Abstract:
A service repository is used to store at least one service in association with service metadata describing service requirements of the service. The service repository also may store one or more platform-specific service executables. A service mapper is used to determine device metadata associated with each of a plurality of devices, where the device metadata provides device characteristics of the devices. The service mapper may thus map the service to a selected device of the plurality of devices for deployment thereon, based on a matching of corresponding elements of the service requirements and the device characteristics. The service mapper also may re-map the service between devices to maintain a quality and reliability of the service.
Abstract:
A radio frequency identification (RFID) controller within an RFID system includes an RFID interrogator interface configured to receive signals from RFID interrogators and configured to manage the RFID interrogators based on instructions received from an application program. The RFID interrogators are configured to receive data from an RFID tag. The controller also includes a controller core configured to process the signals received from the RFID interrogator interface and to provide the data to the application.
Abstract:
A radio frequency identification (RFID) controller within an RFID system includes an RFID interrogator interface configured to receive signals from RFID interrogators and configured to manage the RFID interrogators based on instructions received from an application program. The RFID interrogators are configured to receive data from an RFID tag. The controller also includes a controller core configured to process the signals received from the RFID interrogator interface and to provide the data to the application.
Abstract:
A radio frequency identification (RFID) controller within an RFID system includes an RFID interrogator interface configured to receive signals from an RFID interrogator. The RFID interrogator receives data from RFID tags. The RFID controller also includes a user interface configured to receive a selection of data processing units and an arrangement of data processing units. The RFID controller further includes a controller core configured to process the signals received from the RFID interrogator interface and configured to modify processing of the signals from RFID interrogator based on the selection and the arrangement of the data processing units.
Abstract:
A radio frequency identification (RFID) controller within an RFID system includes an RFID interrogator interface configured to receive signals from an RFID interrogator. The RFID interrogator receives data from RFID tags. The RFID controller also includes a user interface configured to receive a selection of data processing units and an arrangement of data processing units. The RFID controller further includes a controller core configured to process the signals received from the RFID interrogator interface and configured to modify processing of the signals from RFID interrogator based on the selection and the arrangement of the data processing units.
Abstract:
Systems and methods allow service-to-device mapping by which services are mapped onto best-suited smart items selected from a plurality of smart items of a sensor network. As part of the mapping, and/or subsequent thereto, a deployment of the service(s) onto the smart items is initiated. However, in some cases, the deployment may fail, or may only partially succeed. In such cases, one or more conditions of the deployment may be altered to obtain a modified, allowable deployment condition, so that the deployment may then proceed. As a result, users may achieve a desired result in a fast, convenient, and reliable manner, even when executing the deployment remotely or automatically.
Abstract:
Embodiments of the invention relate to programming, configuring, and integrating networked embedded devices with other applications. Particular embodiments include an architecture having an application model layer that integrates the networked embedded devices with business application systems, by allowing the devices to be expressed as part of a business application concept. In certain embodiments, an intermediate device programming layer provides a network-centric programming abstraction, relieving the programmer of the details of low-level, node-centric programming. Finally, a self-optimizing run-time system layer adapts to the specific conditions in the deployed network embedded devices, by optimizing e.g. communication patterns and resource consumption based upon input from the higher layer(s). Embodiments may facilitate integration of networked embedded devices with the back ends of business applications, and may provide a unified extensible programming framework simplifying development of applications for network embedded devices.
Abstract:
Methods and apparatus, including computer program products, for real-time data transfer between sensor or actuator devices and higher-level applications.In one aspect, an integration engine receives a set of rules from an external application and receives item data including item identifiers from one or more tag readers, each item identifier being read from a digital tag bound to a physical item. The integration engine uses the rules and item data to determine in real time which subset of the item data to furnish to the external application.In another aspect, the integration engine receives from the external application configuration data for controlling an actuator device. The integration engine converts the configuration data to a format compatible with the actuator device; and furnishes the converted configuration data in real time to the actuator device.
Abstract:
Methods and apparatus, including computer program products, for real-time and context-aware tracking of items. Tags bound to items are read and information read from the tags and location information about the tags is provided by at least two enterprises and used to maintain disposition information about the items, which is made visible to enterprises in the supply chain. The disposition information can be mapped to a world model that tracks the items and circumstances affecting the items, for example, geo-spatial events and traffic delays. Visibility of the disposition information can be controlled through authorization. Visible information can include relationships between particular items and business documents such as order and shipping documents.
Abstract:
Methods, systems, and computer program products, implementing techniques for aggregating sensor data. In one aspect, the techniques include receiving sensor data values emitted by a sensor device, identifying the occurrence of a business event based on the sensor data values, and notifying an enterprise application of the occurrence of the business event. The business event being at a higher-level than the sensor data values.