Download as pdf or txt
Download as pdf or txt
You are on page 1of 53

Building Enterprise IoT Applications 1st

Edition Chandrasekar Vuppalapati


Visit to download the full and correct content document:
https://textbookfull.com/product/building-enterprise-iot-applications-1st-edition-chandr
asekar-vuppalapati/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Beginning EJB in Java EE 8: Building Applications with


Enterprise JavaBeans Jonathan Wetherbee

https://textbookfull.com/product/beginning-ejb-in-java-
ee-8-building-applications-with-enterprise-javabeans-jonathan-
wetherbee/

Raspberry Pi for Arduino Users: Building IoT and


Network Applications and Devices 1st Edition James R.
Strickland

https://textbookfull.com/product/raspberry-pi-for-arduino-users-
building-iot-and-network-applications-and-devices-1st-edition-
james-r-strickland/

Building an Effective IoT Ecosystem for Your Business


1st Edition Sudhi R. Sinha

https://textbookfull.com/product/building-an-effective-iot-
ecosystem-for-your-business-1st-edition-sudhi-r-sinha/

Building an Enterprise Chatbot: Work with Protected


Enterprise Data Using Open Source Frameworks Abhishek
Singh

https://textbookfull.com/product/building-an-enterprise-chatbot-
work-with-protected-enterprise-data-using-open-source-frameworks-
abhishek-singh/
The Agile Enterprise: Building and Running Agile
Organizations 1st Edition Mario E. Moreira

https://textbookfull.com/product/the-agile-enterprise-building-
and-running-agile-organizations-1st-edition-mario-e-moreira/

Serverless Development on AWS: Building Enterprise-


Scale Serverless Solutions 1st Edition Sheen Brisals

https://textbookfull.com/product/serverless-development-on-aws-
building-enterprise-scale-serverless-solutions-1st-edition-sheen-
brisals/

Enterprise GIS: Concepts and Applications 1st Edition


John R. Woodard

https://textbookfull.com/product/enterprise-gis-concepts-and-
applications-1st-edition-john-r-woodard/

Pro Spring Boot 2: An Authoritative Guide to Building


Microservices, Web and Enterprise Applications, and
Best Practices 2nd Edition Felipe Gutierrez

https://textbookfull.com/product/pro-spring-boot-2-an-
authoritative-guide-to-building-microservices-web-and-enterprise-
applications-and-best-practices-2nd-edition-felipe-gutierrez/

Pro Spring Boot 2 An Authoritative Guide to Building


Microservices Web and Enterprise Applications and Best
Practices Second Edition Felipe Gutierrez

https://textbookfull.com/product/pro-spring-boot-2-an-
authoritative-guide-to-building-microservices-web-and-enterprise-
applications-and-best-practices-second-edition-felipe-gutierrez/
Building Enterprise IoT
Applications
Chandrasekar Vuppalapati
Senior Vice President–Products & Programs
Hanumayamma Innovations and Technologies, Inc.
Fremont, California, USA
and
College of Engineering
San Jose State University
San Jose, California, USA
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2020 by Taylor & Francis Group, LLC
CRC Press is an imprint of Taylor & Francis Group, an Informa business
No claim to original U.S. Government works
Version Date: 20190923
International Standard Book Number-13: 978-0-367-17385-2 (Hardback)
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been
made to publish reliable data and information, but the author and publisher cannot assume responsibility for the
validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the
copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to
publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let
us know so we may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted,
or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, includ-
ing photocopying, microfilming, and recording, or in any information storage or retrieval system, without written
permission from the publishers.

For permission to photocopy or use material electronically from this work, please access www.copyright.com
(http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers,
MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety
of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment
has been arranged.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for
identification and explanation without intent to infringe.

Library of Congress Cataloging-in-Publication Data


Names: Vuppalapati, Chandrasekar, 1972- author.
Title: Building enterprise IoT applications / Chandrasekar Vuppalapati,
Senior Vice President, Products & Programs, Hanumayamma Innovations and
Technologies, Inc., Fremont, California, USA and College of Engineering,
San Jose State University, San Jose, California, USA.
Description: First edition. | Boca Raton : CRC Press/Taylor & Francis
Group, [2020] | Includes bibliographical references and index. |
Summary: “The book deals with the complete spectrum IoT software
development, from startup, industry and academic perspectives, with the
objective of teaching readers to develop state of art IoT applications.
The cases presented in the book will encourage readers to create
innovative blue ocean software products with the goal to serve the
humanity and create value for future generations”-- Provided by
publisher.
Identifiers: LCCN 2019040297 | ISBN 9780367173852 (hardcover ; acid-free
paper)
Subjects: LCSH: Internet of things. | Business enterprises--Computer
networks. | Application software--Development.
Classification: LCC TK5105.8857 .V87 2020 | DDC 005.3--dc23
LC record available at https://lccn.loc.gov/2019040297

Visit the Taylor & Francis Web site at


http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
Preface

The Internet of Things (IoT) is a game changer, transforming many enterprises into digital businesses and
facilitating new business models, blue-ocean product strategies, Data Monetization opportunities, just in
time (JIT) product service offerings, service contracts with proactive product maintenance, Enablement
of citizenry services, Smart meters, Smart Cities, Smart Buildings, Smart Manufacturing and many other
next-generation products & services. IoT architectures and deployments can be found in various industries
including: Chemical, Healthcare, Industrial, Pharmaceutical, Construction, Agriculture, Smart Buildings,
Smart cities, E-Governance, Connected Stadiums, Retail, Contact Center, Gaming, Chip Fabrication,
Transportation, IT Services (Managed) and many more. It is clear from market adoption that the Internet
of Things (IoT) is the platform of the future.
IoT based architectures are projected to inter-connect 20 billion new devices with a potential of $11.1
trillion per year in economic value by 2025. At the time of writing this book, IoT has already connected
39% of the world’s population and has generated more data in 1 year than in the previous 5000 years put
together.
In order to harvest the benefits of the IoT revolution, traditional software development paradigms
must be upgraded. The purpose of this book is to prepare current and future software engineering teams
with the skills and tools that fully utilize IoT capabilities. The book introduces essential IoT concepts
from the perspectives of full-scale software development with the emphasis on creating niche blue ocean
products. It also:
• Outlines a fundamental full stack architecture for IoT
• Describes various development technologies in each IoT layer
• Explains deployment of Machine Learning Models at the Edge Level
• Describes Machine Learning Models and Artificial Intelligence
• Presents IoT Use cases from Agriculture, Healthcare, Mobile industry verticals
• Explains IoT solution development from Product management perspective
• Extensively covers security and applicable threat models as part of IoT stack
The book provides details of several IoT reference architectures with emphasis on data integration,
edge analytics, cluster architectures and closed loop responses.
Dedication

The author dedicates his works, book, and efforts of this book to his late father Murahari Rao Vuppalapati,
who had inspired him to write the book and guided the author’s pursuits of life, and to his loving mother
Hanumayamma Vuppalapati, who was the inspiration to develop company and dairy products for the
betterment of humanity and future generations.
Acknowledgement

The author is deeply indebted to the love, support, and encouragement of his wife Anitha Ilapakurti, and
the active support of his daughters, Sriya Vuppalapati and Shruti Vuppalapati who helped draft the first
version of the manuscript.
The author is deeply thankful to the support of his elder brother, Rajasekar Vuppalapati, and the joyful
support of his younger brother, Jaya Shankar Vuppalapati. Additionally, the author is also very thankful
to his elder sisters Padmavati Vuppalapati and Sridevi Vuppalapati.
The author sincerely thanks Santosh Kedari and his team in India for conducting field studies in
India for Dairy and Sanjeevani Healthcare analytics products and bringing the market feedback for the
betterment of services.
The author is deeply indebted to Sharat Kedari, who helped to draft the book structure, code examples
of the book and helped in setting Cloud and machine learning algorithms. In addition, the author is thankful
for the support, hard work and dedication of Vanaja Satish who helped to solve embedded systems and
build of iDispenser and SQLite.
The author sincerely thanks the support of fellow researchers and engineers including Sudha Rama
Chandran, Shruti Agrawal, MeenuYadav, his students Renato Silveira Cordeiro, Sadab Qureshi, and
Suchishree Jena and his graphic illustrator Rohit Ranjan.
Contents

Preface iii
Dedication iv
Acknowledgement v

1. Introduction 1
Industry 4.0 3
The Man and the Machine—Robots may guide collaboration with Humans 5
The Five Forces that shape Industry Competition and Smart Connected Objects 5
Digital Twin 6
Enterprise IoT Platforms 7
Human Touch – artificial intelligence infused Mobile Companion 8
The CRISP-PM Process 8
References 12

2. Foundation Architectures 14
IoT Platform 14
IoT Platform Types 15
Connectivity Platform 18
Case Study: Artik Connectivity Platform 20
Technical Case Study: Using IoT to detect water leakages with Powel 28
IoT & KDD 31
5Vs and IoT 32
Intel IoT Data Flow Diagram 37
CAP Theorem 37
IoT Streams and Reference Architecture 38
Data at Rest 41
References 43

3. Hardware Design 45
Arduino IDE Installation 45
Arduino Uno Pinout Diagram and Guide 45
Tinyduino Humidity Sensor (SI7021) 49
Embedded System Architecture 51
Dairy IoT Sensor 55
References 67

4. IoT Data Sources 68


Industrial Case Study: Connected Bus and Mass Transportation 74
Case study 76
Type of Sensors 77
Basic Sensors 77
Contents vii

Motion Sensors 78
Accelerometer App 89
Accelerometer Play App – a Precursor to Digital Twin Apps 95
Magnetometer App 96
The Role of Sensors in Healthcare & Wellness 102
Case Study: A System to Detect Mental Stress Using Machine Learning and 102
Mobile Development
Health Fitness IoT App 103
Step Counter Value 104
Android BatchStepSensor Sample 105
Full Sensor & Data List 108
Core Motion Framework in iOS 108
Core Motion iOS Code 112
Pedometer App 117
Case Study: California Reservoir Continuous Water Monitoring 120
Current Reservoir Conditions 122
Video Sensors 129
Image Texture Data 129
Geospatial Data 130
References 131

5. IoT Data Collectors 133


Case Study: Note to my great-great Grand Kids: I am Sorry 137
Data Collector Algorithms 137
Audio Signal Data 152
Image Texture Extraction—Histograms 154
References 155

6. Data Storage 157


Data in Motion: Data representations 157
Files in C 166
EPROM Data Storage 174
Android Data Storage 183
SQLite 191
SQLite and Embedded C App 195
SQL Storage 196
iOS Data Storage 201
Tensors as Storage 205
References 209

7. Machine Learning at the Edge 211


Case Study: Intelligent Dispenser for Long Tail Venues 213
Supervised Learning Techniques useful for small form Factor Devices 214
Clustering 216
References 218

8. Edge Analytics 219


Case Study: Smart City—Intelligent Dispenser 220
Sliding Window 230
Model Equation—Regression Analysis 234
Kalman Filter 244
viii Building Enterprise IoT Applications

K-Means Clustering 249


Case Study: Sensor Signal and Data Interference & Machine Learning 250
Fuzzy Logic (FL) 255
Reinforcement Learning (RL) 258
Neural Networks 259
Voice Detection (Neural Networks) 260
Tensor Flow execution on embedded Microcontroller Units (MCUs) 274
Edge to Cloud Amalgamation—Traffic Light Sensors as law enforcement devices 274
Hotels and Entertainment and Dynamic Pricing (Harmonious dancing for calculating the 275
best price—both for industry and Patrons—a Win-Win)
References 276

9. Connectivity 277
5G Network 278
Case Study: Low Power Wide Area (LPWA) and Cellular IoT 279
REST 279
CoAP (Constrained Application Protocol) 287
Bluetooth Low Energy (BLE) 294
iOS App—IoT made easy—Sensor Tag 301
Android 307
Hanumayamma Dairy IoT Design 308
Case Study: Dairy Application—Cow Necklace 310
MQTT 322
IoT and Hardware Clocks 333
MQTT Signals 339
MQTT Client 340
MQTT Wireshark Captures 344
ECG or Electrocardiogram Sesnors 364
References 368

10. Middleware 369


Message Architectures 369
Apache Kafka 371
Installation of Kafka 374
Apache Spark 386
References 392

11. Cloud and IoT 393


IoT Data Analytics Platform 396
Data Processing Architecture 397
Insight Value Chain 398
References 399

12. Future 400


IoT the best deterrent to prevent the effects of Climate Change 400

Appendix 401
Appendix A: bench_time.c 401
Appendix: California Reservoir Sensor Details 405
Appendix: Sacramento River At Knights Landing 406
Query Interface 408
Contents ix

Scaremento Stations 408


SACRAMENTO R @ FREMONT WEIR(CREST 32.0’) (FRE) 409
Real Time Sensor Data – Sacramento R @ Fremont WEIR 409
SNOW Sensors 410
Appendix - SQLite Build - Amalgamation 411

Appendix – DO-178B (Software Considerations in Airborne Systems and Equipment Certification) 412
Appendix – STDIO.H File 412
Appendix: Milk Producing Data Centers 415
Pthread Support in Microsoft Windows Services for UNIX Version 3.5 417

Index 421
Chapter 1
Introduction

This Chapter Covers:


• The Internet of Things Addressable Market (TAM) potential
• Augmented Analytics
• Industry 4.0
• IoT & New Technology Stack
• Porter Five Forces that Shape Competition & IoT Influence
• The Cross-Industry Standard Process for Data Mining (CRISP-DM)

The Internet of Things (IoT) has become the economic and social disruption of the century.
In its report on the most disruptive technologies—advances that will transform life, business,
and the global economy, the McKinsey global institute has listed Internet of Things as the
third major force that will transform our lives and global economy and commerce (please see
Figure 1). Due to the diffusion of IoT, there has been 300% increase in connected machine-to-machine (M2M)
devices in the past 5 years. The IoT has resulted in 80%–90% decline in MEMS (Microelectromechanical
systems) Sensors costs in the past 5 years. The IoT could connect more than 1 trillion things to the Internet
across industries such as manufacturing, healthcare, and mining. Finally, IoT could generate cost synergies
of magnitude $36 Trillion costs of key connected industries (manufacturing, health care, and mining) [1].

Speed, scope, and economic value at stake of 12 potentially economically disruptive technologies1

The Internet of Things—embedding sensors and actuators in machines and other physical objects to bring
them into the connected world—is spreading rapidly. From monitoring the flow of products through a factory,
to measuring the moisture in a field of crops and tracking the flow of water through utility pipes, the Internet
of Things allows businesses and public-sector organizations to manage assets, optimize performance, and
create new business models. With remote monitoring, the Internet of Things also has great potential to
improve the health of patients with chronic illnesses and attack a major cause of rising health-care costs [2].

The IoT has connected 39% of the world population and is generating more data in one year than in
the previous 5000 years put together. To support the promise and growth of IoT (50 billion Smart Objects

1
McKinsey 12 most disruptive technologies - https://www.mckinsey.com/~/media/McKinsey/Business%20Functions/
McKinsey%20Digital/Our%20Insights/Disruptive%20technologies/MGI_Disruptive_technologies_Full_report_
May2013.ashx
2 Building Enterprise IoT Applications

F1 Icon1
F1 Icon1 F1 Icon4
F1 Icon4
F1
F1Icon2
Icon1
F1 Icon2 F1 Icon5
Icon4
F1
F1 Icon3 F1 Icon5
F1 Icon3
F1 Icon2
F1 Icon5
F1 Icon3
50 Billion
50
“Smart Objects”
50 Billion
50
“Smart Objects”
40
Adoption rate of

F1 Icon4
40 digital infrastructure:
50 Billion
F3
5Adoption
× faster rate of
than
30
50
“Smart
digital andObjects”
infrastructure:
electricity telephony

F3
5 × faster than
n1 30 electricity and telephony
20
40 F1 Icon4 Adoption rate of

F1 Icon5
20 digital infrastructure:
n2
F3
5 × faster than
10
30 electricity and telephony
World Propulation
10
0
F1 Icon5 6.8 7.2 7.6
World Propulation
n3 20
0
6.8 7.2 7.6
2010 2015 2020

10 2010 2015 2020

Figure 1: McKinsey Global Major Influencer [1]


World Propulation
6.8 7.2 7.6
0
4th Industrial revolution
5050
Billion
Billion
on the basis of cyber-phy-
“Smart2010
Objects” 2015 4th 2020
“Smart Objects” sical Industrial
productionrevolution
systems
on the basis
(CPPS), of cyber-phy-
merging of real

[3]—adoption rate 5X faster than electricity and telephony),3 the enterprise compute platforms need to
Adoption rate of
digital infrastructure:
Adoption rate
thanof
First progrmmable logic
control system 1969
sicalvirtual
and production
worldssystems
(CPPS), merging of real
Industry 4.0

scale to F3
5 × faster
and virtual worlds
the needs of data.
digital infrastructure:
electricity and telephony First progrmmable logic
3rd Industrial revolution 4th Industrial revolution

F3
5 × faster than control system 1969
electricity and telephony through application of on the basis ofIndustry 4.0
cyber-phy-
3rd Industrial
electronic and revolution
IT to sical production systems
through
further application of
automate (CPPS), merging of real
of complicity

Case Study: IoT Devices play pivotal role in driving Augmented Analytics4
electronic
production and IT to logic and virtual worlds
World Propulation First progrmmable
6.8 7.2 7.6 First assembly line further
controlautomate
system 1969
of complicity

1870 Industry 4.0


production Industry 3.0
First assembly line 3rd Industrial revolution
2010 2015 2020

Augmented Intelligence [4] focuses on Artificial Intelligence (AI)’s assistive role [5], that is,
2nd
1870Industrial
World revolution
Propulation Industry 3.0
through application of
Degree

7.2 7.6 through introduction of


electronic and IT to

enhancing human intelligence rather thanF4


2nd Industrial
mass productionrevolution
with the
further automate
replacing it. The choice of the word augmented, which
Degree
Degree of complicity

through
help introduction
of electrical of
energy
production

F4
First mechanical 4th Industrial revolution
0 2015 mass
2020on the basis of cyber-phy- production
First assembly with the
line
weaving loom sical production systems help of electrical energy

means “to improve”, reinforces the role that human intelligence plays when using machine learning
1870 Industry 3.0
First mechanical(CPPS), merging of real
1784 Industry 2.0
and virtual worlds
weaving loom
First progrmmable logic
2nd Industrial revolution
1st
control Industrial
system
1784 1969 revolution Industry 4.0

and deep learning algorithms to discover relationships and solve problems.5


through introduction of Industry 2.0
throughrevolution
introduction of

F4
3rd Industrial mass production with the
4th
1stapplication
Industrial
mechanical
through Industrial
revolution
ofproduction revolution
on the help of electrical energy
electronic and IT to
through
facilities
furtherFirst
with
mechanical
automate
thebasis
introduction helpof of cyber-phy-
andsical production
power systems
Degree of complicity

mechanical
water
production production
steam
weaving loom
Augmented analytics6 [5] helps enterprises perform KDD in order to discover new insights. It helps,
First assembly line
facilities (CPPS),
with the merging
help of of real
1870 1784 and virtual worlds Industry 3.0 Industry 2.0
First progrmmable waterlogic and steam power Industry 1.0
2nd Industrial revolution
control system 19691st Industrial revolutionIndustry 4.0
importantly, to citizen data science7 to the enabler of data analytics [6].
through introduction of

F4
mass production with the through introduction of Industry 1.0
3rd Industrial
help of electrical energy revolution
mechanical production
al through application ofEnd of 18th century Beginning of 20th century Beginning of 1970s of Today
facilities with the help of
electronic and IT to 20th century
water and steam power Industry 2.0
further automate End of 18th century
Mobile is increasingly ubiquitous. With 6.8 billion mobile subscriptions worldwide, access anytime,
Beginning of 20th century Beginning of 1970s of Today
Degree of complicity

volution
ction of production 20th century
bly line
duction Industry 1.0

anywhere through smart gadgets is now putting cheap and connected, mobile computing power in
e help of Industry 3.0
m power
al revolution

the hands of millions of consumers and healthcare practitioners. Mobile Sensors—accelerometers,


End of 18th century Industry 1.0
Beginning of 20th century Beginning of 1970s of Today
oduction of

F4
ction with the 20th century
trical energy
century Beginning of 20th century Beginning of 1970s of Today
20th century

Industry 2.0
location detection, wireless connectivity and cameras—offer another big step towards closing the
feedback loop in personalized medicine [7]. There is no more personal data than on the-body or
in-the-body sensors. With so many connected devices generating various vital health related data,
Industry 1.0 integrating these data points to Electronic Health Records not only provide more accurate picture
f 20th century Beginning of 1970s of Today
of the patient but also helps to connect with the doctor. Mobile device being universally classic IoT
device, through IoT device and application of augmented intelligence helping humanity.
20th century

2
Samsung - https://www.samsung.com/global/business/networks/solutions/iot-solutions/
3
IoT Platform - https://www.slideshare.net/Cisco/enabling-the-internet-of-everything-ciscos-iot-architecture?from_
action=save
4
Gartner Identifies Augmented Analytics as a Top Technology Trend for 2019 - https://solutionsreview.com/business-
intelligence/gartner-identifies-augmented-analytics-as-a-top-technology-trend-for-2019/
5
Augmented Intelligence - https://whatis.techtarget.com/definition/augmented-intelligence?track=NL-1823&ad=9220
91&src=922091&asrc=EM_NLN_103914963&utm_medium=EM&utm_source=NLN&utm_campaign=20181122_
Word%20of%20the%20Day:%20augmented%20intelligence
6
Augmented Analytics: The Next Disruption in Analytics and BI - https://www.gartner.com/webinar/3846165
7
Gartner Identifies the Top 10 Strategic Technology Trends for 2019 - https://www.gartner.com/en/newsroom/press-
releases/2018-10-15-gartner-identifies-the-top-10-strategic-technology-trends-for-2019
50 Billion
50
“Smart Objects”
Introduction 3
40
Adoption rate of
digital infrastructure:
Industry 4.0
F3
5 × faster than
30 electricity and telephony

We are in the midst20of a digital transformation powered and fueled by Data and Analytics. The Industry
3.0 has introduced Computer and Information Technology. However, the Industry 4.0 is due to availability
of sensors, connecting
10
via smart and high-speed networking, and application of data science and machine
learning to automate business processes
6.8
with intelligence.
7.2
Industry 4.08 is7.6here to stay [8].
World Propulation

The Internet of 0Things and Smart Connected Objects are the main catalysts for the Industry 4.0.9
Machine Learning and Data Science 2010 are the backbone
2015 for deriving2020insights from the Industry 4.0
connected objects (please see Figure 2 and Figure 3) [9].

4th Industrial revolution


on the basis of cyber-phy-
sical production systems
(CPPS), merging of real
and virtual worlds
First progrmmable logic
control system 1969 Industry 4.0
3rd Industrial revolution
through application of
electronic and IT to
further automate

Degree of complicity
production
First assembly line
1870 Industry 3.0
2nd Industrial revolution
through introduction of

F4
mass production with the
help of electrical energy
First mechanical
weaving loom
1784 Industry 2.0
1st Industrial revolution
through introduction of
mechanical production
facilities with the help of
water and steam power

Industry 1.0

End of 18th century Beginning of 20th century Beginning of 1970s of Today


20th century

Figure 2: Industry 4.0

Industry 2.0 Industry 3.0 Industry 4.0


Industry 1.o Mass production and Introdcution of Sensors, Data Intense
Usage of Electricity Infromation architecures, Machine
Mechnical Production
Technology and Learning and Artificial
automation Intelligence

Figure 3: Industry 4.0 Changes


Figure 3: Industry 4.0 Changes
8
Industry 4.0 - https://www.forbes.com/sites/bernardmarr/2018/09/02/what-is-industry-4-0-heres-a-super-easy-
explanation-for-anyone/#4b13dbe39788
9
Deloitte Industry 4.0 - https://www2.deloitte.com/content/dam/Deloitte/ch/Documents/manufacturing/ch-en-

manufacturing-industry-4-0-24102014.pdf
4 Building Enterprise IoT Applications

The New Technology Stack


The Smart connected products have a new technology stack10 that integrates hardware, software, services,
analytics, and recommendations (please see Figure 4) [10].
Product Hardware: The Product Hardware comprises of Embedded Sensors, Actuators, Processors,
Intelligent Microcontrollers, Micro-Electro-Mechanical-Systems (MEMS), and Embedded Systems.
Product Software: Product Software consists of Edge-based systems that process the sensor data close to the
source. This area also consists of Filters, Transformers, Data Aggregators, and Machine learning modules.
Connectivity: Connectivity relays the data from the Edge level to the Cloud. The connectivity protocols
include: Wi-Fi, Cellular, Bluetooth, Zigbee, HTTPS, REST, CoAP, MQTT and other protocols.
Product Database: allows aggregation, normalization, and the management of real-time & historical data.
Rules/Analytics Engine: Rules and Analytics engines enable the application of machine learning and
artificial intelligence algorithms to predict the future events.
Smart Product Recommendation Systems: The recommendation systems connect the Users with
actionable insights. The item based, and collaborative filtering recommendations are applied as part of
the system.
Security Systems: Manage authentication, authorization of resources. The Role Based Access (RBAC)
enables guarding of the information.

PRODUCT CLOUD
Smart Product Applications
Software applications running on remote servers manage the
monitoring, control, optimization, and autonomous operation
of product functions
Rules/Anlysics Engine
The rules, business logic, and big data analytical capabilities
that populate the algorithms involved in product operation
and reveal new product insights
Application Platform
An application development and execution environment External
enabling the rapid creation of smart, connected business Information Integration
Identity and applications using data access, visualization, and Source with
security run-time tools A gateway for Business
Tools that information Systems
manage user Product Data Database
from eternal

F6
A big-data database system that enable aggregation, Tools that
authentication sources-such from smart,
and system normalization, and management of real-time and historical
product data as weather, connected
access, as traffic, products with
well as commodity core
product, and energy enterprise
connectivity, prices social business
and product CONNECTIVITY media, and systems
cloud layers geomapping such as
Network Communication
The protocols that enable communications between the that informs ERP, CRM,
product and the cloud product and PLM
capabilities

PRODUCT
Product Software
An embedded operating system, onboard software applications,
an enhanced user interface, and product control components
Product Hardware
Embedded sensors, processors, and a connectivity port/
antenna that supplement traditional mechanical and
electrical components

Figure 4: Product Stack [10]

10

are-transforming-competition
F6 after Icon1
How Smart, Connected Products Are transforming Competition - https://hbr.org/2014/11/how-smart-connected-products-

Customer business priorities Drive platform dimensions Which deliver

Data monetization New operating model Product or stream aligned


eople

Predictive maintenance User experience Persona based experience


Introduction 5
PRODUCT CLOUD
Smart Product Applications

External Systems: Integrating with external systems, such as social media data, twitter data, and weather
Software applications running on remote servers manage the
monitoring, control, optimization, and autonomous operation
of product functions
Rules/Anlysics Engine

data enables context aware analytics and geolocation driven insights.


The rules, business logic, and big data analytical capabilities
that populate the algorithms involved in product operation
and reveal new product insights
Application Platform
An application development and execution environment External
enabling the rapid creation of smart, connected business

Business Databases: Integrating IoT Sensor data with traditional enterprise relational databases (ERP,
Information Integration
Identity and applications using data access, visualization, and Source with
security run-time tools A gateway for Business
Tools that information Systems
manage user Product Data Database
from eternal

F6
A big-data database system that enable aggregation, Tools that

CRM) provides 360-degree view of the customers and enables the formation of blue ocean strategies.
authentication sources-such from smart,
and system normalization, and management of real-time and historical
product data as weather, connected
access, as traffic, products with
well as commodity core
product, and energy enterprise
connectivity, prices social business
and product CONNECTIVITY media, and systems
cloud layers geomapping such as
Network Communication
The protocols that enable communications between the that informs ERP, CRM,
product and the cloud product and PLM
capabilities

The Man and the Machine—Robots may guide collaboration with Humans11
PRODUCT
Product Software
An embedded operating system, onboard software applications,
an enhanced user interface, and product control components
Product Hardware
Embedded sensors, processors, and a connectivity port/
antenna that supplement traditional mechanical and
electrical components

The sensor makes it possible to track the movements and actions of workers inside a factory
or after
F6 warehouse [11].
Icon1

Existing sensors, including cameras and depth sensors, are often affected by lighting and
offer only a rough idea of a person’s position in three-dimensional space. Emerging safety
systems allow people to work in closer proximity to powerful robots, but they shut these
Customer business priorities Drive platform dimensions Which deliver

Data monetization New operating model Product or stream aligned


People

Predictive maintenance User experience Persona based experience

systems down completely if a person moves too close. By tracking a person’s motions very
Closed loop

Digital innovation Complex even processing Predictive maintenance

Real-time recommendation Edge or closer to customer Contextual recommendation

precisely, the new system could make it possible for a powerful robot to work in concert
Competitive advantage Continuous intelligence Augmented intelligence

Contextualize insights Multi-speed architecture Adaptive intelligence


Edge

Proactive operations Over-the air F8 PaaS, cloud, intelligence

with a person, perhaps handing something to a human coworker [12]. “You could get rid of
10101

Prognosis support Geo context aware Location intelligence

Improved reputation Metrics that matter Business value focused


Data

the cages around big robots”, Mindell says.12


Longevity of devices (ROA/ROI) Insights Advanced analytic and cognitive

Flow Information
Smart Connected Objects enable Flow of Information for the greater good:

The Five Forces that shape Industry Competition and Smart Connected
Objects
Smart, connected products will have transformative effect on Industry structure. The Five Forces that
shape competition13 provide a framework to understand the influence of Smart connected objects on the
competition (please see Figure 5).
Bargaining Power of Buyer: Traditional Segmentation of the market is based on market research, voice
customer details, and unmet needs & value perception. The Smart Connected Objects make the bargaining
power of the buyer more exclusive and driven by digital and traditional strategies. For instance, mobile
recommendations to the shopping loyalists are derived from historical shopping behaviors, Market basket
Just in Time buying behavior, Location awareness, weather cognitive and population sentiment or mood.
Threat of new entrants: New entrants in a smart, connected world face significant new obstacles, starting
with the high fixed costs of more-complex product design, embedded technology, and multiple layers of
new IT infrastructure.14
It is prohibitively expensive to manufacture the products with limited or new resources. Without adequate
resources, it’s very difficult to establish the business.
Though the demand for the Cow Necklace is huge, the new entrants, a Hanumayamma Innovations and
Technologies Inc.,15 a Delaware based company, must face huge challenges in setting up the production
and running the sale and business operations.

11
Intelligent Machines - https://www.technologyreview.com/s/608863/a-radar-for-industrial-robots-may-guide-
collaboration-with-humans/
12
Humantics - https://www.technologyreview.com/s/608863/a-radar-for-industrial-robots-may-guide-collaboration-with-
humans/
13
The Five Forces that Shape Competition - https://hbr.org/2008/01/the-five-competitive-forces-that-shape-strategy
14
https://hbr.org/2014/11/how-smart-connected-products-are-transforming-competition
15
Hanumayamma Innovations and Technologies, Inc – http://www.hanuinnotech.com
Smart, connected products will have transformative effect on Industry structure. The

Five Forces that shape competition13 provide a framework to understand the influence of

Smart connected objects on the competition (please see Figure Porter Five Forces).
6 Building Enterprise IoT Applications

Figure 5: Porter Five Forces [14]


Figure 5: Porter Five Forces [14]
Threat of Substitutes: Smart, connected products can offer superior performance, customization, and customer
value relative to traditional substitute products, reducing substitution threats and improving industry growth
and profitability. Data provides competitive advantages and creates new monetization models.
Bargaining Power of Suppliers: Unlike traditional Market forces model, the Suppliers in the Smart Connected
ƒ”‰ƒ‹‹‰‘™‡”‘ˆ—›‡”:
Objects Traditional
are connected by the incentives that theSegmentation
data provides.ofFor
theproduct
marketmanufacturers
is based on market
the Smart Connected
Object is a way to get the data to develop exclusive, augmentative, network, and actionable insights to
research, voice customer details, and unmet needs & value perception. The Smart Connected
monetize the data. For suppliers, the data provide a holistic improvement of product design. For instance,
small Objects
diagnostic digital
make equipment
the bargaining sensor
power producers
of the
16
buyer morehave incorporated
exclusive freebysharing
and driven digital of
andtheir digital IoT
sensors to Farmers for capturing data from the various geographical locations and for refining and fine-tuning
the analytics. For Farmers, the sensors are a new way of approaching agriculture, with more focus towards
addressing the issues that are not addressable without adequate data.
13The
Digital Five Forces that Shape Competition - https://hbr.org/2008/01/the-five-competitive-
Twin
forces-that-shape-strategy
A digital twin is a virtual model of a process, product or service. This pairing of the virtual and
physical worlds allows analysis of data and monitoring of systems to head off problems before they
even occur, prevent downtime, develop new opportunities and even plan for the future by using
simulations. The concept of Digital Twin17 has existed since 2002. However, the Internet of Things
(IoT) has made it possible to implement Digital Twin [16].
How does a digital twin work?
Digital Twin acts as a bridge between a Physical system and the virtual world.
First, smart components that use sensors to gather data about real-time status, working condition,
or a position are integrated with a physical system. The components are connected to a cloud-based
system that receives and processes all the data that the sensors monitor. This input is analyzed against
business and other contextual data.
Lessons are learned, and opportunities are uncovered within the virtual environment that can be
applied to the physical world—ultimately, to transform your business.
IoT Sensors, Cloud Connected Data Analytics Platforms, and real-time analytics enable the “Digital
Twins”.
16
Please see Dairy IoT Sensor Manufacturing Company – www.hanuinnotech.com
17
Digital Twin - https://www.forbes.com/sites/bernardmarr/2017/03/06/what-is-digital-twin-technology-and-why-is-it-so-
important/#4a3dfca82e2a
and product CONNECTIVITY media, and systems
cloud layers geomapping such as
Network Communication
The protocols that enable communications between the that informs ERP, CRM,
product and the cloud product and PLM
capabilities

PRODUCT
Product Software Introduction 7
An embedded operating system, onboard software applications,
an enhanced user interface, and product control components
Product Hardware
Enterprise IoT Platforms
Embedded sensors, processors, and a connectivity port/
antenna that supplement traditional mechanical and
The IoT plays a key role in enterprise electrical components
digital transformation. For instance, integration mobile and sensor
data into Electronic Health Records (EHR) or integration of Wearables, Mobile Data, and Electronic Data
Interchange (EDI) processing for better insurance processing. With the right level of integration, IoT acts
as a crucial bridge between the physical assets, legacy systems, business processes, newer competitive
models and the IT infrastructure.
F6 after Icon1
IoT enables enterprises to create a better connected physical world18 by enabling (a) flexible deployment
of architectures, (b) multiple connections, (c) Intelligent management, (d) data security, and (e) an Open
Ecosystem [16]. To successfully monetize the capabilities, for any sizeable company, a state-of-the-art
data and analytics platform is necessary.19 The Enterprise grade of the IoT platforms is weighed on Data
Platform and requires following Key Performance Indicator (please see Figure 6) in order to fulfill customer
and business needs. What this entails is the development of IoT data analytics platform that include: Three
major value drivers to deliver value for customers and businesses [17].

Customer business priorities Drive platform dimensions Which deliver

Data monetization New operating model Product or stream aligned


People

Predictive maintenance User experience Persona based experience


Closed loop

Digital innovation Complex even processing Predictive maintenance

Real-time recommendation Edge or closer to customer Contextual recommendation

Competitive advantage Continuous intelligence Augmented intelligence

Contextualize insights Multi-speed architecture Adaptive intelligence


Edge

Proactive operations 10101 Over-the air PaaS, cloud, intelligence


F8
Prognosis support Geo context aware Location intelligence

Improved reputation Metrics that matter Business value focused


Data

Longevity of devices (ROA/ROI) Insights Advanced analytic and cognitive

Figure 6: KPIs

1. Customer business priorities: includes integration of IoT data sources with enterprise data assets
to deliver digital innovation and predictive maintenance to provide contextual intelligence of the
devices and to provide adaptive prognosis to transpose from reactive to proactive operations for
device operational longevity and data monetization through service/blue-ocean models.
2. Platform dimensions: include data insights and metrics that have positive impact through the
implementation of adaptive edge processing with closed loop event handling and customer excellence.
3. Delivers: advanced analytics and cognitive intelligence that deliver predictive maintenance and
proactive exclusive recommendations.
There are many public Cloud platforms that offer enterprise IoT platforms. Here is the current trend
of those platforms:20
1. Data is the biggest driver of the IoT Platform
2. IoT Solutions that need integration of several sensors are complex.

18
https://e.huawei.com/us/solutions/technical/iot
19
Building a great data analytics platform - https://www.mckinsey.com/industries/electric-power-and-natural-gas/our-
insights/building-a-great-data-platform
20
Current IoT Platforms - https://www.forbes.com/sites/janakirammsv/2018/09/10/the-current-state-of-public-cloud-
enterprise-iot-platforms/#12f6779256b2
8 Building Enterprise IoT Applications

3. IoT sensor integration requires steep data processing, connectivity, cloud and analytics knowledge.
Given the complexity, many CIOs and companies are planning to Use Cloud platforms [18].
4. Contextual real-time actionable insights require Complex Event Processing (CEP) closer to the Data
Source. Edge Processing bridging the gap between heavy data intense platforms and real-time insights.
5. Lack of standards is hurting the IoT.
6. Security is playing an important role in choosing an enterprise platform.

Human Touch—artificial intelligence infused Mobile Companion


In Britain and the United States, roughly one in three people older than 65 live alone, and in the United
States, half of those older than 85 live alone. Studies in both countries show that the prevalence of
loneliness among people older than 60 ranges from 10 percent to 46 percent. Elderly people who are
socially isolated and lonely may be at greater risk of early death. Loneliness increases the likelihood
of mortality by 26 percent.21 Loneliness is comparable to other mortality risks factors such as obesity,
substance abuse, and access to healthcare.22 Senior Loneliness is a public health issue. Importantly,
Senior Loneliness is one of the risk factors for suicide. The rate of suicide23 for those over 65 is almost
15 of every 100,000 suicides [20,21].
Mobile technologies with artificial intelligence, importantly, can detect activity and engagement
levels of senior citizens. Interweaving such activity levels with nostalgic and location or time specific,
historical, valuable data leads to phycological and neural simulation. The combined effects of these
two aspects will deter loneliness and facilitate positive engagement ques; The overall effect is a better
outcome to the societies and carrying for senior citizens.
The Sharing History through Active Reminiscence and Photo-imagery (SHARP) Program, run by
the Oregon Health and Science University (OHSU), brings together small groups of older African
Americans for mile-long GPS-guided walks. Historic photos of local interest, like the one above,
appear on the group’s digital device at selected locations. At each of these Memory Markers, the
group pauses to discuss the photograph and flex their memories.

The CRISP-PM Process


The Cross-Industry Standard Process for Data Mining (CRISP-DM) is the model [22] (please see
Figure 7) that is designed as a general model and can be applied to a wide variety of industries and business
problems. The following diagram provides the several techniques in CRISP-DM:24

Business Understanding
In my experience, this is one of the most important phases in an ML process. The success of initiative and
expectations to stakeholders and project outcomes are derived from clear understanding of the business
requirements. This phase also helps to uncover current as-is process and the proposed machine learning
objectives.

21
One is the Loneliest Number: Combating Senior Isolation - https://stonegatesl.com/one-is-the-loneliest-number-
combating-senior-isolation/
22
Senior Loneliness and Public Health Response - https://www.publichealthpost.org/research/senior-loneliness-public-
health-response/
23
Elderly Suicide Rate - https://www.sageminder.com/SeniorHealth/MentalHealth/Suicide.aspx
24
Introduction to IBM SPSS Modeler and Data Mining, ftp://ftp.software.ibm.com/software/analytics/spss/support/
Modeler/Documentation/14/UserManual/CRISP-DM.pdf
Introduction 9

Phases and Tasks


Business Data Data
Modelling Evaluation Deployment
understanding understanding preparation

Determine
business objective
Background
Collect initial data
Initial data collection
report
Data set
Data et description
Select modelling
Technique
Modelling technique
Evaluate results
Assessment of data
mining results w.r.t.
Plan deployment
Deployment plan F10
Business objective Select data Modelling business success Plan monitoring
Describe data Rationale for and maintenance
Business success Data description assumption criteria
Criteria inclusion exclusion Approved model Monitoring and
report Generate test maintenance plan
Assess situation Clean data Review process
Explore data design
Inventory of resource Data cleaning Review of process Produce final
Data exploration Test design
Requirements, report report
report Determine next
assumption, and Build model Final report
Construct data steps
constraints Verify data quality Parameter settings Final presentation
Derived attributes List of possible
Risk and contingencies Data quality report models
Generated records actions Review project
Terminology Model description
Decision Experience
Costs and benefits Integrate data
Assess model documentation
Merged data
Determine Model assessment
data mining goals Format data Revised parameter
Data mining goals Reformatted data settings
Data mining success
criteria
Produce project plan
Project plan
Initial assessment of
tools and techniques

Figure 7: CRISP-DM

Some of the steps that will help in this phase include:


• Establish Good understanding with Data and Machine Learning champion. F15
• Understand the business process—especially, accumulate as much tacit knowledge as possible from
experts and champions involved.
• Make sure the Machine Learning process and outcome are directly connected to strategic drivers and
the future roadmap of the organization. IoT device cloud

• Assess the ML process is for costWI-FI or


synergies
cellular
vs. monetization & long-term competitive advantage.
A fleet of devices
connectivity Apps and third
• Finally, understand the objectives are driven from Cost vs. Revenue Business lines. party services
Thinks
Gateway Devices

Data Understanding
Third-
party cloud
Network Cloud
TheSecurity
preamble or pre-requisite
Managemant API libraries,
APIs, SDK for the Gateway
phaseDevices
is the business understanding phase. During the data
understanding phase, involve data scientists and data engineers, as they will be creating data models and
ml algorithms. Generally, this phase accounts for 30 to 40 percent of the project time.
LifeNoCycle - Industry Standards:
internet connectivity
25
Securityplease see below
Management the
API libraries,
APIs, SDK
table
Network
for
Batch & stream Storage
ML Life
infrastructure
Service
cycle standards [23]:
analytical F16
Data Preparation Phase Security Managemant API libraries,
Internet connectivity APIs, SDK

Data preparation phase involves working with several origination units in order to collect the required
data for developing Machine Learning algorithms. During this phase, we need to work with biasness and
product groups in order to develop data processing and transformation rules. These rules will subsequently
Cloud
be deployed at the Edge and at the Cloud level.
Fog nodes a t
d da lysis
ir t u alize ive ana
Lar V d ic t in g
ge V r e ar n
ric/p e le
olum
e of histo machin
data erns
3 patt
and tes
Preparing and Architecting for Machine Learning - https://www.gartner.com/binaries/content/assets/events/keywords/
25
4

le
Ru upda
catalyst/catus8/preparing_and_architecting_for_machine_learning.pdf
Wide Variety of things 1
2
Rules,
patterns,
actions
4
F17
ty)
e l oci Data reduction,
e (V control response,
l-tim
& rea data virtualization/standardization
s
uou
ntin
Co
Data in motion Data in rest
10 Building Enterprise IoT Applications

Table 1: Life Cycle – Industry Standards


Task (Proportion of Effort) Subtasks Business Data Scientist IT/Operations
1. Problem Understanding a) Determine Objective × ×
(5% to 10%)
b) Define Success Criteria × ×
c) Assess Constraints × × ×
2. Data Understanding a) Assess Data Situation × × ×
(10% to 25%) b) Obtain Data (Access) × ×
c) Explore Data × × ×
3. Data Preparation a) Filter Data × ×
(20% to 40%) b) Clean Data × ×
c) Feature Engineering × ×
4. Modeling a) Select Model Approach ×
(20% to 30%) b) Build Models ×
5. Evaluation of Results a) Select Model ×
(5% to 10%) b) Validate Model ×
c) Explain Model × ×
6. Deployment a) Deploy Model × ×
(5% to 15%) b) Monitor and Maintain × × ×
c) Terminate × × ×

Major work areas under this phase include:


• Select Data
○ Based on business objectives, identify key data attributes—these attributes, later, will be input to
ML models.
○ Not all attributes are intrinsically available within the data—need to develop synthetic variables
that explains the models’ outcome.
• Clean Data
○ Data is gold and no data are bad data; all we need to develop is a process to cleanse the data to be
utilized under modeling and understanding purposes.
• Construct Data
○ Based on the business objectives, construct the data to fully describe the ML charter.
• Integrate Data
○ Integrate data involves working with several business units within the organization or working
with 3rd party providers to collect necessary data.
• Format Data
○ Format data to be pluggable usable for model development.

Data Modelling
This phase is also known as machine learning phase. In this phase, the actual mission learning algorithm
is built, trained, validated and tested in order to meet the biasness objectives. During this phase, both data
scientists and business Subject Matter Experts (SMEs) are closely involved and worked with Users. The
successful development of algorithms is more of a collaborative prosses than siloed approaches.
This phase comprises of following major tasks:
• Select Modeling Technique
○ Supervised:
▪ Classification
Introduction 11

– Decision Trees, Naïve Bayesians, Support Vector Machines, K-Nearest Neighbor


▪ Regression
– Linear Regression, Non-linear Regression
○ Unsupervised
▪ Clustering
– Hierarchical (Agglomerative, divisive)

Difference between Supervised and unsupervised algorithms:


Supervised Learning Unsupervised Learning
Input Data Use Known and Labeled Data Uses unknown data
Computational Complexity Very computational intense Less computational
Real Time Use off-line analysis Use Real-time analysis
Number of Classes Known Unknown
Accuracy of results Accurate and reliable Reliable

• Generate Test Design


○ Develop algorithm (on paper or with small datasets)
• Build Model
○ Model description
○ Codification of Model
• Assess Model
○ Train Model
○ Validate Model
○ And Test Model

Best to Divide data into Training and Validation:


Assuming you have enough data to do proper held-out test data (rather than cross-validation), the
following is an instructive way to get a handle on variances:
• Split your data into training and testing (80/20 is indeed a good starting point).
• Split the training data into training and validation (again, 80/20 is a fair split).
• Subsample random selections of your training data, train the classifier with this, and record the
performance on the validation set.
• Try a series of runs with different amounts of training data: Randomly sample 20% of it, say, 10
times and observe performance on the validation data, then do the same with 40%, 60%, 80%.
You should see both greater performance with more data, but also lower variance across the
different random samples.
• To get a handle on variance due to the size of test data, perform the same procedure in reverse.
Train on all of your training data, then randomly sample a percentage of your validation data a
number of times and observe performance. You should now find that the mean performance on
small samples of your validation data is roughly the same as the performance on all the validation
data, but the variance is much higher with smaller numbers of test samples.
12 Building Enterprise IoT Applications

Data Holdout
If a lot of data are available, simply take two independent samples and use one for training and one for
testing. The more training, the better the model. The more test data, the more accurate the error estimate.
Problem: Obtaining data is often expensive and time consuming. Example: Corpus annotated with word
senses, Dairy Sensor data, experimental data on sub-cat preferences.
Solution: Obtain a limited data set and use a holdout procedure. Most straightforward: Random split into
test and training set. Typically, between 1/3 and 1/10 held out for testing.

Data Stratification
Problem: The split into training and test set might be unrepresentative, e.g., a certain class is not represented
in the training set, thus, the model will not learn to classify it.
Solution: Use stratified holdout, i.e., sample in such a way that each class is represented in both sets.
Example: Data set with two classes A and B. Aim: Construct a 10% test set. Take a 10% sample of all
instances of class A plus a 10% sample of all instances of class B.
However, this procedure doesn’t work well on small data sets.

Deployment
The successful ML algorithms are deployed for business and user purposes. The deployment phase consists
of working with HPC, data engineers and IT groups.

Chapter Summary
• You should see the potential positive economic impact of IoT.
• The New Stack that is required to process IoT Data feeds.
• You should see how Industry 4.0 evolved.
• You would learn the importance of augmented analytics.
• You would see the role of analytics and mobile platform as a human companion.
• The Key Performance Indicators (KPIs) of Analytics platform.
• You should understand the phases in CRISP-DM.

References
1. James Manyika, Michael Chui, Jacques Bughin et al. Disruptive technologies: Advances that will transform life,
business, and the global economy. May 2013, https://www.mckinsey.com/~/media/McKinsey/Business%20Functions/
McKinsey%20Digital/Our%20Insights/Disruptive%20technologies/MGI_Disruptive_technologies_Full_report_
May2013.ashx , Access date: 09/18/2018
2. Samsung Software Development. IoT Solutions. 2017, https://www.samsung.com/global/business/networks/solutions/
iot-solutions/, Access date: 09/27/2018
3. Kip Compton and Vikas Butaney. Enabling the Internet of Everything’s, Cisco’s IoT Architecture, https://www.slideshare.
net/Cisco/enabling-the-internet-of-everything-ciscos-iot-architecture?from_action=save , 02/05/2015, Access date:
09/18/2018
4. Timothy King. Gartner Identifies Augmented Analytics as a Top Technology Trend for 2019. November 9, 2018, https://
solutionsreview.com/business-intelligence/gartner-identifies-augmented-analytics-as-a-top-technology-trend-for-2019/,
Access Date: 12/25/2018
5. Margaret Rouse. Augmented Intelligence. July 2017, https://whatis.techtarget.com/definition/augmented-
intelligence?track=NL-1823&ad=922091&src=922091&asrc=EM_NLN_103914963&utm_medium=EM&utm_
source=NLN&utm_campaign=20181122_Word%20of%20the%20Day:%20augmented%20intelligence
Introduction 13

6. Rita L. Sallam. June 2018. Augmented Analytics: The Next Disruption in Analytics and BI Register now for this free
60 minute Disruption and Innovation webinar, https://www.gartner.com/webinar/3846165, Access date: 12/20/2018
7. Jennifer Garfinkel. Gartner Identifies the Top 10 Strategic Technology Trends for 2019. October 15, 2018, https://
www.gartner.com/en/newsroom/press-releases/2018-10-15-gartner-identifies-the-top-10-strategic-technology-trends-
for-2019, Access Date: December 29, 2018
8. Bernard Marr. What is Industry 4.0? Here’s A Super Easy Explanation For Anyone. Sep 2, 2018, 11: 59 pm,
https://www.forbes.com/sites/bernardmarr/2018/09/02/what-is-industry-4-0-heres-a-super-easy-explanation-for-
anyone/#75023f039788
9. Dr. Ralf C. Schlaepfer, Markus Koch, Dr. Philipp Merkofer, October 2014. Industry 4.0 - Challenges and Solutions
for the digital transformation and use of exponential technologies, https://www2.deloitte.com/content/dam/Deloitte/
ch/Documents/manufacturing/ch-en-manufacturing-industry-4-0-24102014.pdf, Access Date: December 10, 2018
10. Michael E. PorterJames E. Heppelmann. How Smart, Connected Products Are Transforming Competition. NOVEMBER
2014 ISSUE, https://hbr.org/2014/11/how-smart-connected-products-are-transforming-competition
11. Will Knight. A Radar for Industrial Robots May Guide Collaboration with Humans. September 20, 2017, https://www.
technologyreview.com/s/608863/a-radar-for-industrial-robots-may-guide-collaboration-with-humans/
12. Will Knight. A Radar for Industrial Robots May Guide Collaboration with Humans The sensor makes it possible
to track the movements and actions of workers inside a factory or warehouse. September 20, 2017, https://www.
technologyreview.com/s/608863/a-radar-for-industrial-robots-may-guide-collaboration-with-humans/, Access Date:
September 18, 2018
13. Michael E. Porter. The Five Competitive Forces That Shape Strategy. THE JANUARY 2008 ISSUE, https://hbr.
org/2008/01/the-five-competitive-forces-that-shape-strategy
14. Bernard Marr, What Is Digital Twin Technology - And Why Is It So Important?, March 06, 2017, https://www.forbes.
com/sites/bernardmarr/2017/03/06/what-is-digital-twin-technology-and-why-is-it-so-important/#2db6e6432e2a
15. Sam Lucero. Enterprise IoT Leading IoT, Driving Industry Digital Transformation. March 2017, https://e.huawei.com/
us/solutions/technical/iot, Access date: 12/14/2018
16. Adrian Booth, Jeff Hart and Stuart Sim. Building a great data platform. August 2018, https://www.mckinsey.com/
industries/electric-power-and-natural-gas/our-insights/building-a-great-data-platform
17. Janakiram MSV. The Current State of Public Cloud Enterprise IoT Platforms. Sep 10, 2018, 10:17 pm, https://www.
forbes.com/sites/janakirammsv/2018/09/10/the-current-state-of-public-cloud-enterprise-iot-platforms/#6f28f4c056b2
18. Stonegate. One is the Loneliest Number: Combating Senior Isolation. https://stonegatesl.com/one-is-the-loneliest-
number-combating-senior-isolation/, Access date: 12/14/2018
19. Gilbert Benavidez. Senior Loneliness and the Public Health Response. September 13, 2017, https://www.
publichealthpost.org/research/senior-loneliness-public-health-response/
20. D. Bowes. Elderly Suicide Rate. May 15, 2015, https://www.sageminder.com/SeniorHealth/MentalHealth/Suicide.
aspx, Access Date: May 27, 2019
21. Pete Chapman, Julian Clinton, Randy Kerber et al. CRISP-DM 1.0. March 2000, ftp://ftp.software.ibm.com/software/
analytics/spss/support/Modeler/Documentation/14/UserManual/CRISP-DM.pdf , Access Date: 11/22/2018
22. Carlton E. Sapp. Preparing and Architecting for Machine Learning. 17 January 2017, https://www.gartner.com/binaries/
content/assets/events/keywords/catalyst/catus8/preparing_and_architecting_for_machine_learning.pdf, Access Date:
11/22/2018
Chapter 2
Foundation Architectures

This Chapter Covers: Phases and Tasks


• Business
IoT Foundations Architectures
Data Data
Modelling Deployment
Evaluation
•understanding understanding
Data Mining Reference preparation
architecture
• Intel IoT Architecture
Determine Collect initial data
business objective Initial data collection
• IoT Case Studyreport
Background
Data set
Data et description
Water Leak management
Select modelling
Technique
Modelling technique
Evaluate results
Assessment of data
mining results w.r.t.
Plan deployment
Deployment plan F10
Business Select data business success Plan monitoring
• IoTobjective
Platform Describe
Review:data Artik Rationale for Modelling
and maintenance
Business success Data description assumption criteria
inclusion exclusion Monitoring and
• Sensors for Safety
Criteria report – Angle of Attack (AoA) Generate test
Approved model
maintenance plan
• Data
Assess at Rest vs.
situation Data
Explore in MotionClean
data Data
data
Differences
cleaning
design Review process
Produce final
Inventory of resource Data exploration Test design Review of process
• CAP Theoremreport
Requirements, for IoT report report
assumption, and Build model Determine next Final report
• Edge and Cloud
constraints
Architecture
Verify data quality
Construct data
Parameter settings steps Final presentation
Derived attributes List of possible
Risk and contingencies Data quality report models
Generated records Review project
actions
Terminology Model description
Experience
Decision
Costs and benefits Integrate data
Assess model documentation
The focus of the chapter is to provide Mergedfoundation
data all architecture
Model assessment to process the IoT Data. IoT Data
Determine
exhibit 5Vs (Volume,
data mining goals Velocity, Variability,
Format Veracity,
data and Value)
Revised and
parameter to process such high-density data the
Reformatted settings
data insights
architectures
Data mining goals should scale to provide actionable to Users.
Data mining success
criteria

IoT Platform
Produce project plan
Project plan
Initial assessment of
IoT
toolsPlatform (see Figure 1) provides an end-to-end connectivity to bring it online and brings intelligence
and techniques
to “Things” [6].

F15

IoT device cloud


WI-FI or
A fleet of devices cellular
connectivity Apps and third
party services
Thinks
Gateway Devices
Figure 1: IoT Platform
Third-
party cloud
Network Cloud
Security Managemant API libraries, Gateway Devices
APIs, SDK

No internet connectivity
Security Management API libraries,
APIs, SDK
Network
infrastructure
Batch & stream Storage
analytical
Service
F16
Security Managemant API libraries,
Internet connectivity APIs, SDK
Background report Modelling technique mining results w.r.t.
Business objective Select data Modelling business success Plan monitoring
Describe data Rationale for and maintenance
Business success Data description assumption criteria
Criteria inclusion exclusion Approved model Monitoring and
report Generate test maintenance plan
Assess situation Clean data Review process
Explore data design
Inventory of resource Data cleaning Produce final
Review of process
Data exploration Test design
Requirements, report report
report Determine next
assumption, and Build model Final report
Construct data
constraints Verify data quality Parameter settings Final presentation 15
stepsFoundation Architectures
Derived attributes List of possible
Risk and contingencies Data quality report models
Generated records actions Review project
Terminology Model description
Decision Experience
Costs and benefits Integrate data
At the source level, you have several types Assess model documentation
Merged data of devices that generate data at several different frequencies
Determine Model assessment
anddata
velocities. The Connectivity layerFormat
mining goals
is the one that collects
data data from the Sensors and uploads to either
Revised parameter
edge
Datalevel
mining or to the Cloud level. On Reformatted
goals the Cloud, datathe IoTsettings
data is processed through Analytics frameworks
Data
and mining success
Machine learning engines to derive useful insights. Finally, the end insights are stored in data base
criteria
or looped back to the Users.
Produce project plan
Here
Project planis the end to end platform view from Intel (see Figure 2): The goal of the System Architecture
Specification
Initial assessmentisofvery straight—to connect any device any type to the Cloud. The specification is also a
tools and techniques
guideline for third party developers, Original Equipment Manufacturers (OEM), and other developer
community to develop products for IoT [7].
The tenets for the application developers to deploy IoT solutions are as follows:
• Services to Monetize the IoT Infrastructure.
• Seamless data ingestion.
• Intelligence deployment to any-form-factor devices by running analytics on the Cloud or on to the
F15
device.
In the grand scheme of IoT, the philosophy is very straightforward: Deployment of distributed data
collection, contextual intelligence, centralized data platform,IoT
and holistic
device cloudintegration of devices to the
Enterprise Data architecture systems.WI-FI or
A fleet of devices cellular
connectivity Apps and third
party services
Thinks
Gateway Devices

Third-
party cloud
Network Cloud
Security Managemant API libraries, Gateway Devices
APIs, SDK

No internet connectivity
Security Management API libraries,
APIs, SDK
Network
infrastructure
Batch & stream Storage
analytical
Service
F16
Security Managemant API libraries,
Internet connectivity APIs, SDK

Figure 2: Intel IoT Platform

Cloud
IoT Platform Types
Fog nodes ta
lize e aData
na d da lysis
IoT Platform Types can be classified under End-to-End, Connectivity, VCloud,
irtua ictand
iv g
Platforms.
Lar red learnin
ge V
ric/p e
olum
e of histo machin
s
ta da 3 ttern
End to End Platform a n d pa
s
Rule update
4

End to EndWideplatform, generally,


Variety of things is1 used by businesses or service
integrated service offering or product architecture. For 2 instance,
Rules, providers as a completely vertically
4
Samsung, offers IoT platform to integrate
patterns,
actions
F17
all data sources. i ty)
c Data reduction,
End to End platform offers elo
i m e (V all the parts of architecture: (a)response,
control Hardware or Sensor Product, (b) Gateway
l- t
or Edge Collector,&(c) rea Mobile App as an Edge device, (d) Middleware component, (e) Message Bus or
data virtualization/standardization
s
Message Queue uouinjection, (f) Compute or Analytics platform, and (g) UI or Insights recommendation.
ntin
Co
Data in motion Data in rest

Sensors Edge analysis Cloud


16 Building Enterprise IoT Applications

Case Study: IoT for Water Leak management


The cities of Doha, São Paulo, and Beijing all use sensors on pipes, pumps, and other water
infrastructure to monitor conditions and manage water loss, identify and repair leaks or change
pressure as necessary. On average, these cities have reduced leaks by 40 to 50 percent. Smart meters
at the user end allow real-time monitoring of demand and leak detection by residents and property
managers, reducing costs. Dubuque and Indianapolis in the United States, as well as Malta, New
Delhi, and Barrie (Ontario), have seen, on average, a 5 to 10 percent reduction in water usage via the
This
use assumes that 80
of smart water to 100 percent of cities in advanced economies and 25 to 50 percent of
meters.
The total potential economic impact from traffic applications, smart waste handling, and smart water
cities in the
systems developing
in urban world
areas could could
total $100have access
billion to billion
to $300 this technology
per year byby thatThis
2025. time.
assumes that 80
to 100 percent of cities in advanced economies and 25 to 50 percent of cities in the developing world
could have access to this technology by that time.

The Reference architecture for End to End IoT is as follows:


The reference architecture for IoT is very much like that of the architecture of data processing systems
except that the IoT architectures consume the data before the platform can massage or compact the data.
On the left side (see Figure 3), the data is generated by Sensors, Human Activity, Motors or Sensors/
Actuators.
The Reference The sensors could for
architecture be of
Endactive, passive
to End IoT or hybrid
is as of the data generators. The data from the
follows:
generators are collected by the main processing units Data Controllers (microcontroller units). The Data
Controllers could be in-memory memories or Sensor Units. The Sensor Units comprise silicon circuit board
with RTOS (real-time operating system) that collects data either by polling a particular sensor hardware
address or by triggered by interrupt routine. The Data is then processed at the edge level or Sensor Unit
The reference architecture for IoT is very much like that of the architecture of data processing
level for immediate action or Closed loop behavior. This is achieved by combing events from several data
sources, Complex Event Processing. The processed data is stored or relayed to traditional cloud platforms.
systems
Theexcept thatarchitecture
End to End the IoT architectures consume
contains Sensors or Datathe data before
generators thethe
that feed platform
data intocan massage
Edge or
Data Nodes
processors. The purpose of the Edge node is to evaluate rules on incoming high velocity multi-sensor data.
compact
The data the data. against any anomalies for alerting the User. In addition, the context-based analytics
is validated
can be run on the in-coming data in order to derive contextual intelligence. Once data is analyzed, it can
be compressed in order to reduce the data footprint and data transmissions costs.

Figure 3: IoT End to End View

Figure 10: IoT End to End View

On the left side (see Figure 10), the data is generated by Sensors, Human Activity, Motors or

Sensors/Actuators. The sensors could be of active, passive or hybrid of the data generators.

The data from the generators are collected by the main processing units Data Controllers
Third-
party cloud
Network Cloud
Security Managemant API libraries, Gateway Devices
APIs, SDK

No internet connectivity
Security Management API libraries,
APIs, SDK
Network
infrastructure
Batch & stream Storage
analytical
Foundation Architectures
Service
F16
17

Security Managemant API libraries,


As shown inconnectivity
Internet the above diagram (see Figure 4): APIs, SDK

Cloud
Fog nodes ta
d da nalysis
alize a
Lar Virtu edictive ning
ge V r ar
ric/p e le
olum
e of histo machin
data erns
3 patt
le and tes
Ru upda
4

Wide Variety of things 1


2
Rules,
patterns,
actions
4
F17
)
city Data reduction,
elo
ime (V control response,
e al-t data virtualization/standardization
&r
ous
ntinu
Co
Data in motion Data in rest

Sensors Edge analysis Cloud

Figure 4: Fog Nodes

1 Sensors generate data; The data is collected at source and, using network protocols (Wi-Fi
or Bluetooth), is transmitted to the Edge Nodes. The characteristics of data are:
• Large volume of data
• Wide variety
• Continuous and real-time
Typically, the data is in motion.

2 The process at the Edge Node includes:


• Rules Analysis
• Pattern Evaluation
• Filter of the data

3 Before relaying the data to backend or traditional Cloud, the data is formatted in order to
preserve or optimize the network costs. This includes:
• Data Reduction
• Control Response
• Data Virtualization/Standardization

4 Once the data is relayed to the Cloud, adaptive machine learning algorithms compute updated
models with the data generated, the most recent. Any machine learning coefficients or update
to the model classifier is downloaded OTA.
• Predictive Machine Learning Analytics
• Rules and Pattern updates
18‘‡ –‹˜‹–›Žƒ–ˆ‘”
Building Enterprise IoT Applications

Connectivity IoT platforms enable direct integration of Sensors via edge device or
The end to end platform provides several benefits:
•gateway
Over thetoairthe
Firmware
Cloud. (OTA) Upgradeupload the collected data, periodically, to the on-site
The Sensors
• Device Management
•collector device. The Collector on the availability of network connection, uploads to the Cloud.
Cloud Connection
•Connectivity
Cellular or Connectivity
Platform enforces tighter API or Data integration between the Sensor and
• Analytics and
•Gateway devices.
User Interface

Connectivity Platform
The connectivity platform, as the name implies, is ideal for the use cases that solve or address
Connectivity IoT platforms enable direct integration of Sensors via edge device or gateway to the Cloud.
Thenetwork
Sensorsconvexity
upload theissues.
collectedThe
data, periodically,Platform
Connectivity to the on-site collector
potentially device.
allows IoTThe Collector
devices on the
to run
availability of network connection, uploads to the Cloud. Connectivity Platform enforces tighter API or
Data
forintegration between
years on small the Sensor
batteries, and Gateway
occasionally devices.
sending out small packets of data, waiting for a short
The connectivity platform, as the name implies, is ideal for the Study Cases that solve or address
network
time forconvexity
responseissues. The Connectivity
messages, Platform
and then closing potentiallyuntil
the connection allows IoTdata
more devices
needstotorun
be for
sent.years
on small batteries, occasionally sending out small packets of data, waiting for a short time for response
messages, and then closing the connection until more data needs to be sent.

Figure 5: Integrated view

Figure 12: Integrated view


InIn
thetheabove
abovediagram
diagram(see
(seeFigure
Figure12):
5):
1. The sensors communicate to the gateway either Near Field Communication, MQTT over UDP, or
1. The
LoRa. 1 sensors communicate to the gateway either Near Field Communication, MQTT
2. The Gateway, generally, a 26processing system that assembles the data from the Sensors and perform
basic over
logic UDP, or LoRa .
operations.
3. Using Cellular or Wi-Fi, the gateway relays the data to the Cloud.
4. The data is processes at the Cloud and actionable recommendations sent to the User.
26 LoRa - https://www.loraserver.io/overview/
5. Mobile recommendations are delivered.

1
LoRa - https://www.loraserver.io/overview/
Another random document with
no related content on Scribd:
contra Cristianos prelati legibus suis positiuis
instituunt et prosequntur.

Capm. vi. Ante sue mortis tempus dedit atque reliquit


330 Pacem discipulis Cristus habere suis;
Et quia tunc solum cupiebant nil nisi Cristum,
In Cristi pace cuncta tulere pie.
Set quia nunc mundum cupiunt tantummodo
vanum,
Que sibi sunt mundus bella ministrat eis;
Et quia belligeram ducit clerus modo vitam,
Auctor eos pacis non iuuat ipse deus.
Dixerat ad Petrum Cristus, ‘Quicumque virorum
Percutit in gladio, fine peribit eo’:
Nec poterit falli fateor sentencia Cristi,
340 Quamuis sit cleri mortifer ensis ibi.
Percuciunt ense; si quisque repercutit, inde
Dampnat eum libri lex positiua noui.
Predicat en Petrus, set pugnat papa modernus,
Hic animas, alius querit auarus opes:
Hic fuit occisus pro iure dei, tamen alter
Occidit, neque ius sic habet ipse deus:
Simplicitate fidem non viribus excitat vnus,
Alter et in pompis prouocat arma magis.
Vult Deus vt non sit temeraria nostra querela,
350 Set mala que patimur vindicet illa deus:
Hostiles acies inimicaque vinximus ora,368
Cum vindex nostras nesciat ira vias.
Mollibus in rebus non se probat accio Cristi,
Tempore set duro se probat alta fides:
Militat in Cristo pia que pacientia tristi
Materiam vere tempore laudis habet.
Cristus erat paciens, probra dum tulit omnia, set
nos
De facto minimo commouet ira modo.
Omne vigebat opus, dum cleri nobiliores
360 Cuncta sub arbitrio deseruere dei;
Ipsa vetus pietas plantare fidem dabat, et nunc
Extirpat vindex ira superba patrum.
‘Non gladius saluat, et qui sperabit in arcu
Non saluatur eo,’ testificante Dauid:
Set nos Dauiticam variamus tradicionem,
Dumque sacerdotis sit gladiata manus.
Archa vetus Moysi valuit, nobisque valebit
Arcus qui populum tensus in orbe ferit.
In celo posuit deus arcum, sit quod ibidem
370 Federis in signum pacis ad omne genus;
Nos tamen in terris nostrum dum tendimus arcum,
Pacis in exilium signa cruoris habet.
Adiuuet ipse deus quos vult, set noster in armis
Saluus erit clerus militis acta tenens.
Criste, tua forti Sathanam virtute 369Nota hic370
ligasti, de bello Cleri
Quem nos de clero soluimus ecce tempore Regis
nouo; Ricardi in
Flandria, quia
Ipse solutus enim soluit tunc non solum
quoscumque ligatos, seculares set
Quo sua vota deo soluere nemo eciam
venit. regulares
Abbatem monachus nescit, nec presbiteri in
claustra priorem373 guerris371
ibidem
Ordinis in forma iam retinere mortalibus
380 queunt; quasi Laici
A dextro latere meretricem dumque spoliantes372
sacerdos insisterunt.
Et gladium leua promptus ad arma
tenet.
Quis tali melius est consignatus in orbe,
Forcior armatus, vt bene bella ferat?
Tempore quo cohitum natura mouet, pecus omne
Prouocat ex facili bella furore suo:
Set si causa sit hec, sumat qua presbiter arma,
Longior a pace pugna perhennis erit.
Militis officium non aris thurificare
390 Est, neque presbiteri publica bella sequi.
Si valet in bello clerus sibi ferre triumphum,
Ammodo quid validi militis acta valent?
Quem decet orare clerum pugnare videmus,
Curam de bellis, non animabus habent.
Quid si vulneribus superaddat homo tibi vulnus,
Num dici medicus debeat ipse tuus?
Num decet aut medicum morbo superaddere
morbum,
Quo fugit interius longius ipsa salus?
Hoc experta docet natura, quod omnis in orbe
400 Qua magis infirmor, est medicina mala.
Quos reperare decet pacem, si bella
frequentent,374
Nescio quo pacis tutus inire viam.
Dicitur vt fortuna rei de fine notatur,
Rebus et in dubiis exitus acta probat:
Qualis erit finis, seu que fortuna sequetur
In cleri bellis scit magis ipse deus.

Hic loquitur qualiter clerus in amore dei et


proximi deberet pius et paciens existere et non
bellicosus.

Capm. vii. Semper in aduersis est virtus maior, et ecce


Lumen in obscuro clarius esse solet.
Nobile vincendi genus est paciencia; vincit
410 Qui patitur; si vis vincere, disce pati.
Armiger ipse tuus et signifer est tibi Cristus,
Si simplex fueris et pacienter agas.
Ense manu, iaculis, aliis pugnare iubetur,
Nos pugnare fide, spe, pietate decet.
In seruum domini nichil hostis iuris habebit,
Ordine seruato causa fauebit ei:
Sic cum doctrinis fueris completus honestis,
Tunc hostes poteris inde fugare tuos.
Vt sis sublimis meritis accinctus in hostes,
420 Scripture iaculis hostica tela fugas.
Pro nobis pugnet Ysaïas cum Ieremia,
Cum Daniele Iohel, cum Samuele Dauid;
Lex euangelii, vox Pauli, sermo prophete,
Tres michi sunt testes, nostra stat vnde salus.
Cogitat ecce Dauid domino fundare, set audit
A domino, templum, ‘Non fabricator eris:
Es vir sanguineus, ideo dignum michi templum
Sanguine fedatus tu fabricare nequis.’
Sanguinis effusor, amplectens crimina mundi,
430 Ex bellis templum non valet esse dei:
Ecclesie sancte talis non erigit edem,
Nec sacre fidei collocat ipse domum.
Est nam mors odium, sicut scriptura fatetur;
Qui fratres odit est homicida sui:
Quomodo nos igitur, plebis de sanguine tincti,
Altaris famuli possumus esse dei?
Peccantis Cristus vult vitam, nec moriatur,
Set conuertatur, viuat vt ipse deo:
Et nos pro mundi rebus iugulamus in ense,
440 Quos Cristi sanguis viuere fecit, eos.
Quas statuit Cristus leges fuerant pietatis,
Nec peciit mundi quid nisi corda sibi;
Non cordis carnem, set quam dileccio mentem
Prestat, et has leges vendicat esse suas:
Nos tamen econtra cum sanguine carnea corda
Poscimus, vt nostra sit magis ira fera.
Nescio si mundum sub guerra vincere tali
Possumus; hoc reputo, displicet illa deo:
Namque malignantis deus ecclesiam magis odit,
450 Subque manu tali prospera nulla sinit.
Virtutem dat eis, qui mundum vincere norunt,
Ipsa fides Cristi fratris et intus amor.
Fratris amor pacem confirmat, federa seruat,
Stringit amicicias continuatque fidem:375
Fratris amor nescit aliena sitire, nec vmquam
Que sua sunt querit, nec scit habere suum:
Fratris amor ledi non vult nec ledere querit,
Nec queritur, nec dat vnde queratur homo.
Augens merorem male vindicat ipse dolorem,
460 Dum pugnat clerus obstat et ipse deus:
Nam mundanus amor premit omni tempore
quosque,
Set diuina manus seruat ab hoste suos.376
Prima dei timor est sapiencia, prima salutis
Est via, lux prima premia prima parans:
Federe perpetuo timor amplexatur amorem,
Quem sibi consimili federe iungit amor.
Vna nequit virtus alia virtute carere,
Nam timor est et amor connumeratus idem:
Est pater, hinc amor est; est iudex, inde timetur;
470 Et timor hic et amor comoda multa ferunt.
Non timor est serui set nati, suppliciumque
Non parit, immo parat premia magna viro.
Omnis amans Cristum timet illum; qui timet ipse
Non facit excessum, prouocet vnde d e u m:
Hic amor inspirat hominem discernere celum,
Iudicat et mundi gaudia vana fore.
Est igitur mirum, modo quod discordia cleri
Non se pacificat huius amoris ope.
Litera sacra docet, virtus quod amor placet omnis,
480 Et non mundanus ambiciosus honor;
Namque suos mundus dilectores magis arcet,
Et minus in fine commoditatis habent.
In veteri lege nullas habuere Leuite
Terras, nec mundus sollicitauit eos;
Immo deo soli plebis pro pace vacare
Est et non alia sollicitudo sua.
Non est ergo bonum mundanas sumere guerras,
Cum deus est mitis et bona pacis amat.
Hic tractat eciam qualiter non decet prelatos
contra populum Cristianum ex impaciencia
aliqualiter bella mouere; set tantum ex
precibus, deo mediante, absque ire impetu
omnem mundi deuincant377 maliciam.

Capm. viii. Inuoluens mentem meditando me stupor angit,


490 Cristi doctrina quam pietosa fuit;
Omne quod est pacis instruxit regula Cristi,
Quicquid et est belli nostra cupido mouet.
Ponit et opponit racio michi de racione,
Qualiter ex clero bellicus vnus erit.
Plures sunt cause, quod non ita fiat, et inde
Cristus in exemplum plurima verba docet:
Et si pro mundo fiat, sapiencia mundi
Arguit econtra, si videatur opus:
Nam dum pacifici fuerant nec honoris auari,
500 Omnis tunc requies glorificabat eos.
Si mundana decet mundanos bellica pugna,
Longius a clero sit tamen ille furor:
Que prosunt aliis, aliis nocuisse probantur,
Q u o d facit hunc stare, corruet alter eo:
Non bene conueniunt laicis misteria cleri,
Nec clero laici conuenit arma sequi.
Bella gerant alii, regat et paciencia clerum,
Quique tubis resonant, nos tacuisse decet.
Quo leuius cessit cuiquam victoria belli,
510 Victoris tanto gloria maior erit.
Non hiis, qui poterunt ex verbo cuncta ligare,
Expedit vt ponant quomodocumque manus:
Non opus est armis, vbi vox benedicta triumphat;
Qui vincit precibus, est sibi guerra nichil:
Quem deus in tanto promouit munere clerum,
Sollempnes satis est voce mouere preces.378
Qui sibi vult pacem, paciens in pace quiescat;
Non grauat hunc mundus quem iuuat ipse deus:
Quo casu queris, tibi respondere tenebor:
520 Qui bellator erit, bella parantur ei.
O quam perduros habet impaciencia fines,
Vnde solet preceps exitus esse grauis.
Impetus, vt memini, grauis est deformiter illis,
Quos sine iure dei propria iura regunt;
Stultaque multociens nocuit vexacio stulto,
Qui proprio capiti fine refundit onus:
Cumque suas vires quis vult preponere Cristi
Viribus, et bellum vincere credit eis,
Tanto debilior erit, et cum sic superare
530 Se putat, en victus subditur ille prius.
Vult implere viam Balaam, set trita flagellis
Et diuina videns tardat asella viam:
Quod sibi sic hominis habet impetuosa voluntas,
Denegat effectus commoditatis opus.
Quam variis vicibus humane res variantur,
Hoc docet expertus finis vbique rei:379
Quam minima causa magnum discrimen oriri
Possit, ab effectu res manifesta docet.
Rebus in aduersis opus est moderamine multo,
540 Nec decet in grauibus precipitare gradum:
Micius in duris sapiens Cato mandat agendum,
Nam nimis accelerans tardius acta facit:
Rebus in ambiguis quociens fortuna laborat,
Plus faciet paciens quam furor ille potest.
Talia rite docet, aliis dum predicat, ecce
Clerus, et econtra sic quasi cecus agit.380
Turpia doctorem fedant, cui culpa repugnat,
Nec sibi quid longo tempore laudis erit.
Nos nisi prosperitas nichil excusare valebit,
550 Quam constat nimiam nos tenuisse diu:
Extitit in letis minor et sollercia nobis,
Cernere nec cecos nostra cupido sinit.
Copia multociens hominem defraudat inanem,
Atque magis plenum causat habere famem.
Quam fuerat requies nuper sine crimine clero
Dulcis, amara modo sollicitudo docet.
Casibus in letis magis est metuenda voluptas,
Sepius in vicium que vaga corda ruit:
Casibus in letis quam sit vicina ruina,
560 Et lapsus facilis, nemo videre potest.
Non reputet modicum modico contenta
voluntas,381
Res de postfacto que fuit ante docet:
Nec magnum reputet quisquam, quin tempore
quouis
Fortuito casu perdere possit idem.
Discant precipites et quos mora nulla retardat,
Ne nimis accelerent in sua dampna manus:
Hoc docet in clero magis experiencia facti,
Quod mundana nichil cura valoris habet.
Est homo iumentis similis, qui fulget honore
570 Vanus, et ignorat quid sit honoris onus.
Est honor ille deo, puto, quando superbia mentem
Non grauat, immo dei debita iura tenet.
‘Qui mecum non est, hic contra me reputatur,
Collector sine me spersor inanis erit’:
Hec sunt verba dei, cuius de pondere legis
Addit vel minuit lex positiua nichil.

Hic tractat quod, sicut non decet dominos


temporales vsurpare sibi regimen in
spiritualibus, ita non decet382 cleri prelatos
attemptare sibi guerras et huiusmodi
temporalia, que mundi superbia et auaricia
inducunt.

Capm. ix. Anulus et baculus sunt ius papale sequentes,


Quos velut in signum spirituale tenet;
Cesaris et ceptrum mundi sibi signat honorem,383
580 Quo quasi mundane res famulantur ei.
Papa colens animas has dampnat viuificatque,
Corpora set Cesar subdita iure regit.
Non licet vt Cesar animas torquere valebit,
Nec de posse suo res tenet illa sibi;
Nec decet ex guerris hominum quod papa fatiget
Corpora, namque sibi non tenet illud opus:
Quisque suum faciat factum, pro quo venit ille,
Saltem qui pondus tam capitale gerit.
Qui tenet hic animas sub cura, celsior extat,
590 Et gradus anterior glorificabit eum.
Quicquid agit papa, licet, vt status ille fatetur,
Errat persona, non status ille tamen:
Nam sacer ille status mundum transcendit, et eius
Celorum claues dextera palma gerit.
Hinc aperitque polum, tetram quoque claudit
abissum,384
Que super aut subtus sunt, sua iura colunt;
Quod ligat est firmum, quod soluit eritque solutum,
Posse suum nostris sic animabus habet.
Cesaris hec que sunt, lex vt reddantur eidem
600 Vult, et vt illa dei sint tribuenda deo.
Cesaris est vt ei caput inclines, animamque
Pape, sic proprium reddis vtrique suum:
Cesar habere statum pape nequit, aut sibi papa
Cesaris imperium non propriare potest.
Cesaris hoc non est vt spiritualia temptet,
Nec decet vt papa Cesaris arma gerat:
Papa suum teneat Cesarque suum, quod vtrique
Iura coequata stent racione rata.
Si sibi presumat Cesar papalia iura,
610 Hoc non papa sinit, immo resistit ei:
Ergo quid est bellum pape quod Cesaris extat?
Nam deus ecclesie pacis amator erat.
Set quia papa suis mundum scrutatur in armis,
Inueniet similem quem petit inde modum:
Opponis mundo, mundus respondet, et illam
Quam sibi preponis rem dabit ipse tibi.
Quos prius ecclesia fundauerat ipsa fideles,385
Nunc magis impaciens dura per arma necat.
Rusticus agricolam, miles fera bella gerentem,
620 Rectorem dubie nauita puppis amat:
Cristus amat pacem, pax vendicat et sibi clerum,
Clerus et ergo suos debet habere pios.
Turpe referre pedem nec passu stare tenaci,
Turpe laborantem deseruisse ratem;
Turpius est Cristi pro mundo iura fugare,
Qui statuunt bellum pacis adesse loco.
Omnia regna quasi, Cristi que nomen invndat,
Bella gerunt reprobis horridiora Gethis.
Sufficeret tamen hoc, quod bella forent laicorum,
630 Si non quod proprio clerus in ense ferat:
Quicquid agant laici, minus excusare valebo
Clerum, quem Cristi regula pacis habet.
Set bona que mundi fugitiua sunt velut vmbra,386
Postposito Cristo, bella nephanda mouent.
Quicquid in humanis sit spiritualiter actum,
Clerus in officio clamat habere suo:
Est et mundanis que maior gloria rebus,
Vendicat hoc gladii proprietate sui.
Sic modo fert clerus geminas quibus euolat alas,
640 Illa tamen mundi plus placet ala sibi.
Sic piper vrtice mordacis semina miscent,387
Dum clerus mundi sponsus adheret ei;
Dumque tumens mundo clerus se miscet auaro,
Quo doleat populus, fit magis egra salus.
Non satis est illis populum vexare quietum,
Set magnum bello sollicitare deum.
Est ‘Non occides’ scriptum, set in orbe manentem
Preualet hoc certum nullus habere locum.
Est vbi dic ergo ius nostrum, nonne caducis
650 Talibus in rebus quas retinere nequis?
Linea natalis matris de iure fatetur
Heredem Cristum, qua fuit ortus, humi:
Si quid in hoc mundo nobis proprium magis esset,
Pars foret hoc Cristi que titulatur ei:
Hanc tenet intrusor modo set paganus, ab illa
Thesauris nostris nulla tributa feret.
Nos neque personas neque res repetendo
mouemus
Bella viris istis, lex ibi nostra silet:
Non ibi bulla monet, ibi nec sentencia lata
660 Aggrauat, aut gladius prelia noster agit:
Que sua sunt Cristus ibi, si vult, vendicet ipse,
Proque sua bellum proprietate ferat.
Nos ita longinquis non frangimus ocia guerris,
It neque pro Cristi dote legatus ibi;
Set magis in fratres, signat quos vnda renatos,
Pro mundi rebus publica bella damus.
Mandatum Cristi clerus quod predicet extat,
Et sibi sic lucrum spirituale gerat;
Non lego quod mundi pro lucro clerus ad arma
670 Procedat, set ibi parcat amore dei.
Sermo tamen cleri paganos nescit, vt illos
Conuertat, nec eo se iuuat ipse lucro:
Castra sibi que domos pocius lucratur et vrbes,
Pro quibus, vt vincat, forcius arma mouet.
Est sibi quod proprium, sic spirituale recusat,
Torpet et improprie quo foret ipse vigil;
Que tamen impropria Cristus sibi dixerat, i l l a
Mundi terrena propriat ipse sua:
Sic magis impropria propriat, propriisque
repugnans
680 Dispropriat clerus, que dedit acta deus.
Venit enim princeps huius mundi, famulatum
Optinet et nostrum, fert quia grande lucrum.
Cristi pauperiem mens nostra perhorret auara,
Ocia ne nostri corporis ipsa premat;
Nec sua cor mulcet humilis paciencia nostrum,388
Hoc etenim nostra pompa superba negat:
Nullus nos cinget nisi libera nostra voluntas,
Cuius habet tenera ducere frena caro.
Conditor est iuris qui spernere iura videtur,
690 Nec tenet ipse vias, quas docet esse suas;
Crimina condempnat qui crimine primus habetur,
Corripiens alios deteriora facit.
Ipse suas maculas, qui noscere vult aliorum,
Noscat, et emendet que sua culpa parat:
Qui claues Petri gestaret vt ostia celi
Panderet, illa viris claudit in orbe prius.
Cum magis hoc penso, magis obstupefactus in illo
Sum, nam lux quicquid predicat vmbra fugat:
Vnius gustus infecit milia multa,
700 Commaculantur eo cuncta sapore malo.
Sublimo residens dux prima superbia curru,
Multa minans vultu, lumine, voce, manu:
Subsequitur liuor, turba comitatus acerba,
Pallida res, atra pestis, amara lues;
Que solet et pietas peccata remittere vindex,
Extat auaricia lucra caduca petens.
Quam grauis est pestis, quam triste superbia
nomen,
Radix peccati, fons et origo mali!
Fons fuit hec sceleris, tocius causa doloris,
710 Virtutum morbus, saltus ad yma cadens,
Hospes auaricie, paupertas prodiga, fraudis
Principium, fallax sensus, iniqus amor,
Irrequies mentis, lis proxima, mortis amica,
Perfida mens, racio deuia, vanus honor.
Hec quasi de proprio sunt apropriata superbo,
Heres et baratri primus habetur ibi:
Hoc capitale malum quo regnat egens caput omne
Conficit, et caude par facit esse sue.
Hoc caput est rerum viciis seruire coactum,
720 Liber homo didicit hoc graue ferre iugum;
Non illud domini, quod dicitur esse suaue,
Immo quod imposuit invidus hostis ei;
Non quo libertas perquiritur illa salutis,
Set quod seruili condicione premit.
Fabrica prima, decus primum, primatis honore
Preditus, est prime perdicionis opus.
Prodolor, heu! tante dic que sit causa ruine:
Elate mentis motus origo fuit.
O mens elata, presumpcio dira, superni
730 Regis habere locum, iudicis esse parem,
Equarique suo factori, non imitari,
Equiperare deum nec bonitate sequi!
Expedit exemplis vt talibus euacuetur
Fastus, et ex humili corde paretur opus.
Incertum dimitte, tene certum, quia Cristi
Actus erat pacis, bella nec vlla mouet.
Si caput ecclesie delinquat ab ordine sacro,
Ecce nephas capitis membra nephanda parat.

Ordo sacerdotum pro Cristi nomine guerras


740 Non dedit, immo pati cum pietate solet.
Fustibus hii torti quemquam torquere recusant,
Cunctaque sic vincunt, dum pacienter agunt;
Inque bono vicere malum, quia Cristus eorum
Dux fuit, et iustis iusta petita dabat.
Quesiuit precibus bona spiritualia Petrus,
Vicit et egregie sic sua bella prece:
Hec fuit excelsi dextre victoria, cuius
Viribus efficitur quicquid adesse cupit.
Omnia namque pie moderatur, et omnia iusto
750 Pondere perpendit, dum sua vota dedit:
Sic qui prospiceret Cristi meditans pietatem,
Non tumidus fieret nec leuitate fluens.
Non fuit argentum sibi dixit Petrus et aurum,
Set preciosa magis dat sibi dona deus:
Dixerat hic claudo quod surgat, surgit et ille,
Ambulet et vadat, vadit et ipse statim.
Nunc quid erit nobis? nam si vir postulet omnis
Vt sic curemus, absque salute sumus.
Non habet elatus animus, quo digna precetur,
760 Molle cor; ad timidas dat deus immo preces.
Qui fuerat dulcis salibus viciatur amaris,
Floriger et veris floribus extat inops.
Auro magnifici sumus et virtutis egeni,
Nam que sunt auri duximus illa sequi:
Aurum si quis habet, satis ipsum constat habere,
Est et in hoc mundo sic benedictus homo.
Influit in cleri totus quasi mundus hiatum,
Inque suas fauces aurea queque vorat:
Vt tamen inde iuuet inopes, non paruula gutta
770 Refluit, immo tenax propriat omne sibi.
Se dedit in precium Cristus pro munere plebi,
Nos tamen ingrati nostra negamus ei.
O caput ecclesie, reminiscere tempora Cristi,
Si dedit exemplis talia sicut agis.
Ipse redemit oues, a morteque viuificauit,
Quas pietatis inops tu cruciando necas.
Precipit ipse, vices per septem septuagenas
Dimittat Petrus, parcat et ipse reis;
Tu tamen ad primam gladio cum vindice culpam
780 Percutis, et nullo parcis amore viro.
Ecce Rachel plorat nec habet solamina tristis,
Dum genus ex proprio ventre reliquit eam.
O genus electum, gens sancta, quid est quod
auara
Scandala iudiciis ponis in orbe tuis?
Prodolor! ecclesie bona, que debentur egenis,
Dissipat in bellis qui dominatur eis.
Prodolor! a clero, pietatis iure remoto,
Cauda fit ecclesie qui solet esse caput;
Fitque salus morbus, fit vitaque mors, releuamen
790 Lapsus, lex error, hostis et ipse pater.

Hic querit quod, exquo prelati scribunt et


docent ea que sunt pacis, quomodo in
contrarium389 ea que sunt belli procurant et
operantur. Ad quam tamen questionem ipse
subsequenter respondet.
Capm. x. In libris cleri Rome sic scribere vidi:
‘Vt melius viuas, hec mea scripta legas.
Vis seruire deo, vis noscere qualia querit?
Hec lege, tuncque scies qualiter illud erit.
Dilige mente deum, pete, crede, stude reuereri:’
Teste libro cleri, sic iubet ipse geri.
‘Est quia vita breuis, fuge luxus corporis omnes,
Preponens anime celica dona tue:
Iusticiam serua, tua sit lex omnibus equa;
800 Hoc facias alii, quod cupis ipse tibi:
Ex toto corde dominum tu dilige, tota
Ex animaque simul sit tibi fratris amor:
Gignit nempe dei dileccio fratris amorem,
Et diuinus amor fratris amore viget.
Munera fer miseris, que Cristo ferre teneris,
Arma quibus noceas, bella nec vlla geras:
Sis pius et paciens, tua sitque modestia cunctis
Exemplum pacis, duret vt illa magis.’
Hec ita cum legi, confestim me stupor vrget,
810 Qualiter in clero bella videre queo:
Querere sic volui de clero, quis foret ille;
Qui michi responsum de racione daret.
Questio mota fuit, qua sumpta clericus vnus
Astat et oppositis prompserat ista meis;
Supponens primis quod ei sit culmen honoris
Pontificis summi, talia dixit ibi.
‘Diuidit imperium terrena potencia mecum,
Iureque celicolo subdita regna colo;
Set quia terra prope nos est celumque remotum,
820 Que magis est nobis terra propinqua placet.
Aula michi grandis, sublimis et arte decora,
Nobilis est thalamus, mollis et ipse thorus:
Vt placeant ori que postulo, de meliori
Fercula lauta cibo sunt michi, vina bibo:
Ex auium genere, de piscibus omne salubre,
Vt magis est placitum, dant michi ferre cibum:
Singula que genera vini dat potibus vua
Optineo, quod in hiis sit michi nulla sitis.
Sunt michi carmina consona, timpana, letaque
musa,
830 Histrio dat variis cantica plena iocis:
Que mare, terra parit, meliora vel aera format,
Sunt michi prompta foro, sicut habere volo.
Est michi vinea, sunt viridaria fonte reclusa,
Que peto de mundo cuncta tenere queo:
Est michi fecundus dotalibus ortus in agris,
Pompaque castrorum, summus et vrbis honor:
Silua feras, volucres aer suscepit habendas,
Et mare quam vario pisce repleuit aquas.
Set loca non tantum nobis, nec et illa creata
840 Sufficiunt, auri sint nisi dona l u c r i.390
‘Ecce fores large, quas seruat ianitor arte,
Sic vt in has pauper nullus habebit iter:
Curia quos reprobat isto sermone repellit,
“State foras, vacui, flebitis ante fores.”
Que non dona manum presentat ianitor illam
Excludat, nostras nec sciat ipsa vias:
Qui tamen occulto cupit vt sit noster amicus,
Aurum det, sine quo victima nulla placet:
Que manus est plena, magis inuitabitur illa,
850 Stet foris et vacua, nec veneretur ita.
Omnia soluo, ligo, summo diademate regno,
Orbis ego dominus: quid michi velle magis?
Me dominum clamat, me viuens omnis adorat,
Omne solum calco sic deus alter ego.
Est thronus excelsus, quo possumus omnibus vna
Et benedicta manu, sic maledicta dare:
Sicque potestate nostra reuerenter vbique
Magnus in ecclesia, maior in orbe sumus.
‘Dicimus, et facta iam sunt, mandamus, et ecce
860 Accrescunt subiti dona creata lucri.
Que Cristus renuit suscepimus omnia regna
Mundi, que dominans gloria vana dedit:
Sic exaltati de terra traximus ad nos
Omnia deliciis amplificata magis.
Sic status assumptus quales sumus approbat, vt
nos
Ocia plectentes qui cruciamus humum.
Suaue iugum, leue Cristus onus nobis dedit, et
nos
Pondera que mundi sunt grauiora damus:
Iura damus populis, set nos non lege tenemur,
870 Que michi lex placuit iuris habebit onus.
Iudiciis hominum non stat quod pecco per orbem,
Sic michi cuncta licent, que magis acta placent;
Et si mundus in hiis fiat michi forte rebellis,
Est mea de guerris forcior ecce manus.
Hiis quoque de causis respondeo papa, quod
omnes
Per mea terrigenos bella retrudo viros.
‘Inter discipulos fuerat discordia facta,
Norma set infantis pacificauit opus:
Nos tamen ad veram nullo moderamine pacem
880 Flectere quis poterit, hoc neque pompa sinit.
In cruce confixus patitur sua funera Cristus,
Et fuit illa viris passio vera salus:
Omnibus exemplum fuit hec paciencia Cristi,
Alterutrum socii simus vt inde pii.
Nos tamen in signum vindicte ponimus illam,
Plebis et in mortem ferre iubemus eam:
Sicque pium signum diuertimus a pietate,
Que fuit et vita, nunc noua pestis erit.
Sic modo sunt mortis nuper vexilla salutis,
890 Que tulit et pacem crux modo bella gerit:
Sicque crucem domini baiulamus, mente set vlla
Non sequimur dominum, qua tulit ipse crucem.
Quod nequit hoc virtus, supplebunt ammodo vires,
Non mos set mortis pugna parabit iter:
Nostra sinistra teret quicquid fundauerat olim
Dextra, que sic humilis non parit oua fides.
Quam collegerunt alii dispergere messem
Tendimus, et feritas nostra vorabit humum:
Vinea sic domini nostros inculta labores
900 Non habet, estque magis bellica facta manus:
Sic magis, extrahere quem de pietate tenemur,
Sternimus in puteum de feritate bouem.
‘Quod tulerat Petrus lucrum Iudea fatetur,
Quas tulit et Paulus gens manifestat opes:
Nos neque cum vacuis manibus veniemus in auro,
Quod tamen est lucrum spirituale nichil.
Postera quicquid agat etas, iam nulla veremur
Crimina, dum mundus noster amicus erit:
Vt sit enim nomen nostrum nomen super omne,
910 Est vbi rarus honor, pugna iuuabit opus.
Ense peribit homo iuxta leges Machometi,
Eius qui nomen spernit habere sacrum:
Nos ita decretum iam ponimus ense volutum,
Nomen vt hinc nostrum presit in omne solum.
Cesaris imperio qui contradicit, amicus
Eius in hoc mundo non reputatur homo:
Sic homo, qui nomen nostrum non preficit altum,
Filius est mortis, ensis in ore reus.
‘Mittere sic gladium non pacem venimus orbi,
920 Et noua iam facimus omnia, dampna tamen.
Sic caput in membra iam seuit, et aggrauat illos,
Quos minus officio lederet ipse suo:
Sic pater in natos nunc fit magis ipse Saturnus,
Quos sua deberet lexque fouere, necat:
Sic et pastor oues, quas pascere iure tenetur
Iam vorat, et proprium predat ouile suum:
Sic ferus vt iudex agitamus secla per ignem,
Purgatique magis eris habemus opes.
Vendat enim tunicam sibi clerus et hinc emat
ensem,
930 Cesset et a sacris quilibet ordo suis:
Nomen et in terris sic nostrum magnificemus,
Vt timeant alii bella futura sibi.
Iam pastoralis baculus vertetur in hastam,
Mitra fit in galeam, pax ruit inque necem:391
Qui prodesse velit prosit, nam nos super omnes
Preferri volumus, gestet et alter onus.
‘Sic nos, qui summi portamus nomina cleri,
Corde magis ceci duximus arma sequi:
Quicquid agant anime, nos subdere corpora mundi
940 Tendimus, et nobis lex positiua fauet;
Nam licet ex glosa gladium quod sumat vtrumque,
Quo ferat extenta bellica, nostra manus.
Ergo magis paueant omnes dedicere nobis,
In quorum bellis os ferit atque manus.
Attamen ad pacem nostram suscepimus omnes
Barbaricas gentes, ne cruciemur eis:
Contra Cristicolas pretendimus arma mouere,
Qui modo sunt ausi vix sua iura loqui.
Auriculam Petrus abscidit, vulnus et illud
950 Sanum restituit Cristus vt ante fuit;
Nostra set ira caput aufert, quo vulnere nullum
Nouimus in sanum post reuenire statum.
Est igitur Petri maior sentencia nostra,
Et gladius noster forcior ense suo.’
Sic differt Clemens nunc a clemente vocatus,
Errat et Acephalo nomine nomen habens.

Hic loquitur de prelatis illis, qui nomen


sanctum sibi presumunt, appropriant tamen sibi
terrena, nec aliis inde participando ex caritate
subueniunt.

Capm. xi. Angelus, vt legitur, sancto quandoque Iohanni


Dixit, cumque cadens alter adorat eum,
‘Tu michi, serue dei, videas ne feceris illud,
960 Immo deum toto cordis honore cole.’
‘Quem tamen in terris celestis ciuis honorem
Respuit, hunc repetit curia nostra sibi;
Flectitur inde genu, que pedes post oscula nostros
Mulcent, vt Cristi pes foret alter ibi.’
Precipit hoc Cristus, eius quod discipulorum
Nemo patris nomen querat habere sibi:
In celo sancti proclamant ‘Sanctus’ vt illi
Qui sedet in solio dignus honore suo.
‘Nos tamen in gente nomen portamus vtrumque,
970 “O pater, o sancte,” quisque salutat, “aue!”
Extitit a Cristo data nobis magna potestas,
Vndique quam mundus amplificare studet.
Hoc sit vt esse potest: celum quicumque ligabit,
Scimus nos mundum posse ligare satis:
Nam modo lex posita bellorum ponit auara
Quod valet ecclesia vi reuocare sua.
Set quicquid clerus rapit et tenet ex alienis,
Hoc valet a clero tollere nullus homo.’
Quicquid habet clerus proprios hoc vertit in vsus,
980 De laicis partem vult set habere suam.
Hic bona cuncta sua fore dicit sanctificata,
Nec licet vt laicus mittat ad illa manus;
Partem sed laici petit ipse per omnia lucri,
Nec vult cum dampno participare suo.
Si communis amor fuerit, commune sit omne,
Quod liquet alterutrum posse iuuare virum:
Set quia iam clerus non est communis amoris,
Quicquid habet soli vult retinere sibi.
Ex veteri lege raptum sit quicquid ab hoste,392
990 Non valet illud homo sanctificare deo;
Nostra set ecclesia clerus vicinia rapta
Predat, et hec propria dicit habere sacra.
Sic multat laicum clerus, multare set ipsum
Nemo potest, et ita stant modo iura noua:
Sic non pastor oues pascit, set pastus ab ipsis
Lac vorat et vellus, alter vt ipse lupus:
Sic libras siciens libros non appetit, immo
Marcam pro Marco construit ipse libro:
Summas non summa memoratur, et optima vina
1000 Plusquam diuina computat esse sacra:

You might also like