Dev Dives: Streamline document processing with UiPath Studio Web
The Internet of Things
1. Tony Hall
Director IOT Software Platform, Cisco Systems Inc.
Jan 2016
The Internet of Things
2. What Is This “Internet of Things”
• Connect Everyday Objects and Sensors to the Internet
• Interfaces, Electro-Mechanicals, Protocols … and more
• Bring Operational “Thing” Data into Business Processes
IoT
3. The Potential of IoT
Many Things:
Vendor-controlled data
Used for: Monitoring Value
1 Thing : 1 App
Many Apps
“Works
with
Nest”
Smart
Things
Customer-owned data
Used for: ERP, single pane of glass
Many Things:
Many Apps:
Many Times/sec
Just-in-time
automation Fanuc
ZDT
Hyper-scale cloud data + local compute
Used for: automation, self-healing
4. IoT Completes the Collaboration Process
People
Connecting People in More
Relevant, Valuable Ways
Process
Delivering the Right Information
to the Right Person (or Machine)
at the Right Time
Data
Leveraging Data into
More Useful Information for
Decision Making
Things
Physical Devices and Objects
Connected to the Internet and
Each Other for Intelligent
Decision Making
Digitization
5. 7.26.8 7.6
Rapid Adoption
Rate of Digital
Infrastructure:
5X Faster Than
Electricity and
Telephony
50 Billion
“Smart Objects”
50
2010 2015 2020
0
40
30
20
10
BILLIONSOFDEVICES
25
12.5
Inflection
Point
TIMELINE
Source: Cisco IBSG, 2011
World
Population
The New Essential Infrastructure
IoT Is Here Now and Growing
6. Granular Security
In Larger Things
Unique Challenges to IoT
Access to Things
On Internal Networks
Thing Operational
Lifespan
Physical Access
Firewall Holes
Policies and
Infrastructure
To Defend The
Things
Simple
Sensors
Remote
Management
Practices,
Use the Cloud
Compromised Things
Made to Attack
Locked
Down Device
Policies and
Procedures for
“Insider Attacks”
Manage Large Sets
of Security
Credentials
Prevent Attack Storms
Highly Scalable
Solutions
How to support Single Customer to
10+ Million Things
Mission Critical
Availability
Incur
Downtime
Paradigm Shift –
Rethink “Shutdown-
Change-Restart”
7. IoT Epic – Conclusion What To Watch
• Demand Scales Quickly
• Provide Integration with
Cloud Services
• Maintain Security
• Manage Your OT
Networks
CIO Challenges
• More Visibility to
Product Use
• Creates New Revenue
Opportunities
• Operational Efficiencies
Improving Your P & L
IoT is
Changing Business
Real Customers
Tangible Results
Cisco Is Key Partner for
Your Success
IoT is Here, Now
Editor's Notes
Key Points
Most people think of IoT as just the connetion of millions of different “things” to the internet
That in and of itself is a complex problem
Many Types of Interfaces
Many Types of Electro-mechanical Connections
Many types of Data Protocols
You can See how the problem grows exponentially in complexity
But the way business needs to think about IoT is bringing the Operational (i.e., real time) Sensor Data into the business decision making process
Currently Data is digested into reports then reviewed
Delay between Measurement and Evaluation
No Interactivity
Key Point: Time Value of Data decreases very quickly
More Human understandable Sensor data
Higher Value when exposed broadly to teams
“Crawl”
First implementations of IoT
Only 1 app has access to data from each sensor.
Customer quickly frustrated over separate apps
[CLICK] “Walk”
Think in terms of open ecosystems
Expose APIs
Customer can choose how they want to use the data
[CLICK] “Run”
When you grow to enterprise-grade deployment
Avalanche/Tsunami of data
Need to react to conditions/make decisions in real time
Combination of cloud and edge compute – new analytics models, policies
NOTE: Today’s Cisco Beat introduced the term “Digitization” to replace IoE
Collaboration involves decision making
People – the right people working in a team
Process – the recipe for scalable and repeatable business operations
Data – historical, post processed, and summarized for context
Thing Data – What is happening over the short term
Is our Busineess operating in the sweet spot?
What or where are the issues
Ecosystem that enables faster and more applicable business decisions
Source: Cisco presentation from IoT Partner Overview, Katherine Fahey (no longer at Cisco). Obtained from search of WWWIN
Points:
There are a large number of devices and the ramp rate is steep
Superimpose the Connectors, Protocols, Data Models, and get scared
Then add on Deployment scenarios and Access:
E.g., Sites, Fog, Cloud, etc
And with each of these then there is
Security, Data Access Policy,
So the net solution to a business is very complex.
Some things have long operational deployments
Access to the sensors may be difficult (out of the way, buried deep) so today, simpler is better.
With IoT, these sensors may be more sophisticated, so Need to think about Remote Management practices, e.g., Cloud managed
Internal IoT Networks Must Expose Some or All “Things”
Traditionally you’d either require on-site access, or punch holes in firewalls (risky)
Today you’re going to need a scalable process to enable access to the devices
Access Policies, Authentication, Limits (Time, Location)
Need Policies and Infrastructure to protect the Things from Attacks an malware
Attackers, especially from the inside of the company can easily compromise some “Things”
Insiders can compromise “Things” Using Valid Security Credentials
Those things then use their valid security credentials to attack internally
Up to now, prevention was locking down the device, or using a dumb sensor.
Going forward, with smart Things, companies will need well planned policies and procedures to deny Insider Attacks
Sophisticated “Things” Need Granular Security Access Models. This is essentially things of Things where there many IoT devices within the thing
(I don’t think there is an analogous ‘where we came from for this one’)
Manage Security Certificates for Huge Number of Spare Parts
Solutions Will Require High Scalability
Single Customer
10+ Millions of Things in Tiered Access Models in Worldwide Deployments
Many situations will have mission-critical needs
Complex Things may need to be restarted, even in High Availability deployments.
Have to rethink Shutdown-Cleanup-Restart response paradigm; it’s no longer adequate