Your SlideShare is downloading. ×
0
Impact of the Internet of Things (IoT)
Impact of the Internet of Things (IoT)
Impact of the Internet of Things (IoT)
Impact of the Internet of Things (IoT)
Impact of the Internet of Things (IoT)
Impact of the Internet of Things (IoT)
Impact of the Internet of Things (IoT)
Impact of the Internet of Things (IoT)
Impact of the Internet of Things (IoT)
Impact of the Internet of Things (IoT)
Impact of the Internet of Things (IoT)
Impact of the Internet of Things (IoT)
Impact of the Internet of Things (IoT)
Impact of the Internet of Things (IoT)
Impact of the Internet of Things (IoT)
Impact of the Internet of Things (IoT)
Impact of the Internet of Things (IoT)
Impact of the Internet of Things (IoT)
Impact of the Internet of Things (IoT)
Impact of the Internet of Things (IoT)
Impact of the Internet of Things (IoT)
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Impact of the Internet of Things (IoT)

1,213

Published on

Published in: Technology
0 Comments
10 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,213
On Slideshare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
141
Comments
0
Likes
10
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • IntelligentFastBetter
  • IoT will inherit the drawbacks of the current internet on an infinitely larger, but more invisible scaleAbsence of governance is the first main challengeOne major barrier for the widespread adoption of the Internet of Things technology is the absence of governance. Without an impartial governing authority it will be impossible to have a truly global “Internet of Things”, accepted by states, companies, trade organizations and the common people. Today there is not a unique universal numbering scheme as just described: PCglobal and the Ubiquitous Networking Lab propose two different, non-compatible ways of identifying objects, and there is the risk to have them competing in the coming future over the global market. There is also the need of keeping governance as generic as possible, as having one authority per application field will certainly lead to overlap, confusion and competition between standards. Objects can have different identities in different contexts so having multiple authorities would create a kind of multi-homing, which can lead to disastrous results.Privacy and securityIn order to have a widespread adoption of any object identification system, there is a need to have a technically sound solution to guarantee privacy and the security of the customers. While in many cases the security has been done as an add-on feature, it is the feeling that the public acceptance for the IoT will happen only when the strong security and privacy solution are in place. This could be hybrid security mechanisms that for example combine hardware security with key diversification to deliver superior security that makes attacks significantly more difficult or even impossible. The selection of ssecurity features and mechanisms will continue to be determined by the impact on business processes; and trade-offs will be made between chip size, cost, functionality, interoperability, security, and privacy. The security and privacy issues should be addressed by the forthcoming standards which must define different security features to provide confidentiality, integrity, or availability services. There are also a range of issues related to the identity of people. These must be dealt with in politics and legislation, and they are of crucial importance for the efficient public administrations of the future. Although many of the proposed technologies are based on RFID or smart systems, they will not be discussed in this report whose focus is on objects and things and the related technological and application challenges. Solution of the main challenge: Education and InformationEducation and Information are central aspects for the success of the upcoming IoT. As discussed in previous sections, privacy concerns about the misuse of information are high, and final users do not clearly see the advantages of the widespread adoption of this technology. Therefore, education about the potential use and clear benefits of the IoT must be carried out, together with significant advances in privacy enhancement technologies. As well, information to the users about the presence of RFID tags, the reading range, the kind of data contained in the devices and in the back system, and the use of those, must be clear and easily available.Second solution to challenge LegislationWhen moving towards the Internet of Things it is mandatory that policy keeps up with technology so that citizens gain confidence in the new technology and will accept to live in the “Internet of Things”. When bar codes were introduced they received public uprising and rejection. Attempts to introduce electronic health cards have been unsuccessful based on public fear for information misuse. RFID tags have seen a similar resistance leading to tags that can be erased when clients leave the supermarket, or temporarily disabled, or just be read by trusted readers. In addition to research of current concerns, it is important to engage the wider public in a political debate and dialogue about the Internet of Things. People’s momentarily context and roles can determine their attitudes towards new technology: as an example, an employee will resist his boss' access to his or her mailbox while the same person may demand the same insight into the mailboxes of subordinates. Legislation: mandatory that policy keeps up with technology so that citizens gain confidence in the new technology People’s momentarily context and roles can determine their attitudes towards new technology. An employee will resist his boss’ access to his or her mailbox while the same person may demand the same insight into the mailboxes of subordinates.
  • Customer Engagement process
  • On the Enterprise you add synchronization and management and security issues.
  • On the Enterprise you add synchronization and management and security issues.
  • Every organization incurs TD, yet most are still profitable,Consider The churn in CIO’s – the highest of any “C” level executive (17-18) months is the average tenureThe constant need for increasing investment just to stay competitive while being asked to more with less- and optimize the impact of investment The need to keep up maintain competitive innovation while keeping the lights on. The need to Shadow IT is one thing that scares every CIO as it exposes and threatens key items under which the CIO is measured; security, compliance, EAI, Innovation and cost control.
  • DON’T MISS THE BOAT!!!
  • Transcript

    • 1. Impact of the Internet of Things (IoT) Dipesh Mukerji, Kony Inc.
    • 2. “Internet of Things” “(IoT) refers to idea to connect the physical to the digital via embedded technology. To receive data from all kind of smart objects and have them communicate and interact with one another in order to simplify and facilitate human life, improve business processes, reduce costs and risks and raise efficiency.“
    • 3. Security Home Office MapsAuto Weather Safety Compliance Social Media Food Shopping Mail Search News Anyone Entertainment Corporate The Internet of things…
    • 4. Based on Population Based on Industry
    • 5. How Does It Work
    • 6. Enabling Technologies RFID To identify and track the data of things. Sensors To collect and process the data to detect the changes in the physical status of things. Smart Tech To enhance the power of the network by devolving processing capabilities to different part of the network. Nano Tech To make the smaller and smaller things have the ability to connect and interact. Enabling Technologies
    • 7. Applications
    • 8. When entering the doors, scanners will identify the tags on clothing. When shopping in the market, the goods will introduce themselves (iBeacon). When moving the goods, the reader will tell the staff to put a new one. When paying for the goods, the microchip of the credit card will communicate with checkout reader.
    • 9. Across Industries Industry / Application area Case description Products / services / benefits offered Technology needed Manufacturing IoT-adapted manufacturing processes Customization of products during the production process. Situation-aware smart machines and robots Health Health related products and services Medical expertise Sensors, IoT communication infrastructure Health guidance service Monitoring of key parameters; analyzes by medical experts. Sensors Home Home owner’s digital service Monitor and manage facilities. Plug-and-play devices, installation package, open and user-friendly applications Saving energy Measuring temperature, and thus decreasing energy consumption Sensors Traffic Traffic data marketplace Real-time traffic, environment, weather, road condition, incident, etc. related data Databank, sensors Shopping Electronic shopping assistant Key information about a product which a customer points to in a shop, for example price per unit, production/expiration date, ingredients, calories, country of origin, etc. Electronic shopping assistant device, RFID Food Food security tracking system Tracing of food products from original material providers to consumers Sensors, RFID Real Estate Real-time waste monitoring Reducing the costs of waste collection. Sensors
    • 10. Decision Making =Better Decisions  More intelligent  Faster Processing Power / Analytics Amount of Data +
    • 11. Legal & Regulatory Technical ControlSocial Ethic Market Self-regulation Solutions: 1. Management 2. Security IoT Challenges:
    • 12. Challenges & Benefits Challenges • People / Society • Security / Privacy • Governance • Standards / Policies • Resource Efficiency • Tech Architecture / Infrastructure • Cost • Pollution / Disaster avoidance • Managing innovation • Efficiency / Speed • Energy / Power Consumption • Data volume & analytics Benefits • Better & faster Information • Improved education • Regulation / Legislation • Quality of life • Increased awareness • Higher production / volume • Broader experiences • Better decision making • Resource optimization • Proficiency • Remove human error • More services
    • 13. Measuring IoT Success
    • 14. Points of Engagement Evolution TIME Single Channel Multi-Channel Cross-Channel Omni-Channel
    • 15. Development Teams Channels Most companies approach this complexity tactically Tablets Mobile Desktop Kiosk NEW App X 1.0 NEW App X 1.0 NEW App X 1.0 NEW App X 1.0 Scanner stdIn = new Scanner(System.in double speed; // User entered valuedouble tailGatingDistance; // user entered valudouble stoppingDistance;System.out.print("Enter your speed (mph): ");speed = stdIn.nextDouble(); System.out.print("Enter your tailgate distance: ");tailGatingDistance = stdIn.nextDouble();stoppingDistance = speed * (2.25 + speed/21); // number stoppingDistanc e ;speed = stdIn.nextDouble Security Scanner stdIn = new Scanner(System.in double speed; // User entered valuedouble tailGatingDistance; // user entered valudouble stoppingDistance;System.out.print("Enter your speed (mph): ");speed = stdIn.nextDouble(); System.out.print("Enter your tailgate distance: ");tailGatingDistance = stdIn.nextDouble();stoppingDistance = speed * (2.25 + speed/21); // number stoppingDistanc e ;speed = stdIn.nextDouble synchronization Features Scanner stdIn = new Scanner(System.in double speed; // User entered valuedouble tailGatingDistance; // user entered valudouble stoppingDistance;System.out.print("Enter your speed (mph): ");speed = stdIn.nextDouble(); System.out.print("Enter your tailgate distance: ");tailGatingDistance = stdIn.nextDouble();stoppingDistance = speed * (2.25 + speed/21); // number stoppingDistanc e ;speed = stdIn.nextDouble New OS upgrades Security Patches Scanner stdIn = new Scanner(System.in double speed; // User entered valuedouble tailGatingDistance; // user entered valudouble stoppingDistance;System.out.print("Enter your speed (mph): ");speed = stdIn.nextDouble(); System.out.print("Enter your tailgate distance: ");tailGatingDistance = stdIn.nextDouble();stoppingDistance = speed * (2.25 + speed/21); // number stoppingDistanc e ;speed = stdIn.nextDouble New OS upgrades New UIs Compatability Multiple Codebases Same Features Multiple Channels + + = Time & $$
    • 16. Development Teams Channels The multi-channel approach reduces the complexity Tablets Mobile Desktop Kiosk NEW App X 1.0 NEW App X 1.0 NEW App X 1.0 NEW App X 1.0 Scanner stdIn = new Scanner(System.in double speed; // User entered valuedouble tailGatingDistance; // user entered valudouble stoppingDistance;System.out.print("Enter your speed (mph): ");speed = stdIn.nextDouble(); System.out.print("Enter your tailgate distance: ");tailGatingDistance = stdIn.nextDouble();stoppingDistance = speed * (2.25 + speed/21); // number stoppingDistanc e ;speed = stdIn.nextDouble Security Scanner stdIn = new Scanner(System.in double speed; // User entered valuedouble tailGatingDistance; // user entered valudouble stoppingDistance;System.out.print("Enter your speed (mph): ");speed = stdIn.nextDouble(); System.out.print("Enter your tailgate distance: ");tailGatingDistance = stdIn.nextDouble();stoppingDistance = speed * (2.25 + speed/21); // number stoppingDistanc e ;speed = stdIn.nextDouble synchronization Features Scanner stdIn = new Scanner(System.in double speed; // User entered valuedouble tailGatingDistance; // user entered valudouble stoppingDistance;System.out.print("Enter your speed (mph): ");speed = stdIn.nextDouble(); System.out.print("Enter your tailgate distance: ");tailGatingDistance = stdIn.nextDouble();stoppingDistance = speed * (2.25 + speed/21); // number stoppingDistanc e ;speed = stdIn.nextDouble New OS upgrades Security Patches Scanner stdIn = new Scanner(System.in double speed; // User entered valuedouble tailGatingDistance; // user entered valudouble stoppingDistance;System.out.print("Enter your speed (mph): ");speed = stdIn.nextDouble(); System.out.print("Enter your tailgate distance: ");tailGatingDistance = stdIn.nextDouble();stoppingDistance = speed * (2.25 + speed/21); // number stoppingDistanc e ;speed = stdIn.nextDouble New OS upgrades New UIs Compatability Multiple Codebases Same Features Multiple Channels + + = Time & $$ NEW App X 1.0
    • 17. Cost of a Multi-Channel Strategy Innovation Bump Break even line Initial Investment
    • 18. Will the market keep up with the IoT? • Consumer consumption will drive enterprise adoption of new channels • Security/Accessibility capabilities will be at a premium in determining enterprise adoption • Easy and fast development platforms, tools and communities will drive growth • Must work off the cloud • Must seamlessly integrate with existing products • Must have the best yet different user experience • Needs to be energy efficient
    • 19. Multi-Channel Strategy – What To Consider • How large is your user base? • What do your users want? • What devices are your users on? • What are your operational and maintenance cost requirements? • What UX and/or UI experience do your users require? • Are you looking to be in the app store? • How do your users access and consume content? • Does your business need to evolve as fast as technology?
    • 20. 20M2M
    • 21. Empowering everywhere.

    ×