SlideShare a Scribd company logo
1 of 35
Person Centric IoT
Dr. Asaf Adi
Senior Manager, IoT and Wearables
adi@il.ibm.com
Please Note:
1
•  IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole
discretion.
•  Information regarding potential future products is intended to outline our general product direction and it should not be relied on in
making a purchasing decision.
•  The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any
material, code or functionality. Information about potential future products may not be incorporated into any contract.
•  The development, release, and timing of any future features or functionality described for our products remains at our sole discretion.
•  Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual
throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the
amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed.
Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.
Please Note:
2
At this time, we request that all smart phones, smart watches,
smart glasses, smart-hats, wristbands, headbands, shoes,
vests, tags, and swallowed pills be turned off for the full
duration of the presentation... ☺
The Human Experience is Transforming
•  We expect new ways to interact with all the forms of computing systems
•  We expect computing systems to understand us and do things for us automatically
•  We expect computing systems to engage us everywhere at the right time, in the right way and
with the right content, utilizing all possible information sources
•  We expect that everything will seamlessly work together 3
By Wearable, Mobile, and IoT
Wearables Transform Industries
Always on, Hands Free, New Sensors
4
Engaging CustomersTransforming Professions
Field worker
safety
Emergency
response
Payments
Pay as you
live insurance
Customer
service
Customer
loyaltySmart care
team
Amusement
parks
Smart
conference Field worker
effectiveness
Healthcare
and Home
caring
Wellness
Customer Service
•  Virgin Atlantic tries greeting its passengers using wearable tech
5
http://www.virgin-atlantic.com/gb/en/footer/media-centre/
press-releaseR/google-glass.html
Customer Interactions
•  Disney MagicBands are innovative all-in-one devices that guests can
use to enter Disney theme parks, unlock their Disney Resort hotel
room, use the FastPass+ entrance for attractions and entertainment
experiences, make payments at shops and restaurants, and link Disney
PhotoPass photos to their Disney account.
6
Customer Engagement
•  L'Oreal My UV Patch
•  L’Oreal Makeup Genius
7
Pay Bands
•  Wristband / smart watch for customer authentication and payment
means at point of sale
– Secure with biometric authentication
– Alternative/complimentary to credit-card / debit / gift-card (pre-charged)
•  “Parenting mode” – control your family devices.
•  Restrict expenses per event / location.
8
Pay How You Live Insurance
•  Oscar clients can opt to receive a free Misfit wristband pedometer that
will connect automatically to Oscar’s app. Once set up, the Oscar Misfit
will pay you to walk. Each day you get a new target for the number of
steps to take. Hit the goal and earn a buck—do it 20 times, and you get
an Amazon $20 gift card (up to $240 a year).
9
Pay How You Drive Insurance
•  Progressive® Insurance teams up with
Zubie to reward safe drivers. It works by
giving Progressive users the Zubie plug-
in device, have them drive with it for six
months, then offer them a new insurance
rate based on their driving habits.
•  Censio, which makes an app that uses
smartphone data to track user driver
habits, has also teamed up with
Progressive to share user data with the
insurer.
10
Elder Wellness
11
Health and Remote Patient Monitoring
12
VitalConnect
DoulaRoom
Medtronic and Watson Health
Why am I Here ?
IBM Smart Glasses – 1997
14
IBM Smart Watch – 2000
15
Wearables are booming
200 M People
will use wearable devices that
measure their heart rates by 2018
[1]
30% of Corp Wellness
Programs
will capture biometric data about
employees by 2016 [1]
5% of Enterprise Sales
driven by consumer data
collected from wearable
devices by 2020 [2]
Exceeding 12 B devices
by 2020
the combined market for
wearable devices, led by
devices worn on the wrist [2]
16
[1] Gartner, Top 10 Strategic Predictions for 2015 and Beyond: Digital Business Is Driving 'Big Change’
[2] Gartner, Predicts 2014: The Business Impact of the 'SMART' Technologies
A short survey
How many of you are entrepreneurs in wearable / IoT ?
17
A short survey
How many of you target the enterprise (vs. consumer) as their main
customer ?
18
Employee Safety
Workplace injuries and illness cost the US $190 billion
•  $55.4 billion direct costs
•  27M working days lost
•  4,628 Fatal work injuries
•  Wearables technologies presents a new
opportunity for reducing workplace death
and injuries
–  Non intrusive, enabling hands-free work
–  Always-on
–  Employee- and environment-aware
–  Connected
–  Attention-getting
20
http://www.libertymutualgroup.com/omapps/ContentServer?cid=1138365240689&pagename=LMGResearchInstitute/cms_document/ShowDoc&c=cms_document
http://www.bls.gov/iif/oshwc/cfoi/cfoi_revised12.pdf
http://www.epi.org/blog/250b-costs-occupational-injury-illness-exceed/
Can you find the safety risks ?
Photo taken from IBM building in Bois Colombes, France
21
Can you find the safety risks ?
Photo taken from IBM building in Bois Colombes, France
22
Your employees’ Guardian Angel
IBM Employee Safety Solution works as your personal protective application. It
allows intuitive specification of “shields” that govern the personal wellness and
safety of their owner, detect hazard and notify employees and supervisors
23
Hazards Detection
GPS Sensor:
Location
BLE/ANT+ / CPU
Accelerometer:
Speed-X
Speed-Y
Speed-Z
Bio-sensing:
Heart-rate
Body temperature
Environmental-sensing:
Temperature
Light
Noise
Oxygen deficiency
Carbon monoxide
Alert Employee
Inform Supervisor and
Emergency Center
Broadcast message
to nearby employees
IBM
Employee Safety
•  Excessive lifting,
pushing, carrying
•  Fatigue
•  Alertness
•  Dehydration
•  Fall / Injury
•  Use of safety equip
Use Case – Heat Stress
•  Continuously monitor the worker’s body
temperature, heart rate, and level of
activity, correlated with external sources of
ambient temperature and humidity.
– Personalized Heat Stress risk levels
– Heat Stress hazards alerts
24
Energy, HR,
Skin temp,
GSR
Temp,
Humidity
Movement
IBM Employee Safety Solution benefits
IBM Employee Safety helps companies protect themselves and their employees from
the financial loss and human cost of workplace injuries.
Real-time analytics
•  Prevent workplace accidents and injuries before they happen
–  Validate compliance to safety guidelines and regulation
–  Predictive alerts to employees and supervisors
•  Expedite emergency response in case of accidents
–  Notifying emergency response and near-by employees
Off-line analytics
•  Identify the “near-misses” and almost accidents
–  Continuously improve safety guidelines and regulations via learning
•  Employee personalization
25
Demo
26
Worker App Supervisor App
Lessoned Learned
Wearables can not work alone
•  Brain - most devices have zero to very little processing power, memory,
storage, and battery
•  Engagement – multi modal interactions for seamless integrated user
experience between wearables, mobile, and IoT
•  Connectivity – most devices have only low range connectivity
28
Wearable can not always rely on the cloud
•  Performance
– Many applications requires near-real-
time processing
– Local processing is required to
minimize latency
•  Connectivity
– Need to operate in remote locations,
including rural areas underground and
in the sea
•  Reliability
– Safety & Healthcare applications
require high availability
– Can’t count on network & server
availability
•  Efficiency
– Devices may generate hundreds of
events every second, most are
irrelevant for server processing
– Transmitting this amount of data
overloads the communication and the
server
•  Power consumption
– Transmitting this amount of data
drains the batteries
•  Privacy
– Part of the data needs to be securely
handled and in some case obfuscated
29
The wearable platform – the new I/O for cognitive
Wearable-enabled enterprise solution use the compute power of the
smartphone to
•  Interpret raw data from Wearables into meaningful insight that can be
acted upon.
•  Enable multi modal interactions for seamless integrated user experience
between wearables and mobile devices
30
Privacy
•  Privacy Principles – Data subject (person) has the
right to be informed when his personal data is being
processed.
•  Consent - Data may be processed only when the
data subject has given his consent, is necessary for
a contract, needed for compliance with a legal
obligation, or is necessary for a task carried out for
public interest
– Only for legitimate purposes
•  Proportionality - The data processed and the time
for which it is stored should be no more than
required for the stated purpose
•  Marketing Opt-out - The data subject can object at
any time to the use of personal data for direct
marketing purposes
31
The Human Experience is Transforming
•  We expect new ways to interact with all the forms of computing systems
•  We expect computing systems to understand us and do things for us automatically
•  We expect computing systems to engage us everywhere at the right time, in the right way and
with the right content, utilizing all possible information sources
•  We expect that everything will seamlessly work together 32
By Wearable, Mobile, and IoT
Notices and Disclaimers
33
Copyright © 2016 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission
from IBM.
U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM.
Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of
initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS
DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE
USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM
products and services are warranted according to the terms and conditions of the agreements under which they are provided.
Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice.
Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers
have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary.
References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in
which IBM operates or does business.
Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and
discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or
their specific situation.
It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and
interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such
laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law
Notices and Disclaimers Con’t.
34
Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not
tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products.
Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the
ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
The provision of the information contained h erein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual
property right.
IBM, the IBM logo, ibm.com, Aspera®, Bluemix, Blueworks Live, CICS, Clearcase, Cognos®, DOORS®, Emptoris®, Enterprise Document Management System™, FASP®,
FileNet®, Global Business Services ®, Global Technology Services ®, IBM ExperienceOne™, IBM SmartCloud®, IBM Social Business®, Information on Demand, ILOG,
Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower, PureAnalytics™, PureApplication®, pureCluster™, PureCoverage®, PureData®,
PureExperience®, PureFlex®, pureQuery®, pureScale®, PureSystems®, QRadar®, Rational®, Rhapsody®, Smarter Commerce®, SoDA, SPSS, Sterling Commerce®,
StoredIQ, Tealeaf®, Tivoli®, Trusteer®, Unica®, urban{code}®, Watson, WebSphere®, Worklight®, X-Force® and System z® Z/OS, are trademarks of International Business
Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM
trademarks is available on the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.

More Related Content

What's hot

What is the Internet of Things? How does it Work?
What is the Internet of Things? How does it Work?What is the Internet of Things? How does it Work?
What is the Internet of Things? How does it Work?AbhijitVerma9
 
Wearable Technology- Transforms the way we experience the world
Wearable Technology- Transforms the way we experience the worldWearable Technology- Transforms the way we experience the world
Wearable Technology- Transforms the way we experience the worldAffle mTraction Enterprise
 
Internet Of Things A new vision of the future - Perlat Kociaj
Internet Of Things A new vision of the future - Perlat KociajInternet Of Things A new vision of the future - Perlat Kociaj
Internet Of Things A new vision of the future - Perlat Kociajperlatsp
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
The Future of Wearable Technology
The Future of Wearable TechnologyThe Future of Wearable Technology
The Future of Wearable Technologyanvita125
 
Future of Wearable Tech Report
Future of Wearable Tech ReportFuture of Wearable Tech Report
Future of Wearable Tech ReportIntel iQ
 
Intel mHealth Imperatives
Intel mHealth ImperativesIntel mHealth Imperatives
Intel mHealth Imperativesrcnossen
 
Overview of Wearable Technology
Overview of Wearable TechnologyOverview of Wearable Technology
Overview of Wearable TechnologyAditi Rustagi
 
Wearable technology market
Wearable technology marketWearable technology market
Wearable technology marketPreethi Myla
 
Wearable electronics in healthcare
Wearable electronics in healthcareWearable electronics in healthcare
Wearable electronics in healthcareJeffrey Funk
 
Scott Orkin - Wearable technology
Scott Orkin - Wearable technologyScott Orkin - Wearable technology
Scott Orkin - Wearable technologyScott Orkin
 
Wearable Technology Report
Wearable Technology ReportWearable Technology Report
Wearable Technology ReportRohini Vaze
 
White_paper_Building_IoT_Products_-_The_Complete_Guide02
White_paper_Building_IoT_Products_-_The_Complete_Guide02White_paper_Building_IoT_Products_-_The_Complete_Guide02
White_paper_Building_IoT_Products_-_The_Complete_Guide02Ronit Soen
 

What's hot (16)

INTERNET OF THINGS
INTERNET OF THINGSINTERNET OF THINGS
INTERNET OF THINGS
 
The Internet Of Things UOP
The Internet Of Things UOPThe Internet Of Things UOP
The Internet Of Things UOP
 
What is the Internet of Things? How does it Work?
What is the Internet of Things? How does it Work?What is the Internet of Things? How does it Work?
What is the Internet of Things? How does it Work?
 
Wearable Technology- Transforms the way we experience the world
Wearable Technology- Transforms the way we experience the worldWearable Technology- Transforms the way we experience the world
Wearable Technology- Transforms the way we experience the world
 
Internet Of Things A new vision of the future - Perlat Kociaj
Internet Of Things A new vision of the future - Perlat KociajInternet Of Things A new vision of the future - Perlat Kociaj
Internet Of Things A new vision of the future - Perlat Kociaj
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
The Future of Wearable Technology
The Future of Wearable TechnologyThe Future of Wearable Technology
The Future of Wearable Technology
 
Future of Wearable Tech Report
Future of Wearable Tech ReportFuture of Wearable Tech Report
Future of Wearable Tech Report
 
Intel mHealth Imperatives
Intel mHealth ImperativesIntel mHealth Imperatives
Intel mHealth Imperatives
 
Overview of Wearable Technology
Overview of Wearable TechnologyOverview of Wearable Technology
Overview of Wearable Technology
 
Wearable technology market
Wearable technology marketWearable technology market
Wearable technology market
 
Wearable electronics in healthcare
Wearable electronics in healthcareWearable electronics in healthcare
Wearable electronics in healthcare
 
Scott Orkin - Wearable technology
Scott Orkin - Wearable technologyScott Orkin - Wearable technology
Scott Orkin - Wearable technology
 
Wearable Technology Report
Wearable Technology ReportWearable Technology Report
Wearable Technology Report
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
White_paper_Building_IoT_Products_-_The_Complete_Guide02
White_paper_Building_IoT_Products_-_The_Complete_Guide02White_paper_Building_IoT_Products_-_The_Complete_Guide02
White_paper_Building_IoT_Products_-_The_Complete_Guide02
 

Viewers also liked

גוגל גלאס- כתבה בממון
גוגל גלאס- כתבה בממוןגוגל גלאס- כתבה בממון
גוגל גלאס- כתבה בממוןNiv Calderon
 
Sumit Dutta Chowdhury: Internet of Things in Manufacturing
Sumit Dutta Chowdhury: Internet of Things in ManufacturingSumit Dutta Chowdhury: Internet of Things in Manufacturing
Sumit Dutta Chowdhury: Internet of Things in ManufacturingRahul Neel Mani
 
Internet of Things, wearable devices and the connected life
Internet of Things, wearable devices and the connected lifeInternet of Things, wearable devices and the connected life
Internet of Things, wearable devices and the connected lifeJaffna IT Week
 
Intimate Things: How Wearables Are Changing The Internet of Things
Intimate Things: How Wearables Are Changing The Internet of ThingsIntimate Things: How Wearables Are Changing The Internet of Things
Intimate Things: How Wearables Are Changing The Internet of ThingsPaul Brody
 
From IoT to wearable @ CETIC M2M/UNB
From IoT to wearable @ CETIC M2M/UNBFrom IoT to wearable @ CETIC M2M/UNB
From IoT to wearable @ CETIC M2M/UNBir. Carmelo Zaccone
 
NTK 2015: Internet of things track (IoT) - Smart Home
NTK 2015: Internet of things track (IoT) - Smart HomeNTK 2015: Internet of things track (IoT) - Smart Home
NTK 2015: Internet of things track (IoT) - Smart HomeAndrej Tozon
 
Trends in Sensors, Wearable Devices and IoT
Trends in Sensors, Wearable Devices and IoTTrends in Sensors, Wearable Devices and IoT
Trends in Sensors, Wearable Devices and IoTWalt Maclay
 
Sensors, Wearables and the Internet of Things: A Revolution in the Making
Sensors, Wearables and the Internet of Things: A Revolution in the MakingSensors, Wearables and the Internet of Things: A Revolution in the Making
Sensors, Wearables and the Internet of Things: A Revolution in the MakingMatt Turck
 
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Ahmed Mahmoud
 

Viewers also liked (10)

גוגל גלאס- כתבה בממון
גוגל גלאס- כתבה בממוןגוגל גלאס- כתבה בממון
גוגל גלאס- כתבה בממון
 
P2 2-jochen rode
P2 2-jochen rodeP2 2-jochen rode
P2 2-jochen rode
 
Sumit Dutta Chowdhury: Internet of Things in Manufacturing
Sumit Dutta Chowdhury: Internet of Things in ManufacturingSumit Dutta Chowdhury: Internet of Things in Manufacturing
Sumit Dutta Chowdhury: Internet of Things in Manufacturing
 
Internet of Things, wearable devices and the connected life
Internet of Things, wearable devices and the connected lifeInternet of Things, wearable devices and the connected life
Internet of Things, wearable devices and the connected life
 
Intimate Things: How Wearables Are Changing The Internet of Things
Intimate Things: How Wearables Are Changing The Internet of ThingsIntimate Things: How Wearables Are Changing The Internet of Things
Intimate Things: How Wearables Are Changing The Internet of Things
 
From IoT to wearable @ CETIC M2M/UNB
From IoT to wearable @ CETIC M2M/UNBFrom IoT to wearable @ CETIC M2M/UNB
From IoT to wearable @ CETIC M2M/UNB
 
NTK 2015: Internet of things track (IoT) - Smart Home
NTK 2015: Internet of things track (IoT) - Smart HomeNTK 2015: Internet of things track (IoT) - Smart Home
NTK 2015: Internet of things track (IoT) - Smart Home
 
Trends in Sensors, Wearable Devices and IoT
Trends in Sensors, Wearable Devices and IoTTrends in Sensors, Wearable Devices and IoT
Trends in Sensors, Wearable Devices and IoT
 
Sensors, Wearables and the Internet of Things: A Revolution in the Making
Sensors, Wearables and the Internet of Things: A Revolution in the MakingSensors, Wearables and the Internet of Things: A Revolution in the Making
Sensors, Wearables and the Internet of Things: A Revolution in the Making
 
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
 

Similar to Person Centric IoT

Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product OverviewCruatech
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesWavestone
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Bernard Kufluk
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Clever Consulting
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
Insurance Industry Trends in 2015: #2 Mobility
Insurance Industry Trends in 2015: #2 Mobility Insurance Industry Trends in 2015: #2 Mobility
Insurance Industry Trends in 2015: #2 Mobility Euro IT Group
 
A case study on BFSI and healthcare
A case study on BFSI and healthcare A case study on BFSI and healthcare
A case study on BFSI and healthcare Anubhuti Pandey
 
Integrated killer applications for connected insurance
Integrated killer applications for connected insurance Integrated killer applications for connected insurance
Integrated killer applications for connected insurance Andrea Silvello
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD Worldmkeane
 
Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Huntsman Security
 

Similar to Person Centric IoT (20)

Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product Overview
 
Minder Product Demo
Minder Product DemoMinder Product Demo
Minder Product Demo
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
The Internet of Things -IOT
The Internet of Things -IOTThe Internet of Things -IOT
The Internet of Things -IOT
 
Topic 7
Topic 7Topic 7
Topic 7
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devices
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)Building the internet of things with ibm (slideshare)
Building the internet of things with ibm (slideshare)
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Insurance Industry Trends in 2015: #2 Mobility
Insurance Industry Trends in 2015: #2 Mobility Insurance Industry Trends in 2015: #2 Mobility
Insurance Industry Trends in 2015: #2 Mobility
 
A case study on BFSI and healthcare
A case study on BFSI and healthcare A case study on BFSI and healthcare
A case study on BFSI and healthcare
 
Integrated killer applications for connected insurance
Integrated killer applications for connected insurance Integrated killer applications for connected insurance
Integrated killer applications for connected insurance
 
Ravi i ot-impact
Ravi i ot-impactRavi i ot-impact
Ravi i ot-impact
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)
 

More from Niv Calderon

What Does an IoT App Looks Like / Wearable Valley Meetup Ronnie Dan @Cisco
What Does an IoT App Looks Like / Wearable Valley Meetup Ronnie Dan @CiscoWhat Does an IoT App Looks Like / Wearable Valley Meetup Ronnie Dan @Cisco
What Does an IoT App Looks Like / Wearable Valley Meetup Ronnie Dan @CiscoNiv Calderon
 
Logic and list of projects- Firewall
Logic and list of projects- FirewallLogic and list of projects- Firewall
Logic and list of projects- FirewallNiv Calderon
 
Why I Started Wearable Valley
Why I Started Wearable ValleyWhy I Started Wearable Valley
Why I Started Wearable ValleyNiv Calderon
 
FROM CAPTAIN KIRK TO CAPTAIN PICARD- THE WEARABLES OF THE STARSHIP ENTERPRISE
FROM CAPTAIN KIRK TO CAPTAIN PICARD- THE WEARABLES OF THE STARSHIP ENTERPRISEFROM CAPTAIN KIRK TO CAPTAIN PICARD- THE WEARABLES OF THE STARSHIP ENTERPRISE
FROM CAPTAIN KIRK TO CAPTAIN PICARD- THE WEARABLES OF THE STARSHIP ENTERPRISENiv Calderon
 
הזנב הארוך מקבל תעודת לעמ | ניב קלדרון 2011
הזנב הארוך מקבל תעודת לעמ | ניב קלדרון 2011הזנב הארוך מקבל תעודת לעמ | ניב קלדרון 2011
הזנב הארוך מקבל תעודת לעמ | ניב קלדרון 2011Niv Calderon
 
Being in a State of Innovation | Niv Calderon
Being in a State of Innovation | Niv CalderonBeing in a State of Innovation | Niv Calderon
Being in a State of Innovation | Niv CalderonNiv Calderon
 
Engagement Strategies During Crisis
Engagement Strategies During CrisisEngagement Strategies During Crisis
Engagement Strategies During CrisisNiv Calderon
 
Design a community & kick ass
Design a community & kick assDesign a community & kick ass
Design a community & kick assNiv Calderon
 
Design a community- Niv Calderon
Design a community- Niv CalderonDesign a community- Niv Calderon
Design a community- Niv CalderonNiv Calderon
 
Social media marketing- Organizations
Social media marketing- Organizations  Social media marketing- Organizations
Social media marketing- Organizations Niv Calderon
 
Public Diplomacy Disrupted- Niv calderon
Public Diplomacy Disrupted- Niv calderonPublic Diplomacy Disrupted- Niv calderon
Public Diplomacy Disrupted- Niv calderonNiv Calderon
 
שולמית אפפל 7 לילות
שולמית אפפל 7 לילותשולמית אפפל 7 לילות
שולמית אפפל 7 לילותNiv Calderon
 
דקה 5 לעיתונות
דקה 5 לעיתונותדקה 5 לעיתונות
דקה 5 לעיתונותNiv Calderon
 
Social Media Marketing
Social Media MarketingSocial Media Marketing
Social Media MarketingNiv Calderon
 

More from Niv Calderon (16)

What Does an IoT App Looks Like / Wearable Valley Meetup Ronnie Dan @Cisco
What Does an IoT App Looks Like / Wearable Valley Meetup Ronnie Dan @CiscoWhat Does an IoT App Looks Like / Wearable Valley Meetup Ronnie Dan @Cisco
What Does an IoT App Looks Like / Wearable Valley Meetup Ronnie Dan @Cisco
 
Test
TestTest
Test
 
עתידנות
עתידנותעתידנות
עתידנות
 
Logic and list of projects- Firewall
Logic and list of projects- FirewallLogic and list of projects- Firewall
Logic and list of projects- Firewall
 
Why I Started Wearable Valley
Why I Started Wearable ValleyWhy I Started Wearable Valley
Why I Started Wearable Valley
 
FROM CAPTAIN KIRK TO CAPTAIN PICARD- THE WEARABLES OF THE STARSHIP ENTERPRISE
FROM CAPTAIN KIRK TO CAPTAIN PICARD- THE WEARABLES OF THE STARSHIP ENTERPRISEFROM CAPTAIN KIRK TO CAPTAIN PICARD- THE WEARABLES OF THE STARSHIP ENTERPRISE
FROM CAPTAIN KIRK TO CAPTAIN PICARD- THE WEARABLES OF THE STARSHIP ENTERPRISE
 
הזנב הארוך מקבל תעודת לעמ | ניב קלדרון 2011
הזנב הארוך מקבל תעודת לעמ | ניב קלדרון 2011הזנב הארוך מקבל תעודת לעמ | ניב קלדרון 2011
הזנב הארוך מקבל תעודת לעמ | ניב קלדרון 2011
 
Being in a State of Innovation | Niv Calderon
Being in a State of Innovation | Niv CalderonBeing in a State of Innovation | Niv Calderon
Being in a State of Innovation | Niv Calderon
 
Engagement Strategies During Crisis
Engagement Strategies During CrisisEngagement Strategies During Crisis
Engagement Strategies During Crisis
 
Design a community & kick ass
Design a community & kick assDesign a community & kick ass
Design a community & kick ass
 
Design a community- Niv Calderon
Design a community- Niv CalderonDesign a community- Niv Calderon
Design a community- Niv Calderon
 
Social media marketing- Organizations
Social media marketing- Organizations  Social media marketing- Organizations
Social media marketing- Organizations
 
Public Diplomacy Disrupted- Niv calderon
Public Diplomacy Disrupted- Niv calderonPublic Diplomacy Disrupted- Niv calderon
Public Diplomacy Disrupted- Niv calderon
 
שולמית אפפל 7 לילות
שולמית אפפל 7 לילותשולמית אפפל 7 לילות
שולמית אפפל 7 לילות
 
דקה 5 לעיתונות
דקה 5 לעיתונותדקה 5 לעיתונות
דקה 5 לעיתונות
 
Social Media Marketing
Social Media MarketingSocial Media Marketing
Social Media Marketing
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Person Centric IoT

  • 1. Person Centric IoT Dr. Asaf Adi Senior Manager, IoT and Wearables adi@il.ibm.com
  • 2. Please Note: 1 •  IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. •  Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. •  The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. •  The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. •  Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.
  • 3. Please Note: 2 At this time, we request that all smart phones, smart watches, smart glasses, smart-hats, wristbands, headbands, shoes, vests, tags, and swallowed pills be turned off for the full duration of the presentation... ☺
  • 4. The Human Experience is Transforming •  We expect new ways to interact with all the forms of computing systems •  We expect computing systems to understand us and do things for us automatically •  We expect computing systems to engage us everywhere at the right time, in the right way and with the right content, utilizing all possible information sources •  We expect that everything will seamlessly work together 3 By Wearable, Mobile, and IoT
  • 5. Wearables Transform Industries Always on, Hands Free, New Sensors 4 Engaging CustomersTransforming Professions Field worker safety Emergency response Payments Pay as you live insurance Customer service Customer loyaltySmart care team Amusement parks Smart conference Field worker effectiveness Healthcare and Home caring Wellness
  • 6. Customer Service •  Virgin Atlantic tries greeting its passengers using wearable tech 5 http://www.virgin-atlantic.com/gb/en/footer/media-centre/ press-releaseR/google-glass.html
  • 7. Customer Interactions •  Disney MagicBands are innovative all-in-one devices that guests can use to enter Disney theme parks, unlock their Disney Resort hotel room, use the FastPass+ entrance for attractions and entertainment experiences, make payments at shops and restaurants, and link Disney PhotoPass photos to their Disney account. 6
  • 8. Customer Engagement •  L'Oreal My UV Patch •  L’Oreal Makeup Genius 7
  • 9. Pay Bands •  Wristband / smart watch for customer authentication and payment means at point of sale – Secure with biometric authentication – Alternative/complimentary to credit-card / debit / gift-card (pre-charged) •  “Parenting mode” – control your family devices. •  Restrict expenses per event / location. 8
  • 10. Pay How You Live Insurance •  Oscar clients can opt to receive a free Misfit wristband pedometer that will connect automatically to Oscar’s app. Once set up, the Oscar Misfit will pay you to walk. Each day you get a new target for the number of steps to take. Hit the goal and earn a buck—do it 20 times, and you get an Amazon $20 gift card (up to $240 a year). 9
  • 11. Pay How You Drive Insurance •  Progressive® Insurance teams up with Zubie to reward safe drivers. It works by giving Progressive users the Zubie plug- in device, have them drive with it for six months, then offer them a new insurance rate based on their driving habits. •  Censio, which makes an app that uses smartphone data to track user driver habits, has also teamed up with Progressive to share user data with the insurer. 10
  • 13. Health and Remote Patient Monitoring 12 VitalConnect DoulaRoom Medtronic and Watson Health
  • 14. Why am I Here ?
  • 15. IBM Smart Glasses – 1997 14
  • 16. IBM Smart Watch – 2000 15
  • 17. Wearables are booming 200 M People will use wearable devices that measure their heart rates by 2018 [1] 30% of Corp Wellness Programs will capture biometric data about employees by 2016 [1] 5% of Enterprise Sales driven by consumer data collected from wearable devices by 2020 [2] Exceeding 12 B devices by 2020 the combined market for wearable devices, led by devices worn on the wrist [2] 16 [1] Gartner, Top 10 Strategic Predictions for 2015 and Beyond: Digital Business Is Driving 'Big Change’ [2] Gartner, Predicts 2014: The Business Impact of the 'SMART' Technologies
  • 18. A short survey How many of you are entrepreneurs in wearable / IoT ? 17
  • 19. A short survey How many of you target the enterprise (vs. consumer) as their main customer ? 18
  • 21. Workplace injuries and illness cost the US $190 billion •  $55.4 billion direct costs •  27M working days lost •  4,628 Fatal work injuries •  Wearables technologies presents a new opportunity for reducing workplace death and injuries –  Non intrusive, enabling hands-free work –  Always-on –  Employee- and environment-aware –  Connected –  Attention-getting 20 http://www.libertymutualgroup.com/omapps/ContentServer?cid=1138365240689&pagename=LMGResearchInstitute/cms_document/ShowDoc&c=cms_document http://www.bls.gov/iif/oshwc/cfoi/cfoi_revised12.pdf http://www.epi.org/blog/250b-costs-occupational-injury-illness-exceed/
  • 22. Can you find the safety risks ? Photo taken from IBM building in Bois Colombes, France 21
  • 23. Can you find the safety risks ? Photo taken from IBM building in Bois Colombes, France 22
  • 24. Your employees’ Guardian Angel IBM Employee Safety Solution works as your personal protective application. It allows intuitive specification of “shields” that govern the personal wellness and safety of their owner, detect hazard and notify employees and supervisors 23 Hazards Detection GPS Sensor: Location BLE/ANT+ / CPU Accelerometer: Speed-X Speed-Y Speed-Z Bio-sensing: Heart-rate Body temperature Environmental-sensing: Temperature Light Noise Oxygen deficiency Carbon monoxide Alert Employee Inform Supervisor and Emergency Center Broadcast message to nearby employees IBM Employee Safety •  Excessive lifting, pushing, carrying •  Fatigue •  Alertness •  Dehydration •  Fall / Injury •  Use of safety equip
  • 25. Use Case – Heat Stress •  Continuously monitor the worker’s body temperature, heart rate, and level of activity, correlated with external sources of ambient temperature and humidity. – Personalized Heat Stress risk levels – Heat Stress hazards alerts 24 Energy, HR, Skin temp, GSR Temp, Humidity Movement
  • 26. IBM Employee Safety Solution benefits IBM Employee Safety helps companies protect themselves and their employees from the financial loss and human cost of workplace injuries. Real-time analytics •  Prevent workplace accidents and injuries before they happen –  Validate compliance to safety guidelines and regulation –  Predictive alerts to employees and supervisors •  Expedite emergency response in case of accidents –  Notifying emergency response and near-by employees Off-line analytics •  Identify the “near-misses” and almost accidents –  Continuously improve safety guidelines and regulations via learning •  Employee personalization 25
  • 29. Wearables can not work alone •  Brain - most devices have zero to very little processing power, memory, storage, and battery •  Engagement – multi modal interactions for seamless integrated user experience between wearables, mobile, and IoT •  Connectivity – most devices have only low range connectivity 28
  • 30. Wearable can not always rely on the cloud •  Performance – Many applications requires near-real- time processing – Local processing is required to minimize latency •  Connectivity – Need to operate in remote locations, including rural areas underground and in the sea •  Reliability – Safety & Healthcare applications require high availability – Can’t count on network & server availability •  Efficiency – Devices may generate hundreds of events every second, most are irrelevant for server processing – Transmitting this amount of data overloads the communication and the server •  Power consumption – Transmitting this amount of data drains the batteries •  Privacy – Part of the data needs to be securely handled and in some case obfuscated 29
  • 31. The wearable platform – the new I/O for cognitive Wearable-enabled enterprise solution use the compute power of the smartphone to •  Interpret raw data from Wearables into meaningful insight that can be acted upon. •  Enable multi modal interactions for seamless integrated user experience between wearables and mobile devices 30
  • 32. Privacy •  Privacy Principles – Data subject (person) has the right to be informed when his personal data is being processed. •  Consent - Data may be processed only when the data subject has given his consent, is necessary for a contract, needed for compliance with a legal obligation, or is necessary for a task carried out for public interest – Only for legitimate purposes •  Proportionality - The data processed and the time for which it is stored should be no more than required for the stated purpose •  Marketing Opt-out - The data subject can object at any time to the use of personal data for direct marketing purposes 31
  • 33. The Human Experience is Transforming •  We expect new ways to interact with all the forms of computing systems •  We expect computing systems to understand us and do things for us automatically •  We expect computing systems to engage us everywhere at the right time, in the right way and with the right content, utilizing all possible information sources •  We expect that everything will seamlessly work together 32 By Wearable, Mobile, and IoT
  • 34. Notices and Disclaimers 33 Copyright © 2016 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law
  • 35. Notices and Disclaimers Con’t. 34 Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained h erein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. IBM, the IBM logo, ibm.com, Aspera®, Bluemix, Blueworks Live, CICS, Clearcase, Cognos®, DOORS®, Emptoris®, Enterprise Document Management System™, FASP®, FileNet®, Global Business Services ®, Global Technology Services ®, IBM ExperienceOne™, IBM SmartCloud®, IBM Social Business®, Information on Demand, ILOG, Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower, PureAnalytics™, PureApplication®, pureCluster™, PureCoverage®, PureData®, PureExperience®, PureFlex®, pureQuery®, pureScale®, PureSystems®, QRadar®, Rational®, Rhapsody®, Smarter Commerce®, SoDA, SPSS, Sterling Commerce®, StoredIQ, Tealeaf®, Tivoli®, Trusteer®, Unica®, urban{code}®, Watson, WebSphere®, Worklight®, X-Force® and System z® Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.