CIO RoundtableIot IOT

527 views

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
527
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
18
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

CIO RoundtableIot IOT

  1. 1. 8/20/2013 Peer Consulting Group 1 CIO Roundtable August 8, 2013 Jim Sutter - PeerGroup
  2. 2. The Internet of Things refers to uniquely identifiable objects and their virtual representation in an Internet- like structure. ‘The Internet of Things’ is a concept originally coined and introduced by MIT, Auto-ID Center and intimately linked to RFID and electronic product code (EPC). If all objects and people in daily life were equipped with identifiers, they could be managed and inventoried by computers. Tagging of things may be achieved through such technologies as near field communication, barcodes, QR codes and digital watermarking. 8/20/2013 Peer Consulting Group 2
  3. 3. 8/20/2013 Peer Consulting Group 3
  4. 4.  "A billion people interacting with a million e- businesses, with a trillion intelligent devices interconnected“ (Lou Gerstner, CEO IBM, 1995)  By 2015 there will be 1 trillion sensors linking the physical and digital worlds merging to become an “Internet of Things”  list of applications is limited only by our imagination 8/20/2013 Peer Consulting Group 4
  5. 5. 8/20/2013 Peer Consulting Group 5
  6. 6. 8/20/2013 Peer Consulting Group 6
  7. 7. Internet of Things - at its most basic level… Interrogator / Gate way device Interrogator / Gate way device Host Information Management System Host Information Management System Actuators Actuators Wider area communications and Networks Application commands and responses Physical Interface Zone Internet + Passive RFID data carriers and UID Sensors Sensors Limit Switches Actuators Communications Zone Display, Monitor, Initiation Zone
  8. 8. 8/20/2013 Peer Consulting Group 8 i.e., IP6
  9. 9. 8/20/2013 Peer Consulting Group 9
  10. 10. 8/20/2013 Peer Consulting Group 10
  11. 11. 8/20/2013 Peer Consulting Group 11 Figure 2.
  12. 12. 8/20/2013 Peer Consulting Group 12
  13. 13. 8/20/2013 Peer Consulting Group 13
  14. 14.  Passive UHF  CPG Supply Chain Apps  EPC Global Gen 2  ISO 96 bits  SGTIN vs. UPC 14  1SYNC  NFC investments  Improved Antenna technology  Connected via IP to the WWW (IOT) 8/20/2013 Peer Consulting Group 14
  15. 15. 8/20/2013 Peer Consulting Group 15 Figure 5.
  16. 16. 16 Surveillance applications, alarms, object / people tracking [14] Fleet management, emission control, toll payment, road safety [95] e-Health, and personal security Smart Metering and Grid [34] such as oil, water, electricity, heat, and others Production chain monitoring and automation Example Verticals [Millions of objects by 2014 – Indicative example]
  17. 17. 17 Freight supply and distribution monitoring, Vending Machines Home / building / campus automation Example Verticals Multitude of new M2M applications based on standardized Service Capabilities and APIs [Ericsson CEO vision of 50 Billion Connected Objects by 2020] …
  18. 18. © Yacht Watchman International 2008 We monitor boats while owners are away! The average boat owner uses their vessel only 17 times per year.
  19. 19. © Yacht Watchman International 2008  Boat owners Love their Boats  Many suffer from Narcolepsy  80% of Boats that sink......... sink at the dock!
  20. 20. © Yacht Watchman International 2008 Home Alone Can you safely leave your boat unattended? “Boats have a way of sinking when no one is watching. One way to beat this fear is to hire a boat-sitter” Yachting magazine, November, 1998 JAY COYLE
  21. 21. © Yacht Watchman International 2008 Boaters’ Concerns • Water • Electrical • Smoke • Intrusion • Location
  22. 22. © Yacht Watchman International 2008 Around the Clock Monitoring All Wireless Technology Local or Worldwide Coverage You are in Control 24/7 Geofence and Route Control
  23. 23. © Yacht Watchman International 2008
  24. 24. 8/20/2013 Peer Consulting Group 24
  25. 25. 8/20/2013 Peer Consulting Group 25
  26. 26. 8/20/2013 Peer Consulting Group 26
  27. 27. 8/20/2013 Peer Consulting Group 27
  28. 28.  Alerts – Boat example, process industry, security -  Avoid significant, costly incidents  Predictive Maintenance – smarter intervals -  Save wear and tear, optimize consumables  Monitoring – agricultural aps, production sequencing -  Better yields, fewer outages  Analysis – confirm or improve maintenance intervals, lead times, dosages, recipes, etc. 8/20/2013 Peer Consulting Group 28
  29. 29.  IOT or M2M solutions today collect all kinds of information, from the temperature and GPS coordinates of a refrigerated container to the vital data of a herd of cows, and data quantities are growing constantly as the technology becomes increasingly widespread. So M2M is one of the drivers of the global increase in data quantities – the Big Data trend. 8/20/2013 Peer Consulting Group 29
  30. 30. 8/20/2013 Peer Consulting Group 30 So far, data retrieval by M2M applications has for the most part been limited to individual values. Doctors, for example, monitor patients’ blood glucose levels that are measured, relayed by mobile telephony and archived, but extensive information can only be gained from analyzing many different parameters. Which data is analyzed is one question; the other is when it is analyzed. Retrospective data analysis is often insufficient to identify relevant patterns early enough. To do that, you need to look at data streams in real time, and that is where the real potential lies. Equipped with machine learning algorithms, M2M applications of this kind can even look into the future. They recognize problems in production processes before they even arise.
  31. 31. 8/20/2013 Peer Consulting Group 31 Thanks for Listening….. www.peergroup.net

×