SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
1 Bit Stew Systems Inc. Confidential and Proprietary
Solving Industrial Data Integration with
Machine Intelligence
By: Mike Varney
Executive Director, Product Management & Strategic Initiatives at Bit Stew
2 Bit Stew Systems Inc. Confidential and Proprietary
The Problem with Big Data
With 50 billion devices connected to the
Internet by 2020 rapid data proliferation will
continue to choke the progress of data
analytics projects.
Analytics is only the tip of the iceberg. Data
integration, data quality, and challenges in
extracting value lurk beneath the surface
and are amplified by the growth of
Industrial data from IIoT.
Analytics are the tip
of the iceberg
Data cleansing
and quality
challenges lurk
beneath the
surface
3 Bit Stew Systems Inc. Confidential and Proprietary
Two Different Worlds, One Common Problem
Operational Technology
(OT)
Information Technology
(IT)
Industrial IoT
• Asset Performance
• Real-Time Status Monitoring
• Diagnostics & Service
• Predictive Maintenance
• Software Updates
• Data Integration
• Data Cleansing
• Systems Management
• Analytics
• Value-Added Services
0101010
010101
01
01
4 Bit Stew Systems Inc. Confidential and Proprietary
Hidden Cost of Integration
• Industrial data is not easy
• Complex data, variable size, frequency, and format
• Disparate sources
• No view of data relationships across the enterprise
• Often rely on traditional ETL or BI tools
• Large integration teams costing thousands of dollars
5 Bit Stew Systems Inc. Confidential and Proprietary
Complex Environments Lead to Complex Data
Why is Industrial Data so complicated?
Variety of source types Messy Data Complex Data
Relations
Different Sizes Massive Volume Varied Frequency
6 Bit Stew Systems Inc. Confidential and Proprietary
Traditional ETL Compounds the Problem
This model does not work for large
volumes of complex OT and IT data
Extracts source data
without contextual
understanding
Then a team of
integrators, architects,
and data scientists apply
transformations
After which, finally
it can be provided
to business and
operational teams
7 Bit Stew Systems Inc. Confidential and Proprietary
Why MIx Core?
Small teams can solve BIG industrial problems with MIx Core™
• No longer need large and costly integration teams
• IoT endpoints are being added at an accelerated pace that is
unmanageable by human computing
• Machine Intelligence solves the compounding data problem
in Industrial environments
8 Bit Stew Systems Inc. Confidential and Proprietary
Using Machine Intelligence to Automate Data Integration
• Comprehensive Semantic Model
• Automatic sensing of data and mapping to Semantic Model
• Dynamic and adaptive to source data
• Examine, transform and clean data
Machine
Intelligence
Create Semantic Model
Siloed Data Sources
Intelligent Integration to
Target Model
• Integrate with APIs, services, files, streams and
network traffic
• Embedded guaranteed messaging
• Interactive UI for viewing and editing
9 Bit Stew Systems Inc. Confidential and Proprietary
Step 1: Create Feature Vector
– Source data is read and sent to the Hierarchical Feature
Extractor
– The Hierarchical Feature Extractor produces Feature Vectors
– The Hierarchical Feature Extractor can be customized for
domain specific feature extraction and machine learning.
– Feature vectors are used to fingerprint and classify the input
data.
Step 2: Store denormalized data into the Data Index
– The Feature Vectors are stored into the Data Index
– Data is denormalized and fed into the Relationship Association
– A Relationship Matrix is created and stored into the Data Index
How it Works?
10 Bit Stew Systems Inc. Confidential and Proprietary
How it Works?
Step 3: Create Semantic Model
– The Feature Vectors are sent to the Field Classifier
– The Field Classifier uses supervised and unsupervised machine
learning algorithms to relate and map data
– Each algorithm gets a vote to determine the best model
– The related and mapped data is sent to the Modeler to create a
Semantic Model
Step 4: Publish the Semantic Model to Target Systems
– Model is published and available for use in the platform
– The semantic model may be exported to 3rd party systems for
further analysis
– Changes to published model are tracked over time for the system
to learn how relationships in the data change over time
11 Bit Stew Systems Inc. Confidential and Proprietary
Learn more about Bit Stew
Visit www.info.bitstew.com
Follow us on
Download the whitepaper: http://info.bitstew.com/whitepaper-mike-machine-intelligence
12 Bit Stew Systems Inc. Confidential and Proprietary
Mike Varney spent over 20 years in the US Navy, where his experience
included commanding the most advanced nuclear-powered submarines
in complex operations around the globe, leading a special operations
team in reconstruction efforts in Afghanistan, and directing a Naval
Operations Centre. He has also served as a Strategic Advisor for the US
Department of Defense, a Senior Evaluation Officer at nuclear power
plants, and an advisor to companies providing smart grid technologies to
the energy industry.
Mike holds Bachelor of Science degrees in Nuclear and Marine
Engineering as well as Master of Science degrees in Engineering
Management and National Security Strategy. Today, Mike is the Executive
Director, Product Management & Strategic Initiatives, where he leads the
strategy for Bit Stew Systems MIx Core platform, MIx Developer Network
and Bit Stew University.
About the Author

Contenu connexe

Tendances

EthCon Korea 28 May 2019
EthCon Korea 28 May 2019EthCon Korea 28 May 2019
EthCon Korea 28 May 2019iExec
 
Integris software ppt
Integris software pptIntegris software ppt
Integris software pptintegrisus
 
The iEx.ec Distributed Cloud: Latest Developments and Perspectives
The iEx.ec Distributed Cloud: Latest Developments and PerspectivesThe iEx.ec Distributed Cloud: Latest Developments and Perspectives
The iEx.ec Distributed Cloud: Latest Developments and PerspectivesGilles Fedak
 
Cisco data analytics in ioe_rajiv niles_2015 nov
Cisco data analytics in ioe_rajiv niles_2015 novCisco data analytics in ioe_rajiv niles_2015 nov
Cisco data analytics in ioe_rajiv niles_2015 novCiscoKorea
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurSri Ambati
 
Iot & security automation-by Er. Nashet Ali
Iot &  security  automation-by  Er. Nashet  AliIot &  security  automation-by  Er. Nashet  Ali
Iot & security automation-by Er. Nashet AliNashet Ali
 
Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
 
The truth about IoT field gateways (Sam Vanhoutte @IoT Convention Europe 2017)
The truth about IoT field gateways (Sam Vanhoutte @IoT Convention Europe 2017) The truth about IoT field gateways (Sam Vanhoutte @IoT Convention Europe 2017)
The truth about IoT field gateways (Sam Vanhoutte @IoT Convention Europe 2017) Codit
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
 
Introduction to IOT in Google Cloud | Yogesh Ojha
Introduction to IOT in Google Cloud | Yogesh OjhaIntroduction to IOT in Google Cloud | Yogesh Ojha
Introduction to IOT in Google Cloud | Yogesh OjhaYogesh Ojha
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use casesAbhishek Sood
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloudUlf Mattsson
 
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...Kenneth Moore
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths Vish Nandlall
 

Tendances (20)

EthCon Korea 28 May 2019
EthCon Korea 28 May 2019EthCon Korea 28 May 2019
EthCon Korea 28 May 2019
 
Integris software ppt
Integris software pptIntegris software ppt
Integris software ppt
 
The iEx.ec Distributed Cloud: Latest Developments and Perspectives
The iEx.ec Distributed Cloud: Latest Developments and PerspectivesThe iEx.ec Distributed Cloud: Latest Developments and Perspectives
The iEx.ec Distributed Cloud: Latest Developments and Perspectives
 
Cisco data analytics in ioe_rajiv niles_2015 nov
Cisco data analytics in ioe_rajiv niles_2015 novCisco data analytics in ioe_rajiv niles_2015 nov
Cisco data analytics in ioe_rajiv niles_2015 nov
 
Why Cisco- for-Intelligence
Why Cisco- for-IntelligenceWhy Cisco- for-Intelligence
Why Cisco- for-Intelligence
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoT
 
Cybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith BarthurCybersecurity with AI - Ashrith Barthur
Cybersecurity with AI - Ashrith Barthur
 
Adopting Emerging Technologies
Adopting Emerging TechnologiesAdopting Emerging Technologies
Adopting Emerging Technologies
 
Iot & security automation-by Er. Nashet Ali
Iot &  security  automation-by  Er. Nashet  AliIot &  security  automation-by  Er. Nashet  Ali
Iot & security automation-by Er. Nashet Ali
 
Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
The truth about IoT field gateways (Sam Vanhoutte @IoT Convention Europe 2017)
The truth about IoT field gateways (Sam Vanhoutte @IoT Convention Europe 2017) The truth about IoT field gateways (Sam Vanhoutte @IoT Convention Europe 2017)
The truth about IoT field gateways (Sam Vanhoutte @IoT Convention Europe 2017)
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
Introduction to IOT in Google Cloud | Yogesh Ojha
Introduction to IOT in Google Cloud | Yogesh OjhaIntroduction to IOT in Google Cloud | Yogesh Ojha
Introduction to IOT in Google Cloud | Yogesh Ojha
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use cases
 
Sect f43
Sect f43Sect f43
Sect f43
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 
Az-Internet of things
Az-Internet of thingsAz-Internet of things
Az-Internet of things
 
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths
 

Similaire à Solving Industrial Data Integration with Machine Intelligence

Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...SolarWinds
 
SP Network Automation: Automated Operations Overview
SP Network Automation: Automated Operations Overview SP Network Automation: Automated Operations Overview
SP Network Automation: Automated Operations Overview Cisco Service Provider
 
What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?Precisely
 
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15MLconf
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Sutedjo Tjahjadi
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITPrecisely
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceSolarWinds
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityTapan Biswas
 
IBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationIBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationPaula Koziol
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...Enterprise Management Associates
 
Powering the Internet of Things with Apache Hadoop
Powering the Internet of Things with Apache HadoopPowering the Internet of Things with Apache Hadoop
Powering the Internet of Things with Apache HadoopCloudera, Inc.
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceSolarWinds
 
MongoDB IoT CITY Tour EINDHOVEN: Machina Research
MongoDB IoT CITY Tour EINDHOVEN: Machina ResearchMongoDB IoT CITY Tour EINDHOVEN: Machina Research
MongoDB IoT CITY Tour EINDHOVEN: Machina ResearchMongoDB
 
influence of AI in IS
influence of AI in ISinfluence of AI in IS
influence of AI in ISISACA Riyadh
 
Improving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsImproving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsSolarWinds
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKUlf Mattsson
 

Similaire à Solving Industrial Data Integration with Machine Intelligence (20)

Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
 
SP Network Automation: Automated Operations Overview
SP Network Automation: Automated Operations Overview SP Network Automation: Automated Operations Overview
SP Network Automation: Automated Operations Overview
 
What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?
 
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
Shiva Amiri, Chief Product Officer, RTDS Inc. at MLconf SEA - 5/01/15
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe IT
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
IBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationIBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver Innovation
 
AI in the Enterprise at Scale
AI in the Enterprise at ScaleAI in the Enterprise at Scale
AI in the Enterprise at Scale
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 
Powering the Internet of Things with Apache Hadoop
Powering the Internet of Things with Apache HadoopPowering the Internet of Things with Apache Hadoop
Powering the Internet of Things with Apache Hadoop
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
MongoDB IoT CITY Tour EINDHOVEN: Machina Research
MongoDB IoT CITY Tour EINDHOVEN: Machina ResearchMongoDB IoT CITY Tour EINDHOVEN: Machina Research
MongoDB IoT CITY Tour EINDHOVEN: Machina Research
 
influence of AI in IS
influence of AI in ISinfluence of AI in IS
influence of AI in IS
 
Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?
 
Improving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsImproving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWinds
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 

Dernier

%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456KiaraTiradoMicha
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyAnusha Are
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 

Dernier (20)

%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 

Solving Industrial Data Integration with Machine Intelligence

  • 1. 1 Bit Stew Systems Inc. Confidential and Proprietary Solving Industrial Data Integration with Machine Intelligence By: Mike Varney Executive Director, Product Management & Strategic Initiatives at Bit Stew
  • 2. 2 Bit Stew Systems Inc. Confidential and Proprietary The Problem with Big Data With 50 billion devices connected to the Internet by 2020 rapid data proliferation will continue to choke the progress of data analytics projects. Analytics is only the tip of the iceberg. Data integration, data quality, and challenges in extracting value lurk beneath the surface and are amplified by the growth of Industrial data from IIoT. Analytics are the tip of the iceberg Data cleansing and quality challenges lurk beneath the surface
  • 3. 3 Bit Stew Systems Inc. Confidential and Proprietary Two Different Worlds, One Common Problem Operational Technology (OT) Information Technology (IT) Industrial IoT • Asset Performance • Real-Time Status Monitoring • Diagnostics & Service • Predictive Maintenance • Software Updates • Data Integration • Data Cleansing • Systems Management • Analytics • Value-Added Services 0101010 010101 01 01
  • 4. 4 Bit Stew Systems Inc. Confidential and Proprietary Hidden Cost of Integration • Industrial data is not easy • Complex data, variable size, frequency, and format • Disparate sources • No view of data relationships across the enterprise • Often rely on traditional ETL or BI tools • Large integration teams costing thousands of dollars
  • 5. 5 Bit Stew Systems Inc. Confidential and Proprietary Complex Environments Lead to Complex Data Why is Industrial Data so complicated? Variety of source types Messy Data Complex Data Relations Different Sizes Massive Volume Varied Frequency
  • 6. 6 Bit Stew Systems Inc. Confidential and Proprietary Traditional ETL Compounds the Problem This model does not work for large volumes of complex OT and IT data Extracts source data without contextual understanding Then a team of integrators, architects, and data scientists apply transformations After which, finally it can be provided to business and operational teams
  • 7. 7 Bit Stew Systems Inc. Confidential and Proprietary Why MIx Core? Small teams can solve BIG industrial problems with MIx Core™ • No longer need large and costly integration teams • IoT endpoints are being added at an accelerated pace that is unmanageable by human computing • Machine Intelligence solves the compounding data problem in Industrial environments
  • 8. 8 Bit Stew Systems Inc. Confidential and Proprietary Using Machine Intelligence to Automate Data Integration • Comprehensive Semantic Model • Automatic sensing of data and mapping to Semantic Model • Dynamic and adaptive to source data • Examine, transform and clean data Machine Intelligence Create Semantic Model Siloed Data Sources Intelligent Integration to Target Model • Integrate with APIs, services, files, streams and network traffic • Embedded guaranteed messaging • Interactive UI for viewing and editing
  • 9. 9 Bit Stew Systems Inc. Confidential and Proprietary Step 1: Create Feature Vector – Source data is read and sent to the Hierarchical Feature Extractor – The Hierarchical Feature Extractor produces Feature Vectors – The Hierarchical Feature Extractor can be customized for domain specific feature extraction and machine learning. – Feature vectors are used to fingerprint and classify the input data. Step 2: Store denormalized data into the Data Index – The Feature Vectors are stored into the Data Index – Data is denormalized and fed into the Relationship Association – A Relationship Matrix is created and stored into the Data Index How it Works?
  • 10. 10 Bit Stew Systems Inc. Confidential and Proprietary How it Works? Step 3: Create Semantic Model – The Feature Vectors are sent to the Field Classifier – The Field Classifier uses supervised and unsupervised machine learning algorithms to relate and map data – Each algorithm gets a vote to determine the best model – The related and mapped data is sent to the Modeler to create a Semantic Model Step 4: Publish the Semantic Model to Target Systems – Model is published and available for use in the platform – The semantic model may be exported to 3rd party systems for further analysis – Changes to published model are tracked over time for the system to learn how relationships in the data change over time
  • 11. 11 Bit Stew Systems Inc. Confidential and Proprietary Learn more about Bit Stew Visit www.info.bitstew.com Follow us on Download the whitepaper: http://info.bitstew.com/whitepaper-mike-machine-intelligence
  • 12. 12 Bit Stew Systems Inc. Confidential and Proprietary Mike Varney spent over 20 years in the US Navy, where his experience included commanding the most advanced nuclear-powered submarines in complex operations around the globe, leading a special operations team in reconstruction efforts in Afghanistan, and directing a Naval Operations Centre. He has also served as a Strategic Advisor for the US Department of Defense, a Senior Evaluation Officer at nuclear power plants, and an advisor to companies providing smart grid technologies to the energy industry. Mike holds Bachelor of Science degrees in Nuclear and Marine Engineering as well as Master of Science degrees in Engineering Management and National Security Strategy. Today, Mike is the Executive Director, Product Management & Strategic Initiatives, where he leads the strategy for Bit Stew Systems MIx Core platform, MIx Developer Network and Bit Stew University. About the Author