SlideShare a Scribd company logo
1 of 47
1 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
5 Things Your Content Engineer Wants
You to Know About the Internet of
Things
Matt Balogh
Sr. Director, Content Engineer
2 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Disclaimer
The views expressed here do not necessarily
reflect the views or opinions of my employer.
All views and examples are my own.
3 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
1999
Software
Developer
At a digital pharma
agency working
global clients
programming in
about a dozen
languages
2013
Smart Home
Became very
interested in IoT,
data, and machine
learning, started
building arduino
“things”
2008
MBA / CTO
Back to school to
get an MBA,
became CTO &
Innovation Lead at
a global pharma
agency
2016
Content
Engineer
Leverage data and
technology to
make content
more efficient and
useful
Geek-O-Meter
2005
Data / CRM
Ended up building
CRM systems for
IBM, and doing
CRM for THD,
where I really fell
in love with data
1990’s
Computer
Science
Went to school for
Computer Science,
ended up putting
the computer
centers online
5 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
”1,000 orcs attack the castle”
6 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
”1,000 orcs pirates attack the castle”
7 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Weeks of coding saves hours of
planning
8 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Your IoT strategy will guide your
technology and analytics decisions
9 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
5 Things
2 Longevity & ReliabilityData & Connectivity1
Security3 Interactivity4
Timing & the Marketplace5
10 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
1 Data & Connectivity
11 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Application Interface
The interface between your virtual thing and the
triggers and decisions you’ll make with it.
Cloud
The virtual/data representation of your thing is core
to connecting it to the world
Base
Will you connect directly (WiFi) or will you use a hub-
and-spoke base?
Sensor
How will the sensor sense the data you want and
communicate that back to the Thing?
Too complex for a light switch? Fast enough for the brakes on your car?
Connectivity
Integration & Automation
The end resulting automation from their thing.
12 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Data
HOW WELL DO YOU KNOW
YOUR DATA?:
Data is what the IoT is all about, so if you haven’t
considered your data at a very granular level,
you’ve missed the boat.
Data Standards
It is important to set and maintain data
standards that are strict but flexible
Precision
Clinical trials require more accuracy, more
frequently then public health initiatives.
Kind of Data
There are lots of kinds of data, from visual to
various sensors or logs.
Data Integration
What is the context that will make your data
relevant to your need, and how will you
integrate that context?
13 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Begin With the Analytics Report In Mind
USAGE GIVES DATA CONTEXT:
Consider what data you need, how and were you
will collect it, and most importantly how it will be
used.
Private Data
Data that is encrypted, transferred, and stored
in a secure way for limited access.
Public Data
Open data that may be anonymized. Often
subject to high-volume usage.
Shared Data
To what degree with data be shared and tracked,
with whom, and under what conditions?
Think About How the Data Will Be Used
Data Automation
Some data is not for consumption, with the
focus being on triggering or logging events.
14 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Longevity & Reliability
2
15 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Relating Data, Connectivity, and
Longevity
data
power
Small & Infrequent
Large & frequent
A little
Close & slow
Far & fast
A lot
Data
In the small world of IoT consider
what you need vs. what you want.
Connectivity
How much data do you plan to send,
how far, and how often?
Power
Consider the power source vs. the
longevity of the device.
Source: Hari Balakrishnan, MIT CSAIL, Internet of Things: Roadmap to a Connected World
16 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
THE IOT TRADE-OFF:
In technology you can get what you want,
but you’ll have to give something else up
17 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Reliability: The Technology Bathtub
FailureRate
TimePre-Life
Failure Prevention
Design for:
• Reliability
• Availability
• Serviceability
• Manageability
• Safety
• Manufacturability
• Testability
• Shipping
• Deployment
• Security
Early Life
Failure Mechanisms
• Manufacturing
• Shipping
• Storage
• Installation
• Configuration
• Deployment
Useful Life
Failure Mechanisms
• Random chance
• User error
• Environmental change
Wear Out
Failure Mechanisms
• Moving parts
• Hard drives
• Fans
• Batteries
• Capacitors
• Memory
• Connectors
Source: National Instruments, ni.com
18 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
RELIABILITY:
Think about the decisions you will make with
IoT data and the consequences of failure
19 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
2 years +/-
2-4 years
5-10 years
?
?
?
Longevity
How long do you expect the IoT device to last?
Source: Consumer Intelligence Research Partners
Television
Smartphone
Obsolete or stops working
Watch
Computer
Performance issues
Vehicle
Door lock
20 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Security
3
23 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Largest DDoS Hack in History
• October 2016
• 100k+ Mirai-infected IoT devices
• Took out Twitter, Amazon, Reddit,
Spotify, and Netflix
• Now in nearly 200 countries on 500k
devices
• How’d they do it?
• “admin”, “password”, “123456”
Source: motherboard.vice.com)
24 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Non-Traditional “Hacking”
25 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Contextual Security
DIGITAL TWIN:
IoT has the unique characteristic of linking the
hardware, the software, and the data.
For each physical object and sensor there is a
near real-time virtual companion.
As a result, security must take into consideration
each of these dimensions.
Software
Traditional target for “hacking”, needs to consider
encryption, passwords, transmission.
Data & Digital Twin
The virtual representation of the physical world,
consider how this will integrate with other virtual
assets.
Hardware & Sensors
The physical representation of the IoT, consider the
impact of a lost, broken, or compromised sensor.
26 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
IoT security focuses on hardware, software,
data, and the accuracy of the physical
world they represent
27 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Interactivity
4
28 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
IoT Interactions
Admin Interface
Administrative interface for
configuration, updating,
repairing, and monitoring
User Interface
Bi-directional interactions
between humans and machines
Application Interface
Implementation abstraction for
building and integrating with
systems and applications.
29 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
DiagnoseRepair
InstallMonitor
ConfigureReplace
06 01
02
0304
05Install
Configure
Diagnose
Repair
Replace
Monitor
Administration Considerations
30 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Application Interface
WHAT’S AN API?
Just as a graphical user interface makes it
easier for people to use programs, application
programming interfaces make it easier to
integrate data and technologies by
abstracting the underlying implementation
and only exposing necessary objects or
actions
Private
Internal organizational usage.
Public
For generalized public consumption to
leverage the application and its data.
Partner
Open only to specified business partners
allowing for greater control and support.
31 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Human
The goal of this interaction is to allow effective
operation and control of the machine
Machine
The computer simultaneously feeds back information
that aids the operators' decision-making process.
User Interface
Interactions between humans and machines
32 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Timing & the Marketplace
5
33 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Forces Affecting IoT
Technology
Policy
People
34 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Devices
Routers
Protocols
Cloud
Platforms
Services
Batteries
Sensors
AI
Storage
Technology
Technology is moving faster than people and much faster than policy.
Machine
Learning
37 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Technology Life Cycle Path
Also called the Technology S-Curve, and the Innovation Adoption Life Cycle
R&D
BusinessGain
Time
Maturity
Vital Life
2.5% 13.5% 34% 34% 13.5% 2.5%
Innovators
Early
Adopters
Early
Majority
Late
Majority
Laggards
Laggards
Source: Wikipedia.org
38 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Technology Life Cycle Path
Also called the Technology S-Curve, and the Innovation Adoption Life Cycle
R&D
BusinessGain
Time
Maturity
Vital Life
2.5% 13.5% 34% 34% 13.5% 2.5%
Innovators
Early
Adopters
Early
Majority
Late
Majority
Laggards
Laggards
Source: Wikipedia.org
MarketShare%
0%
50%
25%
75%
100%
39 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Technology Life Cycle Path
Also called the Technology S-Curve, and the Innovation Adoption Life Cycle
Source: Wikipedia.org
40 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Technology Life Cycle Path
Also called the Technology S-Curve, and the Innovation Adoption Life Cycle
Source: Wikipedia.org
Awareness
Trial Use
Internalization
Contact
Understanding
Adoption
Institutionalization
Awareness
Trial Use
Contact
Understanding
Adoption
Institutionalization
42 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Gartner Hype Cycle for Emerging Technologies, 2016
From “Hype Cycle for Emerging Technologies, 2016”, 19 July 2016 (G00299839)
43 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Gartner Hype Cycle for Emerging Technologies, 2016
From “Hype Cycle for Emerging Technologies, 2016”, 19 July 2016 (G00299839)
44 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Technology Life Cycle Path
Also called the Technology S-Curve, and the Innovation Adoption Life Cycle
R&D
BusinessGain
Time
Maturity
Vital Life
2.5% 13.5% 34% 34% 13.5% 2.5%
Innovators
Early
Adopters
Early
Majority
Late
Majority
Laggards
Laggards
Source: Wikipedia.org
45 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Technology Life Cycle Path
Also called the Technology S-Curve, and the Innovation Adoption Life Cycle
Source: Wikipedia.org
Awareness
Trial Use
Internalization
Contact
Understanding
Adoption
Institutionalization
47 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Policies
International, federal, state,
organization and public polices
will all affect IoT regulation,
which will influence what you
can do and how you will do it
Government
NOAA weather and
environmental data affects
30% of the GDP, with the
Global Positioning System
creating even more private
innovations and public benefit.
Today the HHS is doing this
with the Health Data Initiative
and other programs
Internal Corporate
Companies, especially global
organizations, need to consider
and document policies on data
collection, transmission,
retention, releases and privacy
policies.
Individual initiatives must
determine and document how
data will be collected and used.
External Corporate
Though it has “Internet” in the
name, IoT is not a government
funded program, with many of
the protocols and technologies
being proprietary.
It is important consider the
land on which you build your
house.
48 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
PEOPLE:
You are not your audience. Get out of the
conference room, test, and iterate
49 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
People
You are not your audience.
02
01
03
04
IoT is complex and new
Technology = adherence
Rapid prototyping & iterations
What should a prototype do?
50 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Anticipation
The anticipated desired state.
Action
The specific activity we want to
incentivize
Reward
Just like it sounds, a reward for doing
a specific activity
Gaming
Core Loop
The Right Questions
• Will people use it?
• Will they keep using it?
• Will you get what you need?
Ask the Right Questions
• Wireframes are not
prototypes
• Don’t start with a design
question
Core Loops
The main set of actions, typically three, that will make both you and your users successful.
Source: Mariya Yao, Xanadu Mobile
Source: Gamification of work 2013, via gameanalytics.com
51 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Anticipation
The anticipated desired state.
Action
The specific activity we want to
incentivize
Reward
Just like it sounds, a reward for doing
a specific activity
FitBit
Core Loop
The Right Questions
• Will people use it?
• Will they keep using it?
• Will you get what you need?
Ask the Right Questions
• Wireframes are not
prototypes
• Don’t start with a design
question
Core Loops
The main set of actions, typically three, that will make both you and your users successful.
Source: Mariya Yao, Xanadu Mobile
Source: Gamification of work 2013, via gameanalytics.com
52 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
5 Things
2 Longevity & ReliabilityData & Connectivity1
Security3 Interactivity4
Timing & the Marketplace5
53 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
Weeks of coding saves hours of
planning
54 @mbalogh
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh
matt.balogh@gmail.comMatt Balogh,
Content Engineer
@mbalogh
Thank You.
Matthew Balogh
Sr. Director, Content Engineering
Matt.balogh@gmail.com
MatthewBalogh.com
RxDigitalMarketing.com
linkedin.com/in/mattbalogh
slideshare.net/MatthewBalogh

More Related Content

What's hot

2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...Raj Goel
 
IoT - Data Management Trends, Best Practices, & Use Cases
IoT - Data Management Trends, Best Practices, & Use CasesIoT - Data Management Trends, Best Practices, & Use Cases
IoT - Data Management Trends, Best Practices, & Use CasesCloudera, Inc.
 
Big data security
Big data securityBig data security
Big data securityCloudBees
 
IDERA Live | Mitigating Data Risks from Cloud to Ground
IDERA Live | Mitigating Data Risks from Cloud to GroundIDERA Live | Mitigating Data Risks from Cloud to Ground
IDERA Live | Mitigating Data Risks from Cloud to GroundIDERA Software
 
Becoming your customer's security partner in the digital age
Becoming your customer's security partner in the digital ageBecoming your customer's security partner in the digital age
Becoming your customer's security partner in the digital ageExponential_e
 
SapientNitro Strata_presentation_upload
SapientNitro Strata_presentation_uploadSapientNitro Strata_presentation_upload
SapientNitro Strata_presentation_uploadOReillyStrata
 
Discover 7 Technology Trends To Watch For 2019
Discover 7 Technology Trends To Watch For 2019Discover 7 Technology Trends To Watch For 2019
Discover 7 Technology Trends To Watch For 2019Maxtra Technologies
 
Better Business From Exploring Ideas - AWS Summit Sydney 2018
Better Business From Exploring Ideas - AWS Summit Sydney 2018Better Business From Exploring Ideas - AWS Summit Sydney 2018
Better Business From Exploring Ideas - AWS Summit Sydney 2018Amazon Web Services
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowMapR Technologies
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51Felipe Prado
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014Irene Ventayol
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyClaudiu Popa
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Allot Communications
 
Cloud Computing Panel - NYCLA
Cloud Computing Panel - NYCLACloud Computing Panel - NYCLA
Cloud Computing Panel - NYCLARaj Goel
 
Internet of Things - Asked and Answered
Internet of Things - Asked and AnsweredInternet of Things - Asked and Answered
Internet of Things - Asked and AnsweredADCBarcode
 
Digital analytics & privacy: it's not the end of the world
Digital analytics & privacy: it's not the end of the worldDigital analytics & privacy: it's not the end of the world
Digital analytics & privacy: it's not the end of the worldOReillyStrata
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
Design and Implementation of algorithm for detecting sensitive data leakage i...
Design and Implementation of algorithm for detecting sensitive data leakage i...Design and Implementation of algorithm for detecting sensitive data leakage i...
Design and Implementation of algorithm for detecting sensitive data leakage i...dbpublications
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinSridhar Karnam
 
3-part approach to turning IoT data into business power
 3-part approach to turning IoT data into business power 3-part approach to turning IoT data into business power
3-part approach to turning IoT data into business powerAbhishek Sood
 

What's hot (20)

2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
2017-01-23-Regulatory Compliance Watch - 6 Cybersecurity for Financial Servic...
 
IoT - Data Management Trends, Best Practices, & Use Cases
IoT - Data Management Trends, Best Practices, & Use CasesIoT - Data Management Trends, Best Practices, & Use Cases
IoT - Data Management Trends, Best Practices, & Use Cases
 
Big data security
Big data securityBig data security
Big data security
 
IDERA Live | Mitigating Data Risks from Cloud to Ground
IDERA Live | Mitigating Data Risks from Cloud to GroundIDERA Live | Mitigating Data Risks from Cloud to Ground
IDERA Live | Mitigating Data Risks from Cloud to Ground
 
Becoming your customer's security partner in the digital age
Becoming your customer's security partner in the digital ageBecoming your customer's security partner in the digital age
Becoming your customer's security partner in the digital age
 
SapientNitro Strata_presentation_upload
SapientNitro Strata_presentation_uploadSapientNitro Strata_presentation_upload
SapientNitro Strata_presentation_upload
 
Discover 7 Technology Trends To Watch For 2019
Discover 7 Technology Trends To Watch For 2019Discover 7 Technology Trends To Watch For 2019
Discover 7 Technology Trends To Watch For 2019
 
Better Business From Exploring Ideas - AWS Summit Sydney 2018
Better Business From Exploring Ideas - AWS Summit Sydney 2018Better Business From Exploring Ideas - AWS Summit Sydney 2018
Better Business From Exploring Ideas - AWS Summit Sydney 2018
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬
 
Cloud Computing Panel - NYCLA
Cloud Computing Panel - NYCLACloud Computing Panel - NYCLA
Cloud Computing Panel - NYCLA
 
Internet of Things - Asked and Answered
Internet of Things - Asked and AnsweredInternet of Things - Asked and Answered
Internet of Things - Asked and Answered
 
Digital analytics & privacy: it's not the end of the world
Digital analytics & privacy: it's not the end of the worldDigital analytics & privacy: it's not the end of the world
Digital analytics & privacy: it's not the end of the world
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Design and Implementation of algorithm for detecting sensitive data leakage i...
Design and Implementation of algorithm for detecting sensitive data leakage i...Design and Implementation of algorithm for detecting sensitive data leakage i...
Design and Implementation of algorithm for detecting sensitive data leakage i...
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
3-part approach to turning IoT data into business power
 3-part approach to turning IoT data into business power 3-part approach to turning IoT data into business power
3-part approach to turning IoT data into business power
 

Viewers also liked

Actividad 13 módulo 3 wilfrent rueda arango
Actividad 13 módulo 3 wilfrent rueda arangoActividad 13 módulo 3 wilfrent rueda arango
Actividad 13 módulo 3 wilfrent rueda arangoWilfrent Rueda Arango
 
Words + Pictures: Content Marketer’s Guide to Visual Storytelling | Annotat...
Words + Pictures: Content Marketer’s Guide to Visual Storytelling | Annotat...Words + Pictures: Content Marketer’s Guide to Visual Storytelling | Annotat...
Words + Pictures: Content Marketer’s Guide to Visual Storytelling | Annotat...Buddy Scalera
 
The Microsoft platform for education analytics (mpea)
The Microsoft platform for education analytics (mpea)The Microsoft platform for education analytics (mpea)
The Microsoft platform for education analytics (mpea)Willy Marroquin (WillyDevNET)
 
9 claves de la Ley de Cestaticket Socialista
9 claves de la Ley de Cestaticket Socialista9 claves de la Ley de Cestaticket Socialista
9 claves de la Ley de Cestaticket SocialistaNayma Consultores
 
Redbrick safety sneakers Redbrick veiligheidsschoenen - werkschoenen by woltex
Redbrick safety sneakers Redbrick veiligheidsschoenen - werkschoenen by woltexRedbrick safety sneakers Redbrick veiligheidsschoenen - werkschoenen by woltex
Redbrick safety sneakers Redbrick veiligheidsschoenen - werkschoenen by woltexWoltex.nl
 
Do you get alerts before your contracts expire
Do you get alerts before your contracts expireDo you get alerts before your contracts expire
Do you get alerts before your contracts expirePractice-League
 
8 Places to use Keywords on Your Website
8 Places to use Keywords on Your Website8 Places to use Keywords on Your Website
8 Places to use Keywords on Your WebsiteWired Flare
 
Patterson Boulevard Canal Parkway - Before and After
Patterson Boulevard Canal Parkway - Before and AfterPatterson Boulevard Canal Parkway - Before and After
Patterson Boulevard Canal Parkway - Before and AfterCity of Dayton
 
Iva Natura- Kozmetik sektörünün dünü, bugünü ve yarını
Iva Natura- Kozmetik sektörünün dünü, bugünü ve yarınıIva Natura- Kozmetik sektörünün dünü, bugünü ve yarını
Iva Natura- Kozmetik sektörünün dünü, bugünü ve yarınıIVA NATURA
 
NSPCC Silent Auction Sponsored by GB Consultancy UK Ltd
NSPCC Silent Auction Sponsored by GB Consultancy UK LtdNSPCC Silent Auction Sponsored by GB Consultancy UK Ltd
NSPCC Silent Auction Sponsored by GB Consultancy UK LtdGary Boys
 
APPRAISAL OF GROUND WATER CHARACTERISTICS AND WATER QUALITY INDEX OF RICH IRO...
APPRAISAL OF GROUND WATER CHARACTERISTICS AND WATER QUALITY INDEX OF RICH IRO...APPRAISAL OF GROUND WATER CHARACTERISTICS AND WATER QUALITY INDEX OF RICH IRO...
APPRAISAL OF GROUND WATER CHARACTERISTICS AND WATER QUALITY INDEX OF RICH IRO...AM Publications
 

Viewers also liked (14)

Actividad 13 módulo 3 wilfrent rueda arango
Actividad 13 módulo 3 wilfrent rueda arangoActividad 13 módulo 3 wilfrent rueda arango
Actividad 13 módulo 3 wilfrent rueda arango
 
Words + Pictures: Content Marketer’s Guide to Visual Storytelling | Annotat...
Words + Pictures: Content Marketer’s Guide to Visual Storytelling | Annotat...Words + Pictures: Content Marketer’s Guide to Visual Storytelling | Annotat...
Words + Pictures: Content Marketer’s Guide to Visual Storytelling | Annotat...
 
The Microsoft platform for education analytics (mpea)
The Microsoft platform for education analytics (mpea)The Microsoft platform for education analytics (mpea)
The Microsoft platform for education analytics (mpea)
 
9 claves de la Ley de Cestaticket Socialista
9 claves de la Ley de Cestaticket Socialista9 claves de la Ley de Cestaticket Socialista
9 claves de la Ley de Cestaticket Socialista
 
Smallbizhouston Company Ppt
Smallbizhouston Company PptSmallbizhouston Company Ppt
Smallbizhouston Company Ppt
 
Redbrick safety sneakers Redbrick veiligheidsschoenen - werkschoenen by woltex
Redbrick safety sneakers Redbrick veiligheidsschoenen - werkschoenen by woltexRedbrick safety sneakers Redbrick veiligheidsschoenen - werkschoenen by woltex
Redbrick safety sneakers Redbrick veiligheidsschoenen - werkschoenen by woltex
 
Do you get alerts before your contracts expire
Do you get alerts before your contracts expireDo you get alerts before your contracts expire
Do you get alerts before your contracts expire
 
8 Places to use Keywords on Your Website
8 Places to use Keywords on Your Website8 Places to use Keywords on Your Website
8 Places to use Keywords on Your Website
 
Patterson Boulevard Canal Parkway - Before and After
Patterson Boulevard Canal Parkway - Before and AfterPatterson Boulevard Canal Parkway - Before and After
Patterson Boulevard Canal Parkway - Before and After
 
Castañeda y ppk
Castañeda y ppkCastañeda y ppk
Castañeda y ppk
 
Philanthropic Curve
Philanthropic CurvePhilanthropic Curve
Philanthropic Curve
 
Iva Natura- Kozmetik sektörünün dünü, bugünü ve yarını
Iva Natura- Kozmetik sektörünün dünü, bugünü ve yarınıIva Natura- Kozmetik sektörünün dünü, bugünü ve yarını
Iva Natura- Kozmetik sektörünün dünü, bugünü ve yarını
 
NSPCC Silent Auction Sponsored by GB Consultancy UK Ltd
NSPCC Silent Auction Sponsored by GB Consultancy UK LtdNSPCC Silent Auction Sponsored by GB Consultancy UK Ltd
NSPCC Silent Auction Sponsored by GB Consultancy UK Ltd
 
APPRAISAL OF GROUND WATER CHARACTERISTICS AND WATER QUALITY INDEX OF RICH IRO...
APPRAISAL OF GROUND WATER CHARACTERISTICS AND WATER QUALITY INDEX OF RICH IRO...APPRAISAL OF GROUND WATER CHARACTERISTICS AND WATER QUALITY INDEX OF RICH IRO...
APPRAISAL OF GROUND WATER CHARACTERISTICS AND WATER QUALITY INDEX OF RICH IRO...
 

Similar to 5 Things Your Content Engineer Wants You to Know About the Internet of Things (IoT)

IOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of ThingsIOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of ThingsKuldeep Singh
 
IOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsIOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsNagarro
 
CCC-Internet of Things Foundation
CCC-Internet of Things FoundationCCC-Internet of Things Foundation
CCC-Internet of Things FoundationITpreneurs
 
How IoT Initiatives are Changing Product Development
How IoT Initiatives are Changing Product DevelopmentHow IoT Initiatives are Changing Product Development
How IoT Initiatives are Changing Product DevelopmentMind_Q_Systems
 
11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things 11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things WGroup
 
Why Interop & Security are major issues in IOT?
Why Interop & Security are major issues in IOT?Why Interop & Security are major issues in IOT?
Why Interop & Security are major issues in IOT?Mobodexter
 
the world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxthe world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxpelise1
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...gogo6
 
Foundational Elements for IoT (1)
Foundational Elements for IoT (1)Foundational Elements for IoT (1)
Foundational Elements for IoT (1)Nicolas Delorme
 
Women in it presentation
Women in it presentationWomen in it presentation
Women in it presentationneelyworthwhile
 
How to Use AI in Product by Intel Product Manager
How to Use AI in Product by Intel Product ManagerHow to Use AI in Product by Intel Product Manager
How to Use AI in Product by Intel Product ManagerProduct School
 
InSource 2017 IIoT Roadshow: Evolution or Revolution
InSource 2017 IIoT Roadshow: Evolution or RevolutionInSource 2017 IIoT Roadshow: Evolution or Revolution
InSource 2017 IIoT Roadshow: Evolution or RevolutionInSource Solutions
 
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...John Boruvka
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iotHitesh Malviya
 
Cloud-Based IoT Analytics and Machine Learning
Cloud-Based IoT Analytics and Machine LearningCloud-Based IoT Analytics and Machine Learning
Cloud-Based IoT Analytics and Machine LearningSatyaKVivek
 

Similar to 5 Things Your Content Engineer Wants You to Know About the Internet of Things (IoT) (20)

Trends in IoT 2017
Trends in IoT 2017Trends in IoT 2017
Trends in IoT 2017
 
IoT-Use-Case-eBook
IoT-Use-Case-eBookIoT-Use-Case-eBook
IoT-Use-Case-eBook
 
IOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of ThingsIOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of Things
 
IOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsIOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of Things
 
CCC-Internet of Things Foundation
CCC-Internet of Things FoundationCCC-Internet of Things Foundation
CCC-Internet of Things Foundation
 
How IoT Initiatives are Changing Product Development
How IoT Initiatives are Changing Product DevelopmentHow IoT Initiatives are Changing Product Development
How IoT Initiatives are Changing Product Development
 
11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things 11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things
 
Why Interop & Security are major issues in IOT?
Why Interop & Security are major issues in IOT?Why Interop & Security are major issues in IOT?
Why Interop & Security are major issues in IOT?
 
NSW-IOT-Summit-July2018.pdf
NSW-IOT-Summit-July2018.pdfNSW-IOT-Summit-July2018.pdf
NSW-IOT-Summit-July2018.pdf
 
the world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxthe world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docx
 
Is IIOT Right for You?
Is IIOT Right for You?Is IIOT Right for You?
Is IIOT Right for You?
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
 
Foundational Elements for IoT (1)
Foundational Elements for IoT (1)Foundational Elements for IoT (1)
Foundational Elements for IoT (1)
 
Women in it presentation
Women in it presentationWomen in it presentation
Women in it presentation
 
top9.2p (1).docx
top9.2p (1).docxtop9.2p (1).docx
top9.2p (1).docx
 
How to Use AI in Product by Intel Product Manager
How to Use AI in Product by Intel Product ManagerHow to Use AI in Product by Intel Product Manager
How to Use AI in Product by Intel Product Manager
 
InSource 2017 IIoT Roadshow: Evolution or Revolution
InSource 2017 IIoT Roadshow: Evolution or RevolutionInSource 2017 IIoT Roadshow: Evolution or Revolution
InSource 2017 IIoT Roadshow: Evolution or Revolution
 
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iot
 
Cloud-Based IoT Analytics and Machine Learning
Cloud-Based IoT Analytics and Machine LearningCloud-Based IoT Analytics and Machine Learning
Cloud-Based IoT Analytics and Machine Learning
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

5 Things Your Content Engineer Wants You to Know About the Internet of Things (IoT)

Editor's Notes

  1. A little shop keeping before we get started.
  2. 2 dozen idea & execution
  3. Pirates market tested better
  4. Weeks of coding saves hours of planning. Today I want to talk about the hours of planning.
  5. So with that in mind, I’m going to give you 5 key thinks to think about, that you’ll want to think about when you are considering the Internet of Things
  6. connectivity is a function of data needs How many IoT engineers does it take to turn on a light bulb?
  7. Kind of Data: Understanding the kind of data you are looking for is key. To get there you’ll have to already know the problems you’re trying to solve and what decisions you’re going to be making with it. Data can be large or small, frequent or intermittent. Data Standards: Something as simple as time zone or date format can trip up a data set. Add to that the frequency of reporting and you can spend all your time there before you even get into 3rd party integration or solving your problem. Set data standards up front, or, better yet, leverage an existing standard. Going off on your own and creating a standard may be a competitive advantage for Apple or Google, but if that’s not in your model, don’t do it. Precision: Remember there is tradeoff in IOT such that every time you ask for something you’ve got to give something up. I can track real-time data for all sorts of things, but it might not be necessary, and you may need to give up battery life and portability. Data Integration: Data sets rarely stand on their own. Weather is probably one of the most leveraged data sets, which is determined by location, another great data set that can tell you a lot. If you understand your strategies then you can plan for data integration later. If you don’t plan for that, trust me, it’s not always the greatest thing.
  8. Data: Need vs. want Connectivity: How far, how much, how often? Power vs. mobility and adherence Why does that matter?
  9. I like to use the newsletter registration metaphor. Never ask an engineer if something can be done. I’ll tell you now, the answer is YES. Google[x] & SpaceX are proof of that.
  10. Things within IOT do not always have interfaces, so it is important to consider: How will you trouble shoot issues and/or provide user support? Can you fix them, or replace them? How often, and how will you upgrade them?
  11. Failure can take many forms. Remember the web registration form metaphor. If your drug has a shipping and storage of 2 months with a 12 month shelf-life, how long does the battery need to last to track diversion or the environmental conditions to which it is exposed?
  12. 44% upgrade their phone every two years with 54% waiting until it becomes obsolete or stops working. (Source: Gallup) How long do you think you’ll be using this device? Will it become part of your packaging? Installed in a physician’s office? Given to a patient? Will you get it back at the end? What happens when you’re done? Do the devices live on?
  13. This is traditional hacking. Distributed Denial of Service attack Many of the devices did not even have an interface to change the password (which we’ll talk about later).
  14. If we are going to make decisions on how we treat patients based on their activity, we better know it's their activity we are looking at. Hawaii 5-0, physically manipulating a tidal wave sensor.
  15. Digital Twin: Real time virtual companion Software: Think about that DDoS attack and ask yourself how you will be updating, patching, and maintaining your software next year, and what is the impact of that. Digital Twin: Your car or house does not directly integrate with the weather, but their digital twins do. How reliable is the information you are receiving?
  16. Hawaii 5-0, physical attack scenario
  17. Operation of machine Provide data to influence the decision making process
  18. Technology is moving faster than people, and much faster than policy. Penn & Teller Submarine Production technology does not always follow consumer economics? What does that mean? A smaller screen is no always less expensive, so you have to know that world. Think about the future. If you are investing in this today, you can’t forget about it tomorrow, so plan based on 5 year costs.
  19. Government: Three decades ago, the National Oceanic and Atmospheric Administration began publishing weather data in electronic form for free download. Today, entrepreneurs and innovators across the country leverage this freely available, easily accessible data to power a wide array of applications and services that benefit the American people, including weather newscasts, websites, mobile applications, insurance, research and much more. Similarly, the government's decision in the 1980s to make Global Positioning System data openly available has spawned a vast array of private-sector innovations that have created large-scale public benefit and economic value. External Corporate: Remember, IoT is not a government funded program like the Internet was. Much of the technology may be patented an/or have terms of use. Internal Corporate: Your policies on data collection, transmission, and retention as well as your legal release documentation and privacy policies that communicate to users how you plan to use their data.
  20. Astro Teller, Google[x] Amazon Echo: Parkinson's Disease
  21. Adherence: IoT can help, but it has it’s own adherence You are not your audience: Get out of the conference room and see what people think and how they act: Examples: Alexa for Parkinson's… speech and memory games.
  22. Anticipated state Action Reward
  23. So those are the 5 key things that you’ll want to think about when you are considering the Internet of Things Weeks of coding saves hours of planning.
  24. But most of all, because of this. Weeks of coding saves hours of planning. What does that mean?