Abstract:
Embodiments of the invention relate to programming, configuring, and integrating networked embedded devices with other applications. Particular embodiments include an architecture having an application model layer that integrates the networked embedded devices with business application systems, by allowing the devices to be expressed as part of a business application concept. In certain embodiments, an intermediate device programming layer provides a network-centric programming abstraction, relieving the programmer of the details of low-level, node-centric programming. Finally, a self-optimizing run-time system layer adapts to the specific conditions in the deployed network embedded devices, by optimizing e.g. communication patterns and resource consumption based upon input from the higher layer(s). Embodiments may facilitate integration of networked embedded devices with the back ends of business applications, and may provide a unified extensible programming framework simplifying development of applications for network embedded devices.
Abstract:
Systems and methods are described that provide a system monitor component, e.g., for a sensor network, which may include, e.g., a server component that is continuously running and monitoring zero or more networks consisting of (possibly wireless) devices, where each network may be executing a different communications protocol, such as a proprietary, platform-dependent protocol. The system monitor may maintain a system model of the networks. The system monitor may be connected with the networks through a message transport system that routes any occurring messages in a common or standard communications protocol, as well as message handlers that access either platform-abstracting gateways or the proprietary messages that the devices of one or more of the networks may use.
Abstract:
Methods and apparatus, including computer program products, for real-time and context-aware tracking of items. Tags bound to items are read and information read from the tags and location information about the tags is provided by at least two enterprises and used to maintain disposition information about the items, which is made visible to enterprises in the supply chain. The disposition information can be mapped to a world model that tracks the items and circumstances affecting the items, for example, geo-spatial events and traffic delays. Visibility of the disposition information can be controlled through authorization. Visible information can include relationships between particular items and business documents such as order and shipping documents.
Abstract:
Methods and apparatus, including computer program products, for real-time and context-aware tracking of items. Tags bound to items are read and information read from the tags and location information about the tags is provided by at least two enterprises and used to maintain disposition information about the items, which is made visible to enterprises in the supply chain. The disposition information can be mapped to a world model that tracks the items and circumstances affecting the items, for example, geo-spatial events and traffic delays. Visibility of the disposition information can be controlled through authorization. Visible information can include relationships between particular items and business documents such as order and shipping documents.
Abstract:
Methods and apparatus, including computer program products, for real-time data transfer between sensor or actuator devices and higher-level applications. In one aspect, an integration engine receives a set of rules from an external application and receives item data including item identifiers from one or more tag readers, each item identifier being read from a digital tag bound to a physical item. The integration engine uses the rules and item data to determine in real time which subset of the item data to furnish to the external application. In another aspect, the integration engine receives from the external application configuration data for controlling an actuator device. The integration engine converts the configuration data to a format compatible with the actuator device; and furnishes the converted configuration data in real time to the actuator device.
Abstract:
Methods and apparatus, including computer program products, for real-time data transfer between sensor or actuator devices and higher-level applications.In one aspect, an integration engine receives a set of rules from an external application and receives item data including item identifiers from one or more tag readers, each item identifier being read from a digital tag bound to a physical item. The integration engine uses the rules and item data to determine in real time which subset of the item data to furnish to the external application.In another aspect, the integration engine receives from the external application configuration data for controlling an actuator device. The integration engine converts the configuration data to a format compatible with the actuator device; and furnishes the converted configuration data in real time to the actuator device.
Abstract:
A radio frequency identification (RFID) controller within an RFID system includes an RFID interrogator interface configured to receive signals from an RFID interrogator. The RFID interrogator receives data from RFID tags. The RFID controller also includes a user interface configured to receive a selection of data processing units and an arrangement of data processing units. The RFID controller further includes a controller core configured to process the signals received from the RFID interrogator interface and configured to modify processing of the signals from RFID interrogator based on the selection and the arrangement of the data processing units.
Abstract:
Systems and methods allow service-to-device mapping by which services are mapped onto best-suited smart items selected from a plurality of smart items of a sensor network. As part of the mapping, and/or subsequent thereto, a deployment of the service(s) onto the smart items is initiated. However, in some cases, the deployment may fail, or may only partially succeed. In such cases, one or more conditions of the deployment may be altered to obtain a modified, allowable deployment condition, so that the deployment may then proceed. As a result, users may achieve a desired result in a fast, convenient, and reliable manner, even when executing the deployment remotely or automatically.
Abstract:
Methods and apparatus, including computer program products, for real-time and context-aware tracking of items. Tags bound to items are read and information read from the tags and location information about the tags is provided by at least two enterprises and used to maintain disposition information about the items, which is made visible to enterprises in the supply chain. The disposition information can be mapped to a world model that tracks the items and circumstances affecting the items, for example, geo-spatial events and traffic delays. Visibility of the disposition information can be controlled through authorization. Visible information can include relationships between particular items and business documents such as order and shipping documents.
Abstract:
Methods and apparatus, including computer program products, for real-time and context-aware tracking of items. Tags bound to items are read and information read from the tags and location information about the tags is provided by at least two enterprises and used to maintain disposition information about the items, which is made visible to enterprises in the supply chain. The disposition information can be mapped to a world model that tracks the items and circumstances affecting the items, for example, geo-spatial events and traffic delays. Visibility of the disposition information can be controlled through authorization. Visible information can include relationships between particular items and business documents such as order and shipping documents.