This document summarizes a presentation on asset monitoring using Internet of Things (IoT) technology. It discusses how BLE beacons and LoRa nodes can be used to track physical assets in real-time by collecting sensor data via gateways. A modern IoT architecture is presented involving connectivity, middleware, and data analysis layers. Key concepts of an IoT platform are explained, including how device models define data structures and integrate physical devices. The presentation demonstrates publishing sensor data from beacons and LoRa nodes to an IoT cloud platform, and developing an asset monitoring dashboard application to visualize real-time asset locations and sensor readings on a map.
Asset Tracking and Location Technologies for Internet of ThingsBrian Ray
Positioning in the Internet of Things. How location technology works and the use cases that are driving adoption.
- Use Cases: Asset Tracking, Real Time Location Systems, Asset Management
- How GPS Works
- Time based location
- Proximity location technologies
- Using WiFi for Position
- Tradeoffs in performance, power, and cost
- Keys to building a successful location product
SplunkLive! Munich 2018: Siemens Security Use CaseSplunk
Presented by Oliver Kollenberg, Security Consultant at Siemens:
Digitalization at Siemens
Cybersecurity at Siemens
The EAGLE DataCenter
Using Splunk
Summary, Key Benefits and Tips
TIBCO Spotfire: Data Science in the EnterpriseTIBCO Spotfire
From Data to Insights in Internet Time
Eric Novik, Internal Analytics Group, TIBCO Spotfire
ANALYTICS AND VISUALIZATION FOR THE FINANCIAL ENTERPRISE CONFERENCE
June 25, 2013 The Langham Hotel Boston, MA
Curso de Ethical Hacking básico. En el mismo se verán temas como:
Antecedentes
Introducción a la seguridad Informática
Tipo de ataques
Prevención
Escaneos
Conceptos de Pentesting
Escaneos de Vulnerabilidades
Asset Tracking and Location Technologies for Internet of ThingsBrian Ray
Positioning in the Internet of Things. How location technology works and the use cases that are driving adoption.
- Use Cases: Asset Tracking, Real Time Location Systems, Asset Management
- How GPS Works
- Time based location
- Proximity location technologies
- Using WiFi for Position
- Tradeoffs in performance, power, and cost
- Keys to building a successful location product
SplunkLive! Munich 2018: Siemens Security Use CaseSplunk
Presented by Oliver Kollenberg, Security Consultant at Siemens:
Digitalization at Siemens
Cybersecurity at Siemens
The EAGLE DataCenter
Using Splunk
Summary, Key Benefits and Tips
TIBCO Spotfire: Data Science in the EnterpriseTIBCO Spotfire
From Data to Insights in Internet Time
Eric Novik, Internal Analytics Group, TIBCO Spotfire
ANALYTICS AND VISUALIZATION FOR THE FINANCIAL ENTERPRISE CONFERENCE
June 25, 2013 The Langham Hotel Boston, MA
Curso de Ethical Hacking básico. En el mismo se verán temas como:
Antecedentes
Introducción a la seguridad Informática
Tipo de ataques
Prevención
Escaneos
Conceptos de Pentesting
Escaneos de Vulnerabilidades
Enabling Airbus Digital Transformation with Splunk
Learn how Airbus are turning their data into doing across their organisation. From real time monitoring to IT Service Management to security operations – Airbus are maximising their use of data to deliver more services and continuous process improvement.
"Industrial Internet IoT bootcamp" meetup, 11-5-2015 hosted by GE Digital at HackerDojo. Discussing topics ranging from IoT architecture to connectivity and protocols, cyber security, data science and industrial UX design.
Simple and Effective Enterprise Architecture with Tools you Already OwnChandra Knabel
Presented at SAP's ASUG user conference in May 2013
This presentation reviews how our organization setup an Enterprise Architecture practice with a matrixed team and Sharepoint as our architecture repository - using the TOGAF architecture framework.
This presentation gives high level understanding of OBSS systems or Management and Monetization solutions being used in Telco operator environment. It highlights key functional & technical building blocks of Telecom IT Software Infrastructure and what are the key use cases they aim to achieve.
This presentation would be useful for newcomers in Telecom space to quickly grab overall IT landscape.
In an era when many IT organizations are transforming themselves from cost centers into business enablers, the maturity of an organization’s approach to infrastructure monitoring becomes critical. The IT operations team must move beyond ad hoc monitoring and embrace an approach that actively optimizes the infrastructure for business innovation and agility. A maturity model for infrastructure monitoring offers enterprises guidance on how to achieve that goal.
These slides - baesd on the webinar featuring Shamus McGillicuddy, senior analyst at leading IT analyst firm Enterprise Management Associates (EMA), and Scott Frymire, director of marketing at SevOne - examine:
- The functional capabilities that are required of a mature monitoring platform
- The cultural and process-oriented aspects of a mature IT operations team
- SevOne’s product-agnostic, five-stage maturity model for infrastructure monitoring
Solution architecture for big data projects
solution architecture,big data,hadoop,hive,hbase,impala,spark,apache,cassandra,SAP HANA,Cognos big insights
Workspaces are constantly evolving to incorporate IoT-enabled devices so that almost all aspects of a workspace are data-enabled and remotely driven to enhance worker experience.
This will undoubtedly cut costs and create more efficient ways to drive the productivity of your business. With rising real-estate costs, it is sometimes prohibitively expensive to move to modern workspaces.
<a href="https://www.faststreamtech.com/solutions/iot-solutions/smart-workspaces/">Faststream Technologies</a> transforms your current workspaces into an IoT-enabled smart workspace.
Faststream Technologies, with the integration of IoT, is able to automate efficient space utilization and create an office environment that reacts to human occupancy, making it conducive for increased productivity.
https://www.faststreamtech.com/solutions/iot-solutions/smart-workspaces/
"Into the Fog The Return of ICEFOG APT" - Chi en (Ashley) ShenPROIDEA
Chi-en Shen (Ashley) is a security researcher at FireEye, where she focuses on threat intelligence research. She specializes in threat hunting, malware analysis, reverse engineering, and targeted attacks research. Prior to FireEye, Ashley helped found Team T5, a threat research security company where she also works as a threat analyst. For supporting women in InfoSec, Ashley co-founded “HITCON GIRLS” – the first security community for women in Taiwan. Ashley is also a regular speaker at global security conferences, including Black Hat Europe, Black Hat Asia, FIRST, HITB GSEC, CODE BLUE, Troopers, HITCON and VXCON. Ashley also serves as a member of the Black Hat Asia review board where she evaluates research for briefings and training.
IoT is reshaping the manufacturing and industrial processes, effectively changing the paradigm from one of repair and replace to more of predict and prevent. Using data streaming from connected equipment and machinery, organizations can now monitor the health of their assets and effectively predict when and how an asset might fail. However, without the right data management strategy and tools, investments in IoT can yield limited results. Join Cloudera and Tata Consultancy Services (TCS) for a joint webinar to learn more about how organizations are using advanced analytics and machine learning to drive IoT enabled predictive maintenance.
Industrial IoT landscape and technology, differences between consumer and industrial IoT, Industry 4.0 and Industrial Internet.LPWAN and SIGFOX network
Industrial Transformation (IX) is happening all around us. And COVID-19 is accelerating it. Companies are asking, “What is the new normal and how do we operate in it?” This has led companies to revisit what it means to be Operationally Excellent. And how does this fit in with the increasing trends toward Remote Operations, the Connected Workforce, the use of Artificial Intelligence and Machine Learning (AI/ML) and the possibility of Autonomous Operations (AO). Is AO achievable or still a “Bridge Too Far?” What has to happen to make it a reality? This presentation will explore what is OE 4.0, a new definition, drivers and challenges, the need for an integrated OE Execution system and characteristics of the Autonomous Plant.
The vital role of AIOps in overcoming IT operational challenges - DEM07-SR - ...Amazon Web Services
Digital transformation has sparked an IT service availability crisis in the enterprise, driven by unprecedented levels of infrastructure scale and complexity, rendering the traditional, rules-driven approach to incident management obsolete. Artificial intelligence for IT Operations, or AIOps, is a new direction for assuring service availability via operational data. In this talk, we show how AIOps gives enterprises a critical advantage and paves the way for the future of service assurance. We examine how adopting AIOps yields greater business agility while improving customer service, lowering operation costs, and boosting IT Ops teams’ productivity. This presentation is brought to you by AWS partner, Moogsoft Inc.
We’re living in an era of digital disruption, where the accessibility and adoption of emerging digital technologies are enabling
enterprises to reimagine their businesses in exciting new ways. Data flows from the edge to the core to the cloud while
performing analytics and gaining actionable intelligence at all steps along the way. This connected, automated and data-driven
future enables organizations to rapidly acquire, analyze, and take action on real-time data as well as curate flows for additional
analysis at a later stage. New IoT use cases require enterprises to properly handle data in motion and create newer edge
applications with data flow management, stream processing and analytics while still being governed by existing enterprise
services.
This session highlights the importance of an edge-to-core-to-cloud digital infrastructure that can adapt to your flexing
business needs, capturing expanding data flows at the edge and aligning them to a core infrastructure that can drive insight.
Speakers
Bob Mumford, Hewlett Packard Enterprise, Big Data Solutions Architect
Bridging the gap between Administrative and Operational IT
Vision, Architecure and Project experience. This slide deck shows our vision on this market for industrial enterprise IOT. Conclusion
Bridging the gap between Administrative and Operational IT
Vision, Architecure and Project experience. This slide deck shows our vision on this market for industrial enterprise IOT
Enabling Airbus Digital Transformation with Splunk
Learn how Airbus are turning their data into doing across their organisation. From real time monitoring to IT Service Management to security operations – Airbus are maximising their use of data to deliver more services and continuous process improvement.
"Industrial Internet IoT bootcamp" meetup, 11-5-2015 hosted by GE Digital at HackerDojo. Discussing topics ranging from IoT architecture to connectivity and protocols, cyber security, data science and industrial UX design.
Simple and Effective Enterprise Architecture with Tools you Already OwnChandra Knabel
Presented at SAP's ASUG user conference in May 2013
This presentation reviews how our organization setup an Enterprise Architecture practice with a matrixed team and Sharepoint as our architecture repository - using the TOGAF architecture framework.
This presentation gives high level understanding of OBSS systems or Management and Monetization solutions being used in Telco operator environment. It highlights key functional & technical building blocks of Telecom IT Software Infrastructure and what are the key use cases they aim to achieve.
This presentation would be useful for newcomers in Telecom space to quickly grab overall IT landscape.
In an era when many IT organizations are transforming themselves from cost centers into business enablers, the maturity of an organization’s approach to infrastructure monitoring becomes critical. The IT operations team must move beyond ad hoc monitoring and embrace an approach that actively optimizes the infrastructure for business innovation and agility. A maturity model for infrastructure monitoring offers enterprises guidance on how to achieve that goal.
These slides - baesd on the webinar featuring Shamus McGillicuddy, senior analyst at leading IT analyst firm Enterprise Management Associates (EMA), and Scott Frymire, director of marketing at SevOne - examine:
- The functional capabilities that are required of a mature monitoring platform
- The cultural and process-oriented aspects of a mature IT operations team
- SevOne’s product-agnostic, five-stage maturity model for infrastructure monitoring
Solution architecture for big data projects
solution architecture,big data,hadoop,hive,hbase,impala,spark,apache,cassandra,SAP HANA,Cognos big insights
Workspaces are constantly evolving to incorporate IoT-enabled devices so that almost all aspects of a workspace are data-enabled and remotely driven to enhance worker experience.
This will undoubtedly cut costs and create more efficient ways to drive the productivity of your business. With rising real-estate costs, it is sometimes prohibitively expensive to move to modern workspaces.
<a href="https://www.faststreamtech.com/solutions/iot-solutions/smart-workspaces/">Faststream Technologies</a> transforms your current workspaces into an IoT-enabled smart workspace.
Faststream Technologies, with the integration of IoT, is able to automate efficient space utilization and create an office environment that reacts to human occupancy, making it conducive for increased productivity.
https://www.faststreamtech.com/solutions/iot-solutions/smart-workspaces/
"Into the Fog The Return of ICEFOG APT" - Chi en (Ashley) ShenPROIDEA
Chi-en Shen (Ashley) is a security researcher at FireEye, where she focuses on threat intelligence research. She specializes in threat hunting, malware analysis, reverse engineering, and targeted attacks research. Prior to FireEye, Ashley helped found Team T5, a threat research security company where she also works as a threat analyst. For supporting women in InfoSec, Ashley co-founded “HITCON GIRLS” – the first security community for women in Taiwan. Ashley is also a regular speaker at global security conferences, including Black Hat Europe, Black Hat Asia, FIRST, HITB GSEC, CODE BLUE, Troopers, HITCON and VXCON. Ashley also serves as a member of the Black Hat Asia review board where she evaluates research for briefings and training.
IoT is reshaping the manufacturing and industrial processes, effectively changing the paradigm from one of repair and replace to more of predict and prevent. Using data streaming from connected equipment and machinery, organizations can now monitor the health of their assets and effectively predict when and how an asset might fail. However, without the right data management strategy and tools, investments in IoT can yield limited results. Join Cloudera and Tata Consultancy Services (TCS) for a joint webinar to learn more about how organizations are using advanced analytics and machine learning to drive IoT enabled predictive maintenance.
Industrial IoT landscape and technology, differences between consumer and industrial IoT, Industry 4.0 and Industrial Internet.LPWAN and SIGFOX network
Industrial Transformation (IX) is happening all around us. And COVID-19 is accelerating it. Companies are asking, “What is the new normal and how do we operate in it?” This has led companies to revisit what it means to be Operationally Excellent. And how does this fit in with the increasing trends toward Remote Operations, the Connected Workforce, the use of Artificial Intelligence and Machine Learning (AI/ML) and the possibility of Autonomous Operations (AO). Is AO achievable or still a “Bridge Too Far?” What has to happen to make it a reality? This presentation will explore what is OE 4.0, a new definition, drivers and challenges, the need for an integrated OE Execution system and characteristics of the Autonomous Plant.
The vital role of AIOps in overcoming IT operational challenges - DEM07-SR - ...Amazon Web Services
Digital transformation has sparked an IT service availability crisis in the enterprise, driven by unprecedented levels of infrastructure scale and complexity, rendering the traditional, rules-driven approach to incident management obsolete. Artificial intelligence for IT Operations, or AIOps, is a new direction for assuring service availability via operational data. In this talk, we show how AIOps gives enterprises a critical advantage and paves the way for the future of service assurance. We examine how adopting AIOps yields greater business agility while improving customer service, lowering operation costs, and boosting IT Ops teams’ productivity. This presentation is brought to you by AWS partner, Moogsoft Inc.
We’re living in an era of digital disruption, where the accessibility and adoption of emerging digital technologies are enabling
enterprises to reimagine their businesses in exciting new ways. Data flows from the edge to the core to the cloud while
performing analytics and gaining actionable intelligence at all steps along the way. This connected, automated and data-driven
future enables organizations to rapidly acquire, analyze, and take action on real-time data as well as curate flows for additional
analysis at a later stage. New IoT use cases require enterprises to properly handle data in motion and create newer edge
applications with data flow management, stream processing and analytics while still being governed by existing enterprise
services.
This session highlights the importance of an edge-to-core-to-cloud digital infrastructure that can adapt to your flexing
business needs, capturing expanding data flows at the edge and aligning them to a core infrastructure that can drive insight.
Speakers
Bob Mumford, Hewlett Packard Enterprise, Big Data Solutions Architect
Bridging the gap between Administrative and Operational IT
Vision, Architecure and Project experience. This slide deck shows our vision on this market for industrial enterprise IOT. Conclusion
Bridging the gap between Administrative and Operational IT
Vision, Architecure and Project experience. This slide deck shows our vision on this market for industrial enterprise IOT
In the second in our series of IoT presentations we will be providing more in-depth information on:
- How IoT can transform a business
- Key components of IoT solution
- How IoT projects work
- Do's and Don'ts in IoT projects
This presentation provides Internet of things architecture fundamentals, functional topology, system overview. Also it provides software architecture of IoT Devices, IoT Gateway, IoT Cloud. This presentation also provide internet of things issues and solutions for the same.
The Internet of things (IoT) is the extension of Internet connectivity into physical devices and everyday objects.
Presentation cover below topics
How IoT works ? IoT Key Components. Enabling technologies for IoT, IoT Connectivity , Technology Road Map. Iot architecture, How to Choose the Right IoT Platform,Benefits of IoT, IoT adoption barriers, Challenges for IoT security:
Other Challenges
Gustavo Zastrow - Introduction to AWS IoT Core and MQTTGustavoRuizZastrow
Introduction to IoT Core and MQTT concepts. Demo using a Raspberry Pi and temperature and humidity sensors publishing to AWS IoT Core. Rules to plot values in Cloudwatch and alert using SNS.
Presented on 05-15-2019 at Arlington AWS Meetup
Internet of Things (IoT) is a buzzword that is widely used in different domains. This talk explains the current state of the art in IoT (from a technological and research perspective), mainly in Europe. The future of IoT is promising and the trends in terms of number of devices and money involved show significant growth. There are still challenges in technical, business and social areas and some of them will be addressed in the talk.
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Italy Agriculture Equipment Market Outlook to 2027harveenkaur52
Agriculture and Animal Care
Ken Research has an expertise in Agriculture and Animal Care sector and offer vast collection of information related to all major aspects such as Agriculture equipment, Crop Protection, Seed, Agriculture Chemical, Fertilizers, Protected Cultivators, Palm Oil, Hybrid Seed, Animal Feed additives and many more.
Our continuous study and findings in agriculture sector provide better insights to companies dealing with related product and services, government and agriculture associations, researchers and students to well understand the present and expected scenario.
Our Animal care category provides solutions on Animal Healthcare and related products and services, including, animal feed additives, vaccination
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
Instagram has become one of the most popular social media platforms, allowing people to share photos, videos, and stories with their followers. Sometimes, though, you might want to view someone's story without them knowing.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
3. INTRODUCTIONS
• Robert van Mölken
• IoT / Integration Consultant
• Oracle ACE (≡ of Java Champion)
• Frequent blogger & presenter and Board
Member on Dutch Oracle User Group
• Author of 1st Oracle PaaS book:
Implementing Oracle Integration Cloud
Service
• Linkedin: linkedin.com/in/rvmolken
• Blog: technology.vanmolken.nl
• Twitter: @robertvanmolken
• Email: robert.van.molken@amis.nl
• Gertjan van het Hof
• IoT Solution Architect
• IoT Enthusiast
• Initiator of TTN Rivierenland
• Linkedin: linkedin.com/in/gertjanvanhethof
• Twitter: @GertjanvhHof
• Email: gertjan.van.het.hof@amis.nl
• Phone: +31 (0)6 29540619
4. ON THE AGENDA
• IoT Connecting the Physical & Digital world
• Concepts behind Asset Tracking & Monitoring
• Modern IoT architecture (IoT Reference model)
• Concepts behind Internet of Things Platform
• Internet of Things Platform Walkthrough
5. Data from devices are integrated in real
time to information system
Closing the gap between information
system and the field
Amount of connected devices expected to
rise to 50 billion in 2020
Benefits all sectors, including agriculture,
retail, industry and healthcare
Add intelligence by adding analytical
dimension and machine learning
Launch actions in enterprise
application based on real-time data
IOT CONNECTING THE PHYSICAL & DIGITAL WORLD
6. CONCEPTS BEHIND
ASSET TRACKING & MONITORING
• Asset Tracking
• Method of tracking physical assets
• Scanning barcode/QR labels attached to the assets
• Using tags using GPS or RFID which broadcast their location
• Low-power devices like BLE Beacons and LoRa Nodes/Gateways
• Asset Monitoring
• Method of monitoring health of physical assets
• Monitoring temperature, motion, moisture, pressure, other conditions…
• Using sensors emitting data collected by gateways
• Data is near real-time available on central dashboard
7. • Improve efficiency
• Reduce time spent among other searching for, and maintaining equipment through
real-time status (sensor data) and location of equipment.
• Reduce costs
• Increase equipment utilization and trace assets to prevent theft and abusive usage
• Better decision making
• Forecasts future asset maintenance, prevent unnecessary purchases of new assets
• Help prevent the spread of infection
• Provide location history that pinpoints equipment associated with an infectious patient.
WHY IMPORTANT IN THE HEALTHCARE
8. TECHNOLOGY BEHIND ASSET TRACKING
• Communication
Characteristics
• Communcation protocols
• Tracking technology
• Gateway positioning
• Position calculation
20. CONCEPTS BEHIND
INTERNET OF THINGS PLATFORM
• Cloud platform to connect the physical world to existing IT
• Connect all existing Devices & Sensors
• Each device/sensor identified by a device model in IoT Cloud
• Programmable devices can be directly connected using client libraries
• Sensors can be connected through programmable gateway
• Analyze streaming data in Real-Time
• Use raw-data streams as input for creating custom analytics
• Apply data analysis patterns e.g. Top/Bottom N, Up/Down Trend
• Route/Publish analyzed stream
• Integrate with enterprise applications or cloud services
21. CONCEPTS – DEVICE MODELS & REGISTRATION
• Device model first approach
• Device models define data and behaviors implemented by devices
• They are used to derive the analytics and integration strategy
• Data structure can contain more fields then sensor data
• Registration / Provisioning through Gateway device(s)
• Gateway device acts as central IoT hub
• Gateways are provisioned, indirectly connected devices are not
• Indirectly connected devices are registered by gateway on the fly
• IoT application attaches device models and monitor devices
26. DISCOVER BEACONS (BLE) PACKETS
• Making use of Estimote (sticker) beacons
• Small BLE devices that send nearable packets
• Includes temperature and motion sensor data for asset monitoring
• BLE packets picked up Edge Router / Gateway
• Raspberry PI (zero W or 3) or ESP32 can discover BLE packets
• Gateway runs NodeJS application using Bleacon module
• Bleacon is a module (uses Bleno), to decode BLE packets (i.e. iBeacon
and Nearable).
• Edge Router smoothens and send data to MQTT broker
27. DISCOVER BEACONS (BLE) PACKETS
Beacon Gateway picks up BLE packets and send to MQTT Broker
28. PUBLISH DATA TO IOT CLOUD
• Intermediate Gateway subscribes to MQTT broker
• Can run in the Cloud or on a small computer (RPI, Pine64)
• Runs NodeJS/RED application, subscribes to MQTT topic
• Gateway Node app interacts with IoT Cloud
• Activates / Connects gateway to IoT Cloud
• Based on device type, device model is downloaded and assigned
• Device is registered to IoT Cloud if unknown (new device after restart)
• Device data is transformed to model format
• Device data is send to IoT Cloud
Application
Container Cloud
Internet of Things
Cloud
29. PUBLISH DATA TO IOT CLOUD
MQTT Gateway subscribes to topic to publishes data to IoT Cloud
30. LORA TO IOT CLOUD INTEGRATION
• Basically the same concept as for Beacons
• LoRa enabled Gateway is needed
• Make use of free (TTN) or commercial (KPN) LoRa netwerk
• Gateway Node app interacts with IoT Cloud
• Identically as for Beacons
• Bi-Directional communication
• Data smoothening
Internet of Things
Cloud
Gateway
IoT closes the gap between information systems and the field. In the past field data was not integrated into the information system. Most often, field data were incorporated later, in “batch” mode or by manual entry, which made it impossible to use them in real time.
With the Internet of Things, data are integrated in real time - connected objects are immediately linked, in a ready-to-use state, to the company’s information system - which offers a host of new opportunities for companies, especially in terms of creating new services.
Incorporate new data sources with the existing enterprise data. Currently main weakness is a lack of integration between the various applications of the Internet of Things.
By connecting data from the Internet of Things to enterprise applications actions can be launched in real time
Add intelligence by integrating the analytical dimension and machine learning into devices. Technologies making it possible to analyze and manage data in streaming mode, that is, in real time, in order to draw useful knowledge for companies.
Under five billion connected objects were registered in 2010, while more than 50 billion are expected in 2020
Benefits all sectors, including health, agriculture, retail and industry
Improve efficiency
- Reduce time spent searching for, delivering, maintaining, and cleaning equipment through real-time status and location of equipment.
Reduce costs
- Increase equipment utilization and trace assets to prevent theft and abusive usage
Better decision making
- Forecasts future asset maintenance, prevent unnecessary purchases of new assets
Help prevent the spread of infection
- Provide location history that pinpoints equipment associated with an infectious patient.
Level 1: IoT “devices” – Analog to digital conversion, generating data, messages are queued (over-the-net).
Level 2: Communicating with and between Level 1 devices, Reliable delivery, switching/routing, various protocols & protocol translation, network security
Level 3: Data filtering, cleanup & aggregation, Packet inspection, data analytics, thresholding, event generation
Level 4: Convert data-in-motion to data-at-rest, convert device data structure to storage data structure, reduce data through filtering
Level 5: Create application schemas and views of data, combine multiple sources, filtering/selecting/projecting/reformatting data, reconciles differences (shape, format….)
Level 6: Control Applications, Vertical and Mobile Applications, BI and Analytics
Level 7: Involving end-user (people) and business processes
Device Control
- Configure (from the device provider)
- Status (from the device provider)
Device Interactions- Discovery- Addressing- Protocol conversion
Middleware- Listeners (Zigbee), brokers (MQTT)- Event grouping / batch interactions
Data- Normalize (standardize codes for the app)- Filter (against pre-set criteria from the app)- Expand (decode/expand cryptic codes)- Aggregate (generate statistics)- Notify/alert (to the app)
Combine the functions above- Schedule (when to comm with the device)- BPM (when multiple steps are needed)
Security- Roles- Privileges
Cloud platform to connect the physical world to existing IT
Connect all existing Devices & Sensors
- Each device/sensor identified by a device model in IoT Cloud
- Programmable devices can be directly connected using client libraries
---- Bidirectional messaging between smart devices and IoT Cloud
---- Handle full lifecycle of security (registration, activation and identity)
- Sensors can be connected through programmable gateway
---- Using extensible protocol adapters gateways can communicate with sensors
---- Register sensors and handle secure, bidirectional communication
Map: shows all assets on map including floorplans
Incidents: shows incidents based on triggered rules
Places: create geofence locations, based on GPS coordinates
Asset Types: create asset types which you want to monitor
Assets: assign devices to asset types. Can assign available to asset monitoring IoT application
Rules: define rules to register incidents based on asset data. E.g. define a rule when asset leaves defined geofence
Settings: application settings to change name and/or logo