shown. 18 Copyright © 2010 by Ken Sakamura 9 Food Traceability Systems ■ Food packaged are marked for identifi cat ion by tags, barcodes, etc. ■ People with suitable terminal can identify the packages and learn ● When the package was made, ● By whom , ● Where, and ● And other info such as before which date the package should be consumed. ■ Application of tags on objects 19 Examples of Application for Objects 20 Copyright © 2010 by Ken Sakamura 10 Application for Places ■There a re ma ny feas ib ility study experiments conducted all over Japan. ■We assign ucode to places, and embed ucode tags (passive and active RFID tags, infrared markers,,)p etc.) in places. ■Users obtain location-based (i.e., location- specific) information such as route guidance, public facility help, etc. 21 uID-based IoT Applications in Japan Copyright © 2010 by Ken Sakamura 11 Privacy and Security ■Alreadyyjp a major topic ● CASPIAN formed in 1999. ■Major issues had been already identified and discussed by the time UNL was established. ■We set out to evaluate various issues in the real-world feasibility experiments. ● Also, looked for oversights or unexpected issues in uID architecture framework. 23 ■Public (or government) ilinvolvemen ttt to identification issues of individuals is mandatory. ■When identification of individuals are beneficial ((punder a watchful public scrutiny!). ● Accident victims who can’t speak for themselves. ● Disaster refugees in the case of earthquakes. Disaster Relief 24 Copyright © 2010 by Ken Sakamura 12 Wide Deployment in Japan ■Many deployment examples based on uID architecture. ■These are led by ● Private Industry ● Government (regional and national) ● Our Laboratory (YRP UNL) itself. 25 Concluding Remarks (1) ■Why we designed uID architecture. ● To use low-cost tags with limited amount of memory. ━Optical barcode (such as two-D code can be used.) ■The basic principle of uID architecture ● Network Access Control ━Security and Privacy: With uID architecture, the network security practice is applicable to the protection of data related to objects and places. 26 Copyright © 2010 by Ken Sakamura 13 Concluding Remarks (2) ■Application of uID architecture in Japan. ● Many feasibility study experiments which paved the way for useful future services in Japan. ● Many government offices (local and national) and commercial entities are interested in using the uID architecture in the future in Japan. ■What about the use of uID architecture in fooegreign cou coutntries? ● What is the governance of uID architecture? ● “Who issues ucodes?” ● “Do we have to get in contact with Japan's uID center each time we need ucodes?” ● Please don’t worry because … 27 Governance of uID Architecture ■Distributed Governance ● Such an arrangement is necessary and a minimum requirement to satisfy international user needs. ■Our policy: set up regional uID centers and let them handle local issue of ucodes. ● Large ucode subspaces is handed over to these regional uID centers to manage the issuance for the users nearby. ● Issuance to each regional customer doesn't have to be reported back to Japan's uID center. ■We hope to see a uID center in EU region which services users nearby. 28 Copyright © 2010 by Ken Sakamura 14 Development Outside Japan ■ CASAGRAS-2 (EU FP7) ● YRP UNL is a member and plans to contribute to resolution concept and design. ■ uID Center / Taipei ■ T-Engine Forum China ● a nickname of a government office ● Supported by ━ Institute of Computing Technology (ICT) of Chinese Academy of Sciences (CAS) ━ China Household Electric Appliance Research Institute (CHEARI) ■ Other activies in other places, too. ■ You are welcome to join the activities! 29 Than k you. http://www.t-engine.org http://www.uidcenter.org 30 Copyright © 2010 by Ken Sakamura 15.
Recommended publications
  • Human-Computer Interaction Technologies in Japan
    Japanese Technology Evaluation Center JTEC JTEC Panel Report on HUMAN-COMPUTER INTERACTION TECHNOLOGIES IN JAPAN James D. Foley (Panel Chair) Ephraim P. Glinert James D. Hollan Robert E. Kraut Thomas B. Sheridan Tim Skelly March 1996 _________________________________________________________________________ International Technology Research Institute Michael J. DeHaemer, JTEC/WTEC Director Geoffrey M. Holdridge, JTEC/WTEC Series Editor Loyola College in Maryland 4501 North Charles Street Baltimore, Maryland 21210-2699 _________________________________________________________________________ JTEC PANEL ON HUMAN-COMPUTER INTERACTION TECHNOLOGIES Sponsored by the National Science Foundation, the Defense Advanced Research Projects Agency, the Department of Commerce, and the Office of Naval Research of the United States Government Dr. James D. Foley (Panel Chair) Dr. Robert E. Kraut Professor of Computer Science Professor of Social Psychology and Director of Graphics, Visualization Human Computer Interaction & Usability Center Carnegie Mellon University Georgia Institute of Technology 1307 Wean Hall 801 Atlantic Pittsburgh, PA 15213 Atlanta, GA 30332-0280 Dr. Thomas B. Sheridan Dr. Ephraim P. Glinert Professor of Engineering and Applied Psychology Professor of Computer Science Massachusetts Institute of Technology Rensselaer Polytechnic Institute Room 3-346 127 Amos Eaton Bldg. Cambridge, MA 02139 Troy, NY 12180-3590 Mr. Tim Skelly Dr. James D. Hollan Microsoft Corporation Professor and Chair 1 Microsoft Way Department of Computer Science Redmond, WA 98052-6399 University of New Mexico Albuquerque, NM 87131-1386 INTERNATIONAL TECHNOLOGY RESEARCH INSTITUTE JTEC/WTEC PROGRAM The Japanese Technology Evaluation Center (JTEC) and its companion World Technology Evaluation Center (WTEC) at Loyola College provide assessments of foreign research and development in selected technologies under a cooperative agreement with the National Science Foundation (NSF).
    [Show full text]
  • TRON Forum Admission Guide
    TRON Forum Admission Guide TRON Forum TRON Forum (Location: Shinagawa, Tokyo, Chair: Ken Sakamura, Dean, Faculty of Information Networking for Innovation and Design (INIAD), Toyo University) has been established in 2002 to promote TRON Project which aims to realize the open IoT (Internet of Things) free from constraints of organizations and applications based on “open source,” “open data” and “open API.” The forum has conducted vigorous activities led by Chair Sakamura focusing on T-Engine Project that aims to improve the development environment of embedded systems and operating Ubiquitous ID Center which promotes and disseminates ubiquitous ID architecture and its component technologies such as ucode. The forum has received good reviews worldwide for its activities. For example, Chair Ken Sakamura was honored with an ITU150 Award (*) in May 2015 for proposing TRON open architecture, the origin of ubiquitous networking and the IoT. He was the only winner in Asia among the six winners that included Bill Gates. In 2018, TRON Forum has contributed to create the real-time OS standard for small embedded systems such as IoT terminal devices, "IEEE 2050-2018" (IEEE is TRON Forum Chair: Ken Sakamura the world's largest organization for electric and electronic engineers). In 2019, it has created "TRON IoT Vulnerability Advisory Center”. Its activity has expanded in many directions. (*)On the occasion of the 150th Anniversary of ITU (International Telecommunication Union, the United Nations specialized agency for ICTs, HQ: Geneva, Switzerland), ITU150 Awards were launched to recognize individuals past and present from government, ICT industry, academia, and civil society that have contributed to improving lives of world citizens through ICT innovations developed, promoted or implemented by ITU.
    [Show full text]
  • Japan's Visible Light Communications Consortium and Its Standardization Activities
    Japan's Visible Light Communications Consortium and Its Standardization Activities Shinichiro Haruyama, Ph.D. Vice Chairman VLCC (Visible Light Communications Consortium) Tokyo, Japan Department of Information and Computer Science, Faculty of Science and Technology, Keio University Yokohama, Japan Shinichiro Haruyama Visible Light Communications Consortium 1 Contents • Why is the standard for visible light communication needed? • Position Detection: One of the important applications of Visible Light Communication • Visible Light Communications Consortium (VLCC) • Standardization Activities in Japan Shinichiro Haruyama Visible Light Communications Consortium 2 Why is the standard for visible light communication needed? Various applications and products of Visible Light Communication are expected to appear. The problem of the mutual interference between different products and the problem and interchangeability are expected if they use different communication methods. Moreover, it is necessary to consider interference of Visible light communication devices against existing infrared devices. Shinichiro Haruyama Visible Light Communications Consortium 3 Contents • Why is the standard for visible light communication needed? • Position Detection: One of the important applications of Visible Light Communication • Visible Light Communications Consortium (VLCC) • Standardization Activities in Japan Shinichiro Haruyama Visible Light Communications Consortium 4 Position Detection Position Detection is one of the important applications of Visible Light Communication. A visible light source such as an A visible light source such as an LED lamp sends a code indicating LED lamp sends a code indicating that its location is “Position 1”. that its location is “Position 1”. It is possible to detect a fairly accurate position using a visible light source if it sends a code indicating its position. When a use moves around, he/she can know an accurate position indoor or outdoor.
    [Show full text]
  • Ken Sakamura
    2014 TRON Symposium. 30th Anniversary TRON Project 30th Anniversary and Its Future Outlook Embedded systems technology to support the utilization of the IoT big data and future plan for T-Engine Ken Sakamura Professor, Graduate School of Interdisciplinary Studies, The University of Tokyo Director of YRP Ubiquitous Networking Laboratory Chair of T-Engine Forum / uID Center 2014 TRON Symposium. 30th Anniversary ① TRON Project The Real-time Operating system Nucleus The 30th anniversary in 2014 One of the longest lasting projects related to Japanese computing Copyright © 2014 by Ken SAKAMURA 2 2014 TRON Symposium. 30th Anniversary What is TRON? RTOS for system control, and has different basic architecture from Windows and Linux RTOS: Real-Time Operating System Copyright © 2014 by Ken SAKAMURA 3 2014 TRON Symposium. 30th Anniversary TRON RTOS Is Embedded in Many Things “HAYABUSA” (MUSES-C), an asteroid explorer “IKAROS, ” Interplanetary Kite-craft Accelerated by Radiation Of the Sun 4 2014 TRON Symposium. 30th Anniversary TRON Project’s Root Is in Embedded Systems 5 2014 TRON Symposium. 30th Anniversary ② 30 Years of TRON Copyright © 2014 by Ken SAKAMURA 6 2014 TRON Symposium. 30th Anniversary Started in 1984 Copyright © 2014 by Ken SAKAMURA 7 2014 TRON Symposium. 30th Anniversary Historical Background at the Time Copyright © 2014 by Ken SAKAMURA 8 I4004 by Intel (1971) 2014 TRON Symposium. 30th Anniversary Alto by Xerox (1973) 2014 TRON Symposium. 30th Anniversary 2014 TRON Symposium. 30th Anniversary ③ Future Design Copyright © 2014 by Ken SAKAMURA 11 2014 TRON Symposium. 30th Anniversary How the Society Will Change Based on Newly Available Computers? Copyright © 2014 by Ken SAKAMURA 12 2014 TRON Symposium.
    [Show full text]
  • Uid Architecture Uid Architecture
    uIDuID ArchitectureArchitecture anan OpenOpen FoundationFoundation forfor UbiquitousUbiquitous computingcomputing Ken Sakamura, Ph.D. Professor, the University of Tokyo Director, YRP Ubiquitous Networking Laboratory (UNL) Chair, T-Engine Forum / uID Center UbiquitousUbiquitous ComputingComputing TechnologyTechnology ■ Very interesting and useful technology ■ Conventional Usage Pattern: ● Closed, proprietary solution in a single organization ■ Our Approach (uID Architecture) ● Not limited to a single organization ● Open Standard ● Works across organizational boundary and national boundary Copyright by Ken Sakamura. 2005 All rights reserved 2 1 BeneficiariesBeneficiaries ofof uIDuID ArchitectureArchitecture ■ The benefit of RFID technology is shared among producers, distributors, and end- consumers and people beyond simple Supply-Chain Management (SCM) ■ Food Traceability Experiment ● later explained ■ Medicine Traceability Experiment ● later explained Copyright by Ken Sakamura. 2005 All rights reserved 3 OutlineOutline ofof Today'sToday's SpeechSpeech 1. Basic uID Architecture 2. Wide applicability of open uID Architecture ●Exemplified by many feasibility study experiments 3. Comparison of approaches taken by uID Architecture / EPCglobal Copyright by Ken Sakamura. 2005 All rights reserved 4 2 BasicBasic uIDuID ArchitectureArchitecture ■The objective of uID Architecture is to recognize many objects and places in our surrounding “Context Awareness” Copyright by Ken Sakamura. 2005 All rights reserved 5 ContextContext Awareness:Awareness: RecognizingRecognizing manymany objectsobjects andand placesplaces ■ Identifying something so that you can tell that it is differentiate from others ■ To make machine identification easy, we store a unique identification number (ucode) in a tag and place it on an object or a location ■ cf. In our approach, creating and managing the unique number is very important ● This is why we have uID Center to manage such requirements Copyright by Ken Sakamura.
    [Show full text]
  • Cpaas.Io: an Eujapan Collaboration on Open Smart City Platforms
    CPaaS.io: An EUJapan Collaboration on Open Smart City Platforms Noboru Koshizuka (The University of Tokyo) Stephan Haller (Bern University of Applied Sciences) Ken Sakamura (Toyo University) Abstract Data-driven cities and governments rely significantly on data collec- tion, management, and distribution platforms. In this article, we intro- duce CPaaS.io, a collaborative project between Japan and the European Union with the goal of establishing common smart city platforms for de- ployment in real smart city use cases. 1 INTRODUCTION Today, data are crucial to the functioning of society. In fact, it is sometimes said that the most competitive area in information and communications technology (ICT) is not algorithms but data. The ICT National Strategy of Japan known as Society 5.0 proposes a data-driven society in which data help solve problems in the fields of mobility, supply chains, healthcare, and lifestyle to name a few. This will generate further economic growth and increase quality of life. Conse- quently, both in Japan and the European Union (EU), data have been termed the oil of the 21st century. These data come from a variety of sources: the Internet of Things (IoT) and sensors, open government resources, social media, and industry and business repositories, not to mention the wealth of personal information from individual users. These can be obtained, linked, and analyzed to extract valuable intelligence and transform our society for a better future. In the deployment of smart city services, providing a platform for data collection, management, and distribution is crucial. This manuscript has been published in Computer (Volume: 51 , Issue: 12 , Dec.
    [Show full text]
  • Ken SAKAMURA the Iot in Action
    Copyright © 2016 by Ken SAKAMURA The IoT in Action Ken Sakamura Professor and Director of Institute of Infrastructure Application of Ubiquitous Computing (IAUC), Interfaculty Initiative in Information Studies, Graduate School, the University of Tokyo Director, YRP Ubiquitous Networking Laboratory Chair, TRON Forum / uID Center Copyright © 2016 by Ken Sakamura Building Controlled by Open API ① INIAD HUB-1 Every facility in the building can be controlled via API 2 INIAD HUB-1 (Akabanedai, to be opened in2017) Copyright © 2016 by Ken Sakamura Open API Control API (Application Program Interface) API is a means of passing the command and the command itself for a system to control others automatically The operating status of building facilities, environmental control devices, etc. can be read and they can be controlled via network by means of API. 5 Copyright © 2016 by Ken Sakamura Use pf open API in research and education █ Feasibility study of prototype applications for the IoT research ● Operation of autonomous robot wheelchairs and drones on campus ● Introducing deep learning AI technology for the optimized use of energy or security on campus █ Students can learn how to control their environment by programming in tutorial classes ● Proposal of new business that uses the IoT technology and practicing prototypte creation 6 cf) Daiwa Ubiquitous Computing Research Building Built in May, 2015 on in the Hongo campus of the University of Tokyo Already conducted many experiments to learn knowhows of open IoT building 7 Copyright © 2016 by Ken Sakamura Daiwa Ubiquitous Computing Research Building as a Research Platform Uses the building itself as platform for the research on the IoT environment 10 Copyright © 2016 by Ken Sakamura API for Daiwa Ubiquitous Computing Research Building 1.
    [Show full text]
  • International Telecommunication Union (ITU) 150 Awards Recognize
    Press Release Tokyo, Japan, May 15, 2015 International Telecommunication Union (ITU) 150 Awards recognize Ken Sakamura, Director of YRP Ubiquitous Networking Laboratory (Professor of Graduate School of Interdisciplinary Information Studies, The University of Tokyo) Ken Sakamura, Director of YRP Ubiquitous Networking Laboratory (Professor of Graduate School of Interdisciplinary Information Studies, The University of Tokyo) will be honored with ITU’s 150th Anniversary Award at the commemorative event that will be held at the headquarters of ITU in Geneva on 17 May 2015. Sakamura has contributed to the research and education of computer science for a long time, has conducted the research and development of the computer system of open architecture with high real-time performance named TRON(The Real-time Operating system Nucleus). As the result, he has released and promoted an open software platform (operating system) to the world for free. He has proposed the concept of ubiquitous computing environment or the Internet of Things (IoT) in which many objects in our surroundings are embedded with small computer nodes with sensors and actuators that are connected to the network, communicate with each other and operate in a cooperative manner to offer sophisticated services to human users since the 1980s and has contributed to the achievement. (Comment of the winner) I am honored to be recognized for the results of years of my research activities, and would like to express my most heartfelt gratitude for the award on the occasion of ITU’s 150th Anniversary. I would like to thank people who have helped and supported us for a long time.
    [Show full text]
  • Ken Sakamura
    Open IoT Platform & IoT-Engine Ken Sakamura Professor, Director of Institute of Infrastructure Application of Ubiquitous Computing (IAUC), Interfaculty Initiative in Information Studies, Graduate School, the University of Tokyo Director, YRP Ubiquitous Networking Laboratory Chair, TRON Forum / uID Center Seven semiconductor manufacturers from six countries and regions have already expressed intention to commcericialize IoT- Engine Participating semiconductor manufacturers (at the time of the press conference on April 27, 2016) ■ Toshiba Microelectronics Corporation ■ Renesas Electronics Corporation ■ Cypress Semiconductor Corporatation ■ Imagination Technologies Limited ■ Nuvoton Technology Corporation ■ NXP Semiconductors N.V. ■ STMicroelectronics Sales of IoT-Engine and Development kit ■ Personal Media Corporation ■ Ubiqutious Computing Technology Corporation Copyright © 2016 by Ken Sakamura 2 IoT Internet of Things Copyright © 2016 by Ken Sakamura 3 The IoT Can Change the World Only If It Is Open. The Internet changed society because it is an open network which anyone can use for any purpose. Is the "I" in "IoT" truly the "I" of "Internet"? Copyright © 2016 by Ken Sakamura 4 Governance Is Required in the Age of the Open IoT The advanced management "to use something appropriately" requires advanced judgment. Policy-based group management of access rights and partial exposure of data, changing of access rights based on the ordinary and emergency setting, and automatic/augmented judgment by aritificial intelligence Copyright © 2016 by Ken Sakamura 5 The Pressing Issues of Future Embedded Systems Advanced governance management of data and control will become very important. New governence management requires advanced processing and more database resources than the conservative "don't release anything". Copyright © 2016 by Ken Sakamura 6 Hardship of Embedded Systems in the Age of the IoT Access control, which is not the essential function of the embedded systems, requires large amount of computing resource.
    [Show full text]
  • T-Engine Development Kit T-Engine Development Kit FAQ
    Frequently Asked Questions about T-Engine Development Kit T-Engine Development Kit FAQ 1 What is the flow of product development with T-Engine like? Let's take the case of developing a new cellular phone. If you (finished product) and software that run on T-Engine, you can port start developing the software for controlling hardware after the the software on T-Engine including T-Kernel and the middleware development of the hardware is completed, the overall development you used, to the final hardware. You might need, then, to modify period would be too long. For shorter development period, the the software to comply with the final hardware if there is any hardware and the software need to be developed simultaneously. In detail difference between the hardware, such as memory maps. order to achieve this, before you start developing the software, you The more similar the specifications of the final hardware and need to prepare a piece of prototype hardware (a board for T-Engine are, the easier the modifications will be. feasibility assessment) that has similar configurations to the This method might seem like a lot of work in that the software is finished product (i.e., a board highly compatible with the software), developed on one piece of hardware (T-Engine) and migrate it to regardless of the similarity in physical appearance. The hardware another (finished product). However, developing software on a in this case, also called a breadboard, needs to be prepared quickly. common platform (T-Engine) has a lot of benefits: You can use your It can be used as a general-purpose product, or with only minimal existing middleware, and stockpile your own software to be customizations and/or additional expansion boards or devices developed and development know-how for reuse.
    [Show full text]
  • A Secure and Flexible E-Health Access Control System with Provisions for Emergency Access Overrides and Delegation of Access Privileges
    A Secure and Flexible e-Health Access Control System with Provisions for Emergency Access Overrides and Delegation of Access Privileges M. Fahim Ferdous Khan a, Ken Sakamura ab a Interfaculty Initiative in Information Studies, The University of Tokyo, Tokyo, Japan b YRP Ubiquitous Networking Laboratory, Tokyo, Japan [email protected], [email protected] Abstract— Protecting electronic health records (EHR) from greater patient outreach and improved care. However, since all unauthorized access and data breaches has been a great these IT breakthroughs primarily focused on improving challenge for healthcare organizations in recent times. efficiency, reducing cost and incorporating value-added Controlling access to EHR demands a delicate balance between services, e-health has also introduced a number of crucial security and flexibility: There are emergency cases where the privacy and security issues. As more and more healthcare default access control policy must be circumvented in order to save patients’ life – and cases where management of access organizations are adopting electronic health records (EHR), control rights needs to be delegated to some trusted parties. instances of security breaches are increasing at an alarming Therefore, e-Health access control systems must be robust and rate. According to one recent survey [1], about 80% of US- flexible at the same time. Conventional general-purpose access based healthcare executives have reported compromise of control schemes like role-based access control (RBAC) and its their organizations’ information technology by cyber attacks. derivatives emphasize mainly on the robustness of the access In the first third of 2015 alone, more than 99 million control mechanism, and treat flexibility issues like emergency healthcare records have been reported to be exposed through access overrides and delegation management as addenda.
    [Show full text]
  • Japan's Ubiquitous Computing Architecture Is Ready for Prime Time
    FEATURED IN THIS ISSUE ■ T-Engine: Japan’s Ubiquitous Computing News Architecture Is Ready for Prime Time News contact: Shani Murray ■ [email protected] ■ Virtual Displays and the Future of Mobile and Portable Devices T-Engine: Japan’s Ubiquitous Computing Architecture Is Ready for Prime Time Jan Krikke apan is quietly positioning itself for the • Standard T-Engine (75 mm ´ 120 mm) available for T-Engine. According to J next phase in digital technology: ubiq- for portable information devices with the T-Engine Forum Web site (www. uitous computing. A sign of things to comparatively advanced user interface t-engine.org), it includes network pro- come is T-Engine, arguably the most features, such as smart phones; tocol stacks, filing systems, Japanese advanced ubiquitous computing platform • Micro T-Engine (60 mm ´ 80 mm) for language processing, eTRON-specified in the world. T-Engine enables the dis- devices with relatively basic user inter- security software, a GUI, and audio pro- tribution of software resources, includ- face features, such as home electronic cessing. Other middleware will soon be ing middleware developed on T-Kernel, appliances and musical instruments; added to support speech recognition, its compact, real-time operating system. • Nano T-Engine (coin-sized) for small MP3, and digital watermarks. The plat- The platform also features standardized home electronic appliances; and form has also attracted support from hardware and tamper-resistant network • Pico T-Engine for the smallest units in American software makers. Sun Micro- security. a ubiquitous computing environment, systems ported Java to T-Engine, Mon- Ubiquitous computing (one person, such as switches, lighting equipment, taVista did the same with its real-time many computers) is the third era in com- sensors, and valves.
    [Show full text]