SlideShare a Scribd company logo
1 of 74
Download to read offline
Angelo Corsaro, PhD
Chief Technology Officer
Advanced Technology Office


angelo@adlink-labs.tech
Data
The
Edge
Fabric
<
Abstract
Zenoh is rapidly growing Eclipse project that uni
fi
es data in motion,
data at rest and computations. It elegantly blends traditional pub/sub
with geo distributed storage, queries and computations, while
retaining a level of time and space ef
fi
ciency that is well beyond any of
the mainstream stacks. This presentation will provide an introduction to
Eclipse Zenoh along with a crisp explanation of the challenges that
motivated the creation of this project. We will go through a series of
real-world use cases that demonstrate the advantages brought by
Zenoh in enabling and optimising typical edge scenarios and in
simplifying the development of any scale distributed applications.
Speaker Bio
Angelo Corsaro, Ph.D. is Chief Technology Of
fi
cer (CTO) at ADLINK Technology Inc. where he
looks after corporate technology strategy and innovation, leads the Advanced Technology
Of
fi
ce and the Software and Technology Business Unit.


Angelo is a world top expert in edge/fog computing and a well known researcher in the area of
high performance and large scale distributed systems. Angelo has over 100 publications on
referred journals, conferences, workshops, and magazines. Angelo has co-authored over ten
international standards.


Specialties: Fog/Edge Computing, Industrial and Consumer Internet of Things, Innovation and
Innovation Management, Product Strategy, Open Source, High Performance Computing, Large
Scale Mission/Business Critical Distributed Systems, Real-Time Systems, Software Patterns,
Functional Programming Languages
Context
The Data Journey
Store
Distribute
Produce
Compute
…
…
…
…
Moving and Resting
Technologies for dealing with
data in motion and data at rest
have belonged historically to
different families


Publish/Subscribe is today the
leading paradigm for dealing
with with data in motion


Databases (SQL and NoSQL)
are the leading paradigm to
deal with data at rest
Data in Motion
Data at Rest
Pushing and Pulling
Technologies for dealing
with data in motion and
data at rest also distinguish
in another dimension:


Data in motion is Pushed
to interested parties


Data at rest is Pulled when
needed
Push
Data at Rest
Pull
Technological Fragmentation
The technological
fragmentation exist in
several Data
Distribution, Data
Storage and the
integration of the two


Push
Data at Rest
Pull
Decentralisation
The increasing availability of and
storage, compute capabilities on
devices is creating new
opportunities for computing
and storing and data much
closer its production


Existing technologies for data in
motion and data at rest fall short
in supporting this scenario.
More importantly fail to provide a
uni
fi
ed data management.
Example
Robotics
Robotics applications are quickly
evolving to require swarm
coordination, Internet-Scale
management and teleoperation


Robots are increasingly operating in
swarms and over constantly
expanding geographical regions
Computation Offloading
Next generation robotics (and
autonomous driving) applications
need to leverage surrounding
infrastructure to of
fl
oad
computations and facilitate
coordination
Key Differences
• Many


• Moving


• Geo-Distributed


• Collaborative


• Internet Scale


• Open Environment


• Distributed Computing
• One


• Fixed


• Geo-localised


• Stand-Alone


• LAN Scale


• Closed Environment


• Cloud Computing
One More Example
Smart Home Today
Data produced locally is sent to the cloud
where it is processed and stored


The core of the application logic runs on the
cloud.


Most if not all of the interactions with devices
that are close to you are through the cloud


This leads to several problems, including
energy waste, availability in case of
connectivity issues, privacy concerns…
Exploiting Locality
Ideally we would want communication to be local
whenever possible.


Ideally we would want to place computations
closer to data sources


Ideally we would want most of the data to be kept
in our house… But still access it from anywhere — if
I have the rights to do so


Some could be still processed or stored on the
cloud — but that should be a choice not the only
option.
Managing a Residence
Let’s assume for a moment that we want to exploit data and computation
locality at each house, yet we would like to easily monitor or query any
kind of data — for which we have the rights. How can I do that?
Traditional Approach #1
Replicate all data on the cloud
and use that as the location to
access information on the
houses


The drawbacks of this solution
is that all data is duplicated,
energy is wasted to send data
across the cloud, and privacy is
again at risk …
Traditional Approach #2
Data is kept on the house and
when needing to access it the
house of interest is addressed


The drawbacks of this solution
is there is no location
transparency. What if I want to
keep some of the data on an
edge server? Or even the
cloud?
…
Wouldn’t be nice if…
We could keep data where it
makes sense an retrieve it when
needed in a location transparent
manner — just naming the data


Wouldn’t it be nice if we could
provision application logic
wherever it made sense on this
computing fabric?
Status Quo
Technological Gap
The ecosystem of technologies available
today for data plane are unable to cover
the needs of these large scale
distributed systems because either
cannot work at the proper scale, e.g.
DDS, or are inherently depending on
broker technologies, e.g. MQTT, AMQP


Additionally none of this technologies
help with dealing with geo-distributed
data at rest
Filling the Gap
Uni
fi
es data in motion, data in-use, data at
rest and computations.


It carefully blends traditional pub/sub with
distributed queries, while retaining a level of
time and space ef
fi
ciency that is well beyond
any of the mainstream stacks.


It provides built-in support for geo-distributed
storages and distributed computations
Provides a high level API for pub/sub and
distributed queries, data representation
transcoding, an implementation of geo-distributed
storage and distributed computed values
zenoh Data Link
Network
Transport
Physical
zenoh
zenoh.net
Implements a networking layer capable of running
above a Data Link, Network or Transport Layer. This
protocol provides primitives for ef
fi
cient pub/sub
and distributed queries. It supports fragmentation
and ordered reliable delivery.
zenoh.net
Communication Models
Peer-to-peer communication
Peer
Peer
Peer
Peer
Peer
Peer
Peer
Peer
Peer
Peer
Peers Scouting:


• Multicast


• Gossip
Clique Mesh
Brokered Communication
Router and peers can
help with brokering
communication
between clients as
well as between
clients and mesh of
peers
Router
Client
Client
Client
Peer
Peer
Peer
Peer
Peer
Client
Client
Client
Peer
Peer
Peer
Peer
Router
Router
Router
Router
Router
Router
Peer
Peer
Peer
Peer
Peer
Peer
Peer
Peer
Peer
Peer
Router
Generalised Topology
Client
Client
Client
Client
Client
Client
Client
Client Client
Client
Client
Client
Client
Abstractions
Naming Data
Following the tradition of Named Data Networking protocols, data is
named by a sequence of byte arrays — called key — such as:
/home/kitchen/sensors/temp


/home/kitchen/sensors/C202
Data interest and intents are expressed by means of keys regular expressions,
such as:
/home/*/sensors/temp


/home/**/C202
Selecting Data
Uses selector to de
fi
nes data sets. A selector is composed by a key
expression, and optionally a predicate, a projection and a set of
properties
/myhome/*/sensor/temp?value>25


/mycar/dynamics?speed>25#acceleration


The key-expression is used to route the query, while predicate, properties,
projection, etc., are interpreted only by the entity that executes the query. It also
provide different policies to control query consolidation and completeness
and potentially quorums
Primitives: Entities
Resource. A named data, in other term a (key,value)
Publisher. A spring of values for a key expression
Subscriber. A sink of values for a key expression
Queryable. A well of values for a key expression
(e.g.	/home/kitchen/sensor/temp,	21.5
(e.g.	/home/kitchen/sensor/temp
	/home/kitchen/sensor/hum,	0.67)
/home/kitchen/sensor/*	)
(e.g.	/home/kitchen/sensor/temp
/home/kitchen/sensor/*)
(e.g.	/home/**)
Primitives: Operations
open/close — Open/Close a zenoh.net session
scout — Looks for zenoh entities, the kinds of relevant nodes, e.g. peers,
router, etc., is speci
fi
ed by a bit-mask.
declare/undeclare — Declare/Undeclare resource, publisher, subscriber and
queryable. Declarations are used for discovery and various optimisations. For
subscribers the declare primitive registers a user provided call-back that will
be triggered when data is available. For queryable, the declare primitive register
a user provided call-back triggered whenever a query needs to be answered.
Primitives: Operations
write — Writes data for a key expression
query — Issues a distributed query and returns a stream of results. The
query target, coverage and consolidation depends on policies
pull — Pulls data for a pull subscriber.
Storage
A storage is de
fi
ned by:


Selector. De
fi
nes the set of
resources keys that stores this
storage


Back-end. De
fi
nes the storage
technology used
/myhome/status/**
…
Storage Back-end
Storage Selector
zenoh	storages	can	be	created	via	the	
administration	API	anywhere	on	the	network	
and	back-ends	are	dynamically	loaded	plugins.
zenoh	storages	automatically	align	their	
initial	state,	but	can	also	be	bound	to	
existing	data-bases
Eval
An eval is de
fi
ned by:


Selector. De
fi
nes the set of
resources keys that will trigger
this computation


Implementation. The user
code implementing the
computation
Eval Implementation
/myhome/energy-cons
Eval Selector
Data Link
Network
Transport
Physical
zenoh
zenoh.net Queryable
Subscriber Subscriber
Write Queryable
Storage Eval
Put Subscriber
Query
Get
zenoh protocol
zZ
Publisher Storage
Querier
Pull


Subscriber
Subscriber
Subscriber
/louvre/**/sensor/temp
/louvre/1/42/sensor/temp
/louvre/1/42/anomaly
/louvre/2/42/sensor/temp
/louvre/1/42/sensor/temp
Publisher
/louvre/2/42/sensor/temp
/louvre/2/**
/louvre/1/**
Storage
Eval
zZ
Publisher Queryable


+


Subscriber
Queryable
Querier
Pull


Subscriber
Subscriber
Subscriber
Queryable


+


Subscriber
/louvre/**/sensor/temp
/louvre/1/42/sensor/temp
/louvre/2/**
/louvre/1/**
/louvre/1/42/anomaly
/louvre/2/42/sensor/temp
/louvre/1/42/sensor/temp
Publisher
/louvre/2/42/sensor/temp
zZ
Publisher Queryable


+


Subscriber
Queryable
Querier
Pull


Subscriber
Subscriber
Subscriber
Queryable


+


Subscriber
/louvre/**/sensor/temp
/louvre/1/42/sensor/temp
/louvre/1/42/anomaly
/louvre/2/42/sensor/temp
/louvre/1/42/sensor/temp
Publisher
/louvre/2/42/sensor/temp
/louvre/2/**
/louvre/1/**
zZ
Publisher Queryable


+


Subscriber
Queryable
Querier
Pull


Subscriber
Subscriber
Subscriber
Queryable


+


Subscriber
/louvre/**/sensor/temp
/louvre/1/42/sensor/temp
/louvre/1/42/anomaly
/louvre/2/42/sensor/temp
/louvre/1/42/sensor/temp
Publisher
/louvre/2/42/sensor/temp
/louvre/2/**
/louvre/1/**
zZ
Publisher Queryable


+


Subscriber
Queryable
Querier
Pull


Subscriber
Subscriber
Subscriber
Queryable


+


Subscriber
/louvre/**/sensor/temp
/louvre/1/42/sensor/temp
/louvre/1/42/anomaly
/louvre/2/42/sensor/temp
/louvre/1/42/sensor/temp
Publisher
/louvre/2/42/sensor/temp
/louvre/2/**
/louvre/1/**
get	/Louvre/*/42/sensor/temp
zZ
Publisher Queryable


+


Subscriber
Queryable
Querier
Pull


Subscriber
Subscriber
Subscriber
Queryable


+


Subscriber
/louvre/**/sensor/temp
/louvre/1/42/sensor/temp
/louvre/1/42/anomaly
/louvre/2/42/sensor/temp
/louvre/1/42/sensor/temp
Publisher
/louvre/2/42/sensor/temp
/louvre/2/**
/louvre/1/**
get	/Louvre/*/42/sensor/temp
Protocol Summary Highlights
Most wire/power/memory ef
fi
cient protocol in the market to provide
connectivity to extremely constrained targets


Supports push and pull pub/sub along with distributed queries


Resource keys are represented as integers on the wire, these integer
are local to a session => good for wire ef
fi
ciency


Supports for peer-to-peer and routed communication.


Support for zero-copy.


Ordered reliable data delivery and fragmentation.


Minimal wire overhead for user data is 4-6 bytes


Data Link
Network
Transport
Physical
zenoh
zenoh.net
Performance
Throughput (msg/s)
Test	ran	on	11/03/2021	on


Centos	8


AMD	Ryzen


32GB	RAM
Pub
Sub
Host
Throughput (Gb/s)
Test	ran	on	11/03/2021	on


Centos	8


AMD	Ryzen


32GB	RAM
Pub
Sub
Host
Round Trip Time (us)
Test	ran	on	11/03/2021	on


Centos	8


AMD	Ryzen


32GB	RAM
Pub
Sub
Host
Zenoh vs MQTT (msg/s)
Test	ran	on	11/03/2021	on


Centos	8


AMD	Ryzen


32GB	RAM
Pub
Rtr
Host
Sub
Zenoh vs MQTT (Gb/s)
Test	ran	on	11/03/2021	on


Centos	8


AMD	Ryzen


32GB	RAM
Pub
Rtr
Host
Sub
Code Lab
Comi
ng
Up
In
progr
ess
APIs
zenoh	runs	on	any	RUST	supported	platform	plus	a	few	
embedded	targets	such	as	Zephyr.	Zenoh	also	offers	a	
REST	API	for	programming	and	administration.


/demo/us-west/**


/demo/us-east/**


/demo/eu/**
/demo/ap/**
Example:


• Put data: curl -X PUT -d 'Hello World!' http://us-west.zenoh.io:8000/demo/eu/test


• Get data: curl http://ap.zenoh.io:8000/demo/*/test
us-west.zenoh.io
us-east.zenoh.io
eu.zenoh.io
ap.zenoh.io
Greetings
from zenoh import Zenoh


# Get a zenoh session


zs = Zenoh({‘peer’: ‘tcp/eu.zenoh.io:7447’})


z = zs.workspace()


# play around


z.put(“/demo/eu/greet/italian”, “Ciao!”)
More Greetings…
z.put(“/demo/us-east/greet/american”, “Hi!")


z.put(“/demo/us-west/greet/american”, “What’s Up!”)


z.put(“/demo/ap/greet/japanese”, “Aisatsu!”)
Getting Greetings
from zenoh import Zenoh, ChangeKind


# Define the listener


def listener(change):


print("{} : {} (encoding: {} , timestamp: {})”


.format(change.path,


"DELETED" if change.kind == ChangeKind.DELETE


else change.value.get_content(),


"none" if change.kind == ChangeKind.DELETE


else change.value.encoding_descr(),


change.timestamp))


z.subscribe(“/demo/**/greet/*“, listener)
Finding out Greetings
# How do people greet in EU?


workspace.get(“/demo/eu/**/greet”)


# How about American?


workspace.get(“/demo/us-*/**/greet”)


# Just get me all you know about greeting…


workspace.get(“/demo/**/greet”)


/demo/us-west/**


/demo/us-east/**


/demo/eu/**
/demo/ap/**
us-west.zenoh.io
us-east.zenoh.io
eu.zenoh.io
ap.zenoh.io
workspace.get(“/demo/eu/**/greet”)


/demo/us-west/**


/demo/us-east/**


/demo/eu/**
/demo/ap/**
us-west.zenoh.io
us-east.zenoh.io
eu.zenoh.io
ap.zenoh.io
workspace.get(“/demo/eu/**/greet”)


workspace.get(““/demo/us-*/**/greet””)
workspace.get(“/demo/us-*/**/greet”)




/demo/us-west/**


/demo/us-east/**


/demo/eu/**
/demo/ap/**
us-west.zenoh.io
us-east.zenoh.io
eu.zenoh.io
ap.zenoh.io
workspace.get(“/demo/eu/**/greet”)


workspace.get(“/demo/**/greet”)
Greeting of the Day
Imagine you want to do a greeting of the day that each time
somebody tries to query it generates a random quote, or a
daily quote, etc.


We could do that with an eval, here is how:
def quote_eval(request):


make_a_cute_quote(request)


z.register_eval(“/demo/*/greet/*/daily”, quote_eval)


/demo/us-west/**


/demo/us-east/**


/demo/eu/**
/demo/ap/**
us-west.zenoh.io
us-east.zenoh.io
eu.zenoh.io
ap.zenoh.io
workspace.get(““/demo/*/greet/italian/daily””)


workspace.get(“/demo/*/greet/american/daily”)


To	resolve	this	query	zenoh	will	pick	the	eval	that	
happens	to	be	“closer”	to	the	querier.


This	is	true	in	general	as	queries	can	target	at	the	
same	time	evals	and	storages.
Application Domains
ROS2 and
ROS2 based robots can leverage zenoh
into two ways (1) by leveraging a ROS2
RMW for zenoh, or (2) by leveraging the
zenoh-bridge-dds which transparently
moves R2X communication over zenoh


The latter case does not require any
change to your robot, not even a
recompile / re-link


Zenoh also supports full interoperability
with ROS2 in the sense than you can
read/write data from/into ROS2 via native
zenoh API
Discovery Traffic Reduction
Zenoh drastically
reduces DDS
discovery overhead
– from 97% to
99,9%
Internet Scale Robotics
Zenoh enables for mesh peer-
to-peer communication when
useful, routed communication
when necessary and in general
enables ef
fi
cient Internet-scale


Additionally, it does not require
any changes to your existing
ROS2 systems.
In Action
Indy Autonomous Challenge
Zenoh used for R2X
communication
Final Thoughts
zenoh is an innovative and performant
protocol that solves some of they problems
at the very core of IoT and Edge Computing


Its open architecture enables to easily
expand both storage back-ends as well as
protocols that are routed and integrated into
the zenoh world


If you like zenoh, star our repo and start
hacking some code!
References
“Patience, persistence and
perspiration make an
unbeatable combination for
success.”

More Related Content

What's hot

Introduction to Apache NiFi 1.11.4
Introduction to Apache NiFi 1.11.4Introduction to Apache NiFi 1.11.4
Introduction to Apache NiFi 1.11.4Timothy Spann
 
DDS Tutorial -- Part I
DDS Tutorial -- Part IDDS Tutorial -- Part I
DDS Tutorial -- Part IAngelo Corsaro
 
New Features in Apache Pinot
New Features in Apache PinotNew Features in Apache Pinot
New Features in Apache PinotSiddharth Teotia
 
Serverless Kafka on AWS as Part of a Cloud-native Data Lake Architecture
Serverless Kafka on AWS as Part of a Cloud-native Data Lake ArchitectureServerless Kafka on AWS as Part of a Cloud-native Data Lake Architecture
Serverless Kafka on AWS as Part of a Cloud-native Data Lake ArchitectureKai Wähner
 
Introduction to Apache Sqoop
Introduction to Apache SqoopIntroduction to Apache Sqoop
Introduction to Apache SqoopAvkash Chauhan
 
Amazon EMR Deep Dive & Best Practices
Amazon EMR Deep Dive & Best PracticesAmazon EMR Deep Dive & Best Practices
Amazon EMR Deep Dive & Best PracticesAmazon Web Services
 
DDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing StandardDDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing StandardAngelo Corsaro
 
The Parquet Format and Performance Optimization Opportunities
The Parquet Format and Performance Optimization OpportunitiesThe Parquet Format and Performance Optimization Opportunities
The Parquet Format and Performance Optimization OpportunitiesDatabricks
 
Apache Hadoop Security - Ranger
Apache Hadoop Security - RangerApache Hadoop Security - Ranger
Apache Hadoop Security - RangerIsheeta Sanghi
 
Overview of new features in Apache Ranger
Overview of new features in Apache RangerOverview of new features in Apache Ranger
Overview of new features in Apache RangerDataWorks Summit
 
Building a Consistent Hybrid Cloud Semantic Model In Denodo
Building a Consistent Hybrid Cloud Semantic Model In DenodoBuilding a Consistent Hybrid Cloud Semantic Model In Denodo
Building a Consistent Hybrid Cloud Semantic Model In DenodoDenodo
 

What's hot (20)

Apache Ranger
Apache RangerApache Ranger
Apache Ranger
 
Apache NiFi in the Hadoop Ecosystem
Apache NiFi in the Hadoop Ecosystem Apache NiFi in the Hadoop Ecosystem
Apache NiFi in the Hadoop Ecosystem
 
Introduction to Apache NiFi 1.11.4
Introduction to Apache NiFi 1.11.4Introduction to Apache NiFi 1.11.4
Introduction to Apache NiFi 1.11.4
 
Introduction to RTI DDS
Introduction to RTI DDSIntroduction to RTI DDS
Introduction to RTI DDS
 
DDS Tutorial -- Part I
DDS Tutorial -- Part IDDS Tutorial -- Part I
DDS Tutorial -- Part I
 
New Features in Apache Pinot
New Features in Apache PinotNew Features in Apache Pinot
New Features in Apache Pinot
 
DDS Security
DDS SecurityDDS Security
DDS Security
 
Serverless Kafka on AWS as Part of a Cloud-native Data Lake Architecture
Serverless Kafka on AWS as Part of a Cloud-native Data Lake ArchitectureServerless Kafka on AWS as Part of a Cloud-native Data Lake Architecture
Serverless Kafka on AWS as Part of a Cloud-native Data Lake Architecture
 
Introduction to Apache Sqoop
Introduction to Apache SqoopIntroduction to Apache Sqoop
Introduction to Apache Sqoop
 
Amazon EMR Deep Dive & Best Practices
Amazon EMR Deep Dive & Best PracticesAmazon EMR Deep Dive & Best Practices
Amazon EMR Deep Dive & Best Practices
 
ElephantDB
ElephantDBElephantDB
ElephantDB
 
DDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing StandardDDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing Standard
 
Best Practices Using RTI Connext DDS
Best Practices Using RTI Connext DDSBest Practices Using RTI Connext DDS
Best Practices Using RTI Connext DDS
 
The Parquet Format and Performance Optimization Opportunities
The Parquet Format and Performance Optimization OpportunitiesThe Parquet Format and Performance Optimization Opportunities
The Parquet Format and Performance Optimization Opportunities
 
Apache Hadoop Security - Ranger
Apache Hadoop Security - RangerApache Hadoop Security - Ranger
Apache Hadoop Security - Ranger
 
Apache Spark 1000 nodes NTT DATA
Apache Spark 1000 nodes NTT DATAApache Spark 1000 nodes NTT DATA
Apache Spark 1000 nodes NTT DATA
 
Hadoop HDFS
Hadoop HDFSHadoop HDFS
Hadoop HDFS
 
Overview of new features in Apache Ranger
Overview of new features in Apache RangerOverview of new features in Apache Ranger
Overview of new features in Apache Ranger
 
Building a Consistent Hybrid Cloud Semantic Model In Denodo
Building a Consistent Hybrid Cloud Semantic Model In DenodoBuilding a Consistent Hybrid Cloud Semantic Model In Denodo
Building a Consistent Hybrid Cloud Semantic Model In Denodo
 
Apache Spark Architecture
Apache Spark ArchitectureApache Spark Architecture
Apache Spark Architecture
 

Similar to zenoh: The Edge Data Fabric

Construire une « data fabric » pour les environnements edge
Construire une « data fabric » pour les environnements edgeConstruire une « data fabric » pour les environnements edge
Construire une « data fabric » pour les environnements edgeOpen Source Experience
 
Seed block algorithm
Seed block algorithmSeed block algorithm
Seed block algorithmDipak Badhe
 
The Proliferation And Advances Of Computer Networks
The Proliferation And Advances Of Computer NetworksThe Proliferation And Advances Of Computer Networks
The Proliferation And Advances Of Computer NetworksJessica Deakin
 
Evolution from EDA to Data Mesh: Data in Motion
Evolution from EDA to Data Mesh: Data in MotionEvolution from EDA to Data Mesh: Data in Motion
Evolution from EDA to Data Mesh: Data in Motionconfluent
 
Java Abs Peer To Peer Design & Implementation Of A Tuple S
Java Abs   Peer To Peer Design & Implementation Of A Tuple SJava Abs   Peer To Peer Design & Implementation Of A Tuple S
Java Abs Peer To Peer Design & Implementation Of A Tuple Sncct
 
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
Java Abs   Peer To Peer Design & Implementation Of A Tuple SpaceJava Abs   Peer To Peer Design & Implementation Of A Tuple Space
Java Abs Peer To Peer Design & Implementation Of A Tuple Spacencct
 
A Comprehensive Study On Data Mining Process With Distribution
A Comprehensive Study On Data Mining Process With DistributionA Comprehensive Study On Data Mining Process With Distribution
A Comprehensive Study On Data Mining Process With DistributionLori Mitchell
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...1crore projects
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...1crore projects
 
Dynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsDynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsPayamBarnaghi
 
How Consistent Data Services Deliver Simplicity, Compatibility, And Lower Cost
How Consistent Data Services Deliver Simplicity, Compatibility, And Lower CostHow Consistent Data Services Deliver Simplicity, Compatibility, And Lower Cost
How Consistent Data Services Deliver Simplicity, Compatibility, And Lower CostDana Gardner
 
Data Virtualization to Survive a Multi and Hybrid Cloud World
Data Virtualization to Survive a Multi and Hybrid Cloud WorldData Virtualization to Survive a Multi and Hybrid Cloud World
Data Virtualization to Survive a Multi and Hybrid Cloud WorldDenodo
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1thilaganga
 
Introduction to Modern Data Virtualization (US)
Introduction to Modern Data Virtualization (US)Introduction to Modern Data Virtualization (US)
Introduction to Modern Data Virtualization (US)Denodo
 
CouchBase The Complete NoSql Solution for Big Data
CouchBase The Complete NoSql Solution for Big DataCouchBase The Complete NoSql Solution for Big Data
CouchBase The Complete NoSql Solution for Big DataDebajani Mohanty
 
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET Journal
 
Data processing in Cyber-Physical Systems
Data processing in Cyber-Physical SystemsData processing in Cyber-Physical Systems
Data processing in Cyber-Physical SystemsBob Marcus
 
CC LECTURE NOTES (1).pdf
CC LECTURE NOTES (1).pdfCC LECTURE NOTES (1).pdf
CC LECTURE NOTES (1).pdfHasanAfwaaz1
 
White Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum DatabaseWhite Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum DatabaseEMC
 

Similar to zenoh: The Edge Data Fabric (20)

Construire une « data fabric » pour les environnements edge
Construire une « data fabric » pour les environnements edgeConstruire une « data fabric » pour les environnements edge
Construire une « data fabric » pour les environnements edge
 
Seed block algorithm
Seed block algorithmSeed block algorithm
Seed block algorithm
 
The Proliferation And Advances Of Computer Networks
The Proliferation And Advances Of Computer NetworksThe Proliferation And Advances Of Computer Networks
The Proliferation And Advances Of Computer Networks
 
Evolution from EDA to Data Mesh: Data in Motion
Evolution from EDA to Data Mesh: Data in MotionEvolution from EDA to Data Mesh: Data in Motion
Evolution from EDA to Data Mesh: Data in Motion
 
Java Abs Peer To Peer Design & Implementation Of A Tuple S
Java Abs   Peer To Peer Design & Implementation Of A Tuple SJava Abs   Peer To Peer Design & Implementation Of A Tuple S
Java Abs Peer To Peer Design & Implementation Of A Tuple S
 
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
Java Abs   Peer To Peer Design & Implementation Of A Tuple SpaceJava Abs   Peer To Peer Design & Implementation Of A Tuple Space
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
 
A Comprehensive Study On Data Mining Process With Distribution
A Comprehensive Study On Data Mining Process With DistributionA Comprehensive Study On Data Mining Process With Distribution
A Comprehensive Study On Data Mining Process With Distribution
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
 
Dynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsDynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT Environments
 
How Consistent Data Services Deliver Simplicity, Compatibility, And Lower Cost
How Consistent Data Services Deliver Simplicity, Compatibility, And Lower CostHow Consistent Data Services Deliver Simplicity, Compatibility, And Lower Cost
How Consistent Data Services Deliver Simplicity, Compatibility, And Lower Cost
 
Data Virtualization to Survive a Multi and Hybrid Cloud World
Data Virtualization to Survive a Multi and Hybrid Cloud WorldData Virtualization to Survive a Multi and Hybrid Cloud World
Data Virtualization to Survive a Multi and Hybrid Cloud World
 
thilaganga journal 1
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
 
Introduction to Modern Data Virtualization (US)
Introduction to Modern Data Virtualization (US)Introduction to Modern Data Virtualization (US)
Introduction to Modern Data Virtualization (US)
 
CouchBase The Complete NoSql Solution for Big Data
CouchBase The Complete NoSql Solution for Big DataCouchBase The Complete NoSql Solution for Big Data
CouchBase The Complete NoSql Solution for Big Data
 
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFS
 
Data processing in Cyber-Physical Systems
Data processing in Cyber-Physical SystemsData processing in Cyber-Physical Systems
Data processing in Cyber-Physical Systems
 
Grid Computing
Grid ComputingGrid Computing
Grid Computing
 
CC LECTURE NOTES (1).pdf
CC LECTURE NOTES (1).pdfCC LECTURE NOTES (1).pdf
CC LECTURE NOTES (1).pdf
 
White Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum DatabaseWhite Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum Database
 

More from Angelo Corsaro

Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationData Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationAngelo Corsaro
 
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingBreaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingAngelo Corsaro
 
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructurefog05: The Fog Computing Infrastructure
fog05: The Fog Computing InfrastructureAngelo Corsaro
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing PlatformAngelo Corsaro
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture FourAngelo Corsaro
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture ThreeAngelo Corsaro
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture TwoAngelo Corsaro
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture OneAngelo Corsaro
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsAngelo Corsaro
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security StandardAngelo Corsaro
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution ServiceAngelo Corsaro
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsAngelo Corsaro
 
Vortex II -- The Industrial IoT Connectivity Standard
Vortex II -- The  Industrial IoT  Connectivity StandardVortex II -- The  Industrial IoT  Connectivity Standard
Vortex II -- The Industrial IoT Connectivity StandardAngelo Corsaro
 
DDS in Action -- Part I
DDS in Action -- Part IDDS in Action -- Part I
DDS in Action -- Part IAngelo Corsaro
 
DDS and OPC UA Explained
DDS and OPC UA ExplainedDDS and OPC UA Explained
DDS and OPC UA ExplainedAngelo Corsaro
 
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
The Cloudy, Foggy and Misty Internet of Things --  Toward Fluid IoT Architect...The Cloudy, Foggy and Misty Internet of Things --  Toward Fluid IoT Architect...
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...Angelo Corsaro
 
Fluid IoT Architectures
Fluid IoT ArchitecturesFluid IoT Architectures
Fluid IoT ArchitecturesAngelo Corsaro
 

More from Angelo Corsaro (20)

Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationData Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
 
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingBreaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
 
Eastern Sicily
Eastern SicilyEastern Sicily
Eastern Sicily
 
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructurefog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructure
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing Platform
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture Four
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture Three
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture Two
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture One
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained Envionrments
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security Standard
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution Service
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming Ruminations
 
Vortex II -- The Industrial IoT Connectivity Standard
Vortex II -- The  Industrial IoT  Connectivity StandardVortex II -- The  Industrial IoT  Connectivity Standard
Vortex II -- The Industrial IoT Connectivity Standard
 
Fog Computing Defined
Fog Computing DefinedFog Computing Defined
Fog Computing Defined
 
DDS In Action Part II
DDS In Action Part IIDDS In Action Part II
DDS In Action Part II
 
DDS in Action -- Part I
DDS in Action -- Part IDDS in Action -- Part I
DDS in Action -- Part I
 
DDS and OPC UA Explained
DDS and OPC UA ExplainedDDS and OPC UA Explained
DDS and OPC UA Explained
 
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
The Cloudy, Foggy and Misty Internet of Things --  Toward Fluid IoT Architect...The Cloudy, Foggy and Misty Internet of Things --  Toward Fluid IoT Architect...
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
 
Fluid IoT Architectures
Fluid IoT ArchitecturesFluid IoT Architectures
Fluid IoT Architectures
 

Recently uploaded

Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 

Recently uploaded (20)

Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 

zenoh: The Edge Data Fabric