The document discusses the opportunities and challenges presented by the Internet of Things (IoT). It notes that IoT is expected to have a $3.9-11.1 trillion economic impact annually by 2025. While IoT allows for new revenue streams and improved user experiences, developing IoT projects faces many underestimated costs around hardware, software, cloud services, and security. The complexity of connecting and managing devices across end nodes, gateways and the cloud often results in delayed projects. Samsung's ARTIK IoT platform aims to address these challenges by providing a complete end-to-end solution for developing, connecting, managing and analyzing IoT devices and data.
The Internet of things describes physical objects that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
In this presentation, Divya introduces IoT and associated trends. Natasha is interested in IoT applications in the domains of smart cities and pollution reporting.
The document discusses several key protocols used in IoT applications:
1. Bluetooth, Zigbee, WirelessHART and Z-Wave are discussed as short-range wireless protocols suitable for personal area networks.
2. Long-range wide area network protocols discussed include LoRaWAN, LTE-M and NB-IoT which are designed for low-power wide area networks supporting millions of devices over large areas.
3. IEEE 802.11ah is presented as an alternative for energy-efficient WiFi designed for IoT applications in the sub-1GHz spectrum to provide longer range than typical WiFi.
The document discusses the evolution of the internet from static Web 1.0 pages to today's dynamic Web 2.0 and upcoming Web 3.0. It defines the Internet of Things (IoT) as connecting physical objects through sensors and internet connectivity. Examples discussed include connecting devices in homes, cities, healthcare, mining and law enforcement. Challenges of IoT include bandwidth, power consumption, security and data management. Standards organizations are working to address these issues and advance IoT technologies. The future may see an "Internet of Everything" connecting people, processes, data and physical things.
The document provides an overview of the Internet of Things (IoT). It defines IoT as a network of physical objects embedded with sensors, software and network connectivity that enables them to collect and exchange data. The document discusses what types of physical and virtual things can be connected in an IoT system and how they can collect and share data. It also examines common communication protocols used in IoT like UART, SPI, I2C and CAN that allow different devices to connect and exchange information over a network.
This document discusses IoT data processing. It begins by describing wireless sensor networks and key characteristics of IoT devices. It then discusses topics like in-network processing using techniques like data aggregation and Symbolic Aggregate Approximation (SAX). Publish/subscribe protocols like MQTT are also covered. The document emphasizes the need for efficient and scalable solutions to process the large volumes of data generated by IoT devices with limited resources.
The document discusses the opportunities and challenges presented by the Internet of Things (IoT). It notes that IoT is expected to have a $3.9-11.1 trillion economic impact annually by 2025. While IoT allows for new revenue streams and improved user experiences, developing IoT projects faces many underestimated costs around hardware, software, cloud services, and security. The complexity of connecting and managing devices across end nodes, gateways and the cloud often results in delayed projects. Samsung's ARTIK IoT platform aims to address these challenges by providing a complete end-to-end solution for developing, connecting, managing and analyzing IoT devices and data.
The Internet of things describes physical objects that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
In this presentation, Divya introduces IoT and associated trends. Natasha is interested in IoT applications in the domains of smart cities and pollution reporting.
The document discusses several key protocols used in IoT applications:
1. Bluetooth, Zigbee, WirelessHART and Z-Wave are discussed as short-range wireless protocols suitable for personal area networks.
2. Long-range wide area network protocols discussed include LoRaWAN, LTE-M and NB-IoT which are designed for low-power wide area networks supporting millions of devices over large areas.
3. IEEE 802.11ah is presented as an alternative for energy-efficient WiFi designed for IoT applications in the sub-1GHz spectrum to provide longer range than typical WiFi.
The document discusses the evolution of the internet from static Web 1.0 pages to today's dynamic Web 2.0 and upcoming Web 3.0. It defines the Internet of Things (IoT) as connecting physical objects through sensors and internet connectivity. Examples discussed include connecting devices in homes, cities, healthcare, mining and law enforcement. Challenges of IoT include bandwidth, power consumption, security and data management. Standards organizations are working to address these issues and advance IoT technologies. The future may see an "Internet of Everything" connecting people, processes, data and physical things.
The document provides an overview of the Internet of Things (IoT). It defines IoT as a network of physical objects embedded with sensors, software and network connectivity that enables them to collect and exchange data. The document discusses what types of physical and virtual things can be connected in an IoT system and how they can collect and share data. It also examines common communication protocols used in IoT like UART, SPI, I2C and CAN that allow different devices to connect and exchange information over a network.
This document discusses IoT data processing. It begins by describing wireless sensor networks and key characteristics of IoT devices. It then discusses topics like in-network processing using techniques like data aggregation and Symbolic Aggregate Approximation (SAX). Publish/subscribe protocols like MQTT are also covered. The document emphasizes the need for efficient and scalable solutions to process the large volumes of data generated by IoT devices with limited resources.
Impact for Educational Institutions, Internet of things, Digital Enablers, New Age Production, Smart Factory, New digital industrial technology, Interdisciplinary Thinking, Digital Work Place, 3d printing,
This document provides an overview of wireless sensor networks (WSNs), including their technologies, applications, standards, design features, and evolutions. WSNs enable new applications through spatially distributed sensors that monitor physical conditions and wirelessly transmit data to a central location. They require a balance between communication and processing capabilities given constraints like low power and complexity. The IEEE 802.15.4 standard enables many WSN applications. Performance depends on network size and data type. Sensors are key network components that detect physical properties and convert them to signals. Common sensor types include thermal, electromagnetic, mechanical, and motion sensors. WSNs face unique challenges from ad hoc deployment and constrained node resources.
IoT Meets the Cloud: The Origins of Edge ComputingMaria Gorlatova
History of edge computing: IoT meets the cloud. Lecture delivered as part of Duke University Electrical and Computer Engineering / Computer Science Special Topics course on Edge Computing designed and developed by the instructor.
The document discusses the Internet of Things (IoT). It defines IoT as connecting "things" or objects to the Internet. It traces the origins and development of IoT from 1999 when the term was coined to its growth in recent years. The document also outlines IoT architecture including devices, gateways, protocols and cloud platforms. It examines applications of IoT in various sectors like home automation, transportation, healthcare, agriculture, smart grids and smart cities. Finally, it analyzes challenges to IoT adoption like sensing environments, connectivity standards, power consumption and security/privacy issues.
The document defines and discusses the Internet of Things (IoT). It provides a definition of IoT as interconnected devices that can transfer data over a network without human interaction. It then explains how IoT works through sensors that collect data, connectivity to transfer the data, data processing, and user interfaces. Examples of IoT devices are given like smart lightbulbs and thermostats. Benefits to organizations are outlined as well as the importance of IoT. Applications and challenges are also summarized.
The document outlines a syllabus for an Internet of Things Technology course. It includes 5 modules that will be covered over the semester. Evaluation will consist of 3 internal assessments weighted at 30%, 40%, and 30% respectively, covering different portions of the syllabus. Students must attain a minimum of 85% attendance and assignments will be due before each internal assessment. The class website and online testing platform are also indicated.
This document provides an introduction to Internet of Things (IoT) and smart cities. It discusses Kevin Ashton who coined the term "Internet of Things" and his vision for using data to increase efficiency. Key enabling technologies for IoT like cheap sensors, bandwidth, processing and wireless coverage are outlined. Examples of IoT applications in various sectors like manufacturing, transportation, agriculture and smart cities are provided. The document also discusses challenges in making sense of the large amounts of data generated by IoT devices and the importance of a citizen-centric approach to building smart cities by leveraging crowdsourcing and citizen engagement.
This document discusses machine-to-machine (M2M) communication and its differences from the Internet of Things (IoT). It also describes software-defined networking (SDN) and network function virtualization (NFV) and their potential applications to IoT. M2M uses local area networks with proprietary protocols while IoT connects devices globally using IP. SDN separates the control plane from the data plane to simplify network management while NFV virtualizes network functions on commodity servers.
The slides defines IoT and show the differnce between M2M and IoT vision. It then describes the different layers that depicts the functional architecture of IoT, standard organizations and bodies and other IoT technology alliances, low power IoT protocols, IoT Platform components, and finally gives a short description to one of IoT low power application protocols (MQTT).
Through this presentation, you will get to know about Edge computing and explore the fields where it is needed.
You can start exploring the technical knowledge by seeing what industries are working on now-days
Edge computing is becoming a key architectural component for industrial IoT deployments. Gartner Group identifies edge computing as one of their top Tech Trends for 2019. The opportunity to process data at the edge of the network, closer to the sensors and actuators, before data is sent to the cloud results in improved security, more efficient data movement, and better performance for industrial IoT use cases.
This presentation will explore three aspects of edge computing:
The benefits of edge computing for industrial IoT use cases
The key features delivered in edge computing solutions
A survey of different edge computing options available to customers.
This document discusses edge computing, which brings computation and data storage closer to where it is needed to improve response times and save bandwidth. Edge computing processes data from internet of things devices at the edge of the network rather than sending all the data to centralized data centers. This helps address issues with quality of service from increased latency and bandwidth limitations that arise from the massive amount of data generated by IoT devices. The document reviews definitions of edge computing, compares it to existing cloud-based systems, describes its architecture and applications, and outlines advantages like faster response times and cost effectiveness versus disadvantages like higher maintenance costs.
The document discusses the future of the Internet of Things (IoT). It defines IoT as connecting physical devices to exchange data and integrate the physical world into computer systems. The architecture of IoT is described as having four layers - a sensor layer to collect real-time data, a gateway layer to support communication, a service layer to analyze data, and an application layer for user interfaces. Challenges of IoT include scalability, standardization, and data volumes. Applications are in smart homes, cities, grids, cars, health, and supply chains. The future of IoT is vast due to advances enabling integration across devices.
This document provides an overview of Internet of Things (IoT) concepts including what IoT is, sample IoT devices, difference between microcontrollers and microprocessors, popular IoT hardware platforms, categories of IoT, connectivity approaches, protocols, frameworks, tools and cloud platforms. Key topics covered include common IoT devices, how IoT systems connect devices to apps and the cloud, open source frameworks for device integration, and platforms for ingesting and analyzing IoT data.
Edge computing is a distributed computing paradigm that brings computation and data storage closer to the sources of data. This ppt contains everything about Edge Computing Starting from its Definition, needs, terms involved to its merits, demerits and application use cases
The document discusses the key components of Industry 4.0, which aims to create a new phase of value chain organization through advanced manufacturing technologies. The three main components are horizontal integration between corporations, vertical integration of factory subsystems, and end-to-end digital integration across the product lifecycle. Horizontal integration allows information and materials to flow between cooperating corporations, while vertical integration creates flexible manufacturing systems through integration of sensors, controls and other subsystems. End-to-end engineering integration digitally connects all stages from design to recycling to enable customized product development.
An IoT gateway bridges communication between devices, sensors, systems and the cloud. It offers local processing and storage, and can autonomously control devices based on sensor data. IoT gateways aggregate, process and filter data for secure transmission from the edge to the cloud. They bridge different sensing domain protocols with network domain protocols through protocol conversion and multi-interface connectivity to various wireless standards. Common features of IoT gateways include supporting multiple interfaces, protocol conversion, manageability, and acting as a bridge between sensing and network domains.
State of the market for IoT/IIoT and the cloud: What are the emerging opportunities for using interconnected devices and the cloud to provide enterprises with operational efficiencies and more effective mobility?
Cloud computing refers to applications and services delivered over the Internet. It provides on-demand access to shared computing resources like servers, storage, databases and software that can be provisioned with minimal management effort. Major cloud service models include SaaS, PaaS and IaaS. The cloud computing market is growing rapidly with major players like Amazon, Microsoft and Google dominating different segments. Emerging services like STaaS, Daas and Caas are facilitating wider cloud adoption.
This document provides an overview of the course "Cloud Computing" including details about the textbook, instructor, units, and topics covered. The first unit introduces cloud computing concepts such as the history, definitions, characteristics, benefits, and computing platforms/technologies including Amazon Web Services, Google AppEngine, and Microsoft Azure. It also discusses principles of parallel and distributed computing including eras of computing, differences between parallel and distributed models, and hardware architectures.
Impact for Educational Institutions, Internet of things, Digital Enablers, New Age Production, Smart Factory, New digital industrial technology, Interdisciplinary Thinking, Digital Work Place, 3d printing,
This document provides an overview of wireless sensor networks (WSNs), including their technologies, applications, standards, design features, and evolutions. WSNs enable new applications through spatially distributed sensors that monitor physical conditions and wirelessly transmit data to a central location. They require a balance between communication and processing capabilities given constraints like low power and complexity. The IEEE 802.15.4 standard enables many WSN applications. Performance depends on network size and data type. Sensors are key network components that detect physical properties and convert them to signals. Common sensor types include thermal, electromagnetic, mechanical, and motion sensors. WSNs face unique challenges from ad hoc deployment and constrained node resources.
IoT Meets the Cloud: The Origins of Edge ComputingMaria Gorlatova
History of edge computing: IoT meets the cloud. Lecture delivered as part of Duke University Electrical and Computer Engineering / Computer Science Special Topics course on Edge Computing designed and developed by the instructor.
The document discusses the Internet of Things (IoT). It defines IoT as connecting "things" or objects to the Internet. It traces the origins and development of IoT from 1999 when the term was coined to its growth in recent years. The document also outlines IoT architecture including devices, gateways, protocols and cloud platforms. It examines applications of IoT in various sectors like home automation, transportation, healthcare, agriculture, smart grids and smart cities. Finally, it analyzes challenges to IoT adoption like sensing environments, connectivity standards, power consumption and security/privacy issues.
The document defines and discusses the Internet of Things (IoT). It provides a definition of IoT as interconnected devices that can transfer data over a network without human interaction. It then explains how IoT works through sensors that collect data, connectivity to transfer the data, data processing, and user interfaces. Examples of IoT devices are given like smart lightbulbs and thermostats. Benefits to organizations are outlined as well as the importance of IoT. Applications and challenges are also summarized.
The document outlines a syllabus for an Internet of Things Technology course. It includes 5 modules that will be covered over the semester. Evaluation will consist of 3 internal assessments weighted at 30%, 40%, and 30% respectively, covering different portions of the syllabus. Students must attain a minimum of 85% attendance and assignments will be due before each internal assessment. The class website and online testing platform are also indicated.
This document provides an introduction to Internet of Things (IoT) and smart cities. It discusses Kevin Ashton who coined the term "Internet of Things" and his vision for using data to increase efficiency. Key enabling technologies for IoT like cheap sensors, bandwidth, processing and wireless coverage are outlined. Examples of IoT applications in various sectors like manufacturing, transportation, agriculture and smart cities are provided. The document also discusses challenges in making sense of the large amounts of data generated by IoT devices and the importance of a citizen-centric approach to building smart cities by leveraging crowdsourcing and citizen engagement.
This document discusses machine-to-machine (M2M) communication and its differences from the Internet of Things (IoT). It also describes software-defined networking (SDN) and network function virtualization (NFV) and their potential applications to IoT. M2M uses local area networks with proprietary protocols while IoT connects devices globally using IP. SDN separates the control plane from the data plane to simplify network management while NFV virtualizes network functions on commodity servers.
The slides defines IoT and show the differnce between M2M and IoT vision. It then describes the different layers that depicts the functional architecture of IoT, standard organizations and bodies and other IoT technology alliances, low power IoT protocols, IoT Platform components, and finally gives a short description to one of IoT low power application protocols (MQTT).
Through this presentation, you will get to know about Edge computing and explore the fields where it is needed.
You can start exploring the technical knowledge by seeing what industries are working on now-days
Edge computing is becoming a key architectural component for industrial IoT deployments. Gartner Group identifies edge computing as one of their top Tech Trends for 2019. The opportunity to process data at the edge of the network, closer to the sensors and actuators, before data is sent to the cloud results in improved security, more efficient data movement, and better performance for industrial IoT use cases.
This presentation will explore three aspects of edge computing:
The benefits of edge computing for industrial IoT use cases
The key features delivered in edge computing solutions
A survey of different edge computing options available to customers.
This document discusses edge computing, which brings computation and data storage closer to where it is needed to improve response times and save bandwidth. Edge computing processes data from internet of things devices at the edge of the network rather than sending all the data to centralized data centers. This helps address issues with quality of service from increased latency and bandwidth limitations that arise from the massive amount of data generated by IoT devices. The document reviews definitions of edge computing, compares it to existing cloud-based systems, describes its architecture and applications, and outlines advantages like faster response times and cost effectiveness versus disadvantages like higher maintenance costs.
The document discusses the future of the Internet of Things (IoT). It defines IoT as connecting physical devices to exchange data and integrate the physical world into computer systems. The architecture of IoT is described as having four layers - a sensor layer to collect real-time data, a gateway layer to support communication, a service layer to analyze data, and an application layer for user interfaces. Challenges of IoT include scalability, standardization, and data volumes. Applications are in smart homes, cities, grids, cars, health, and supply chains. The future of IoT is vast due to advances enabling integration across devices.
This document provides an overview of Internet of Things (IoT) concepts including what IoT is, sample IoT devices, difference between microcontrollers and microprocessors, popular IoT hardware platforms, categories of IoT, connectivity approaches, protocols, frameworks, tools and cloud platforms. Key topics covered include common IoT devices, how IoT systems connect devices to apps and the cloud, open source frameworks for device integration, and platforms for ingesting and analyzing IoT data.
Edge computing is a distributed computing paradigm that brings computation and data storage closer to the sources of data. This ppt contains everything about Edge Computing Starting from its Definition, needs, terms involved to its merits, demerits and application use cases
The document discusses the key components of Industry 4.0, which aims to create a new phase of value chain organization through advanced manufacturing technologies. The three main components are horizontal integration between corporations, vertical integration of factory subsystems, and end-to-end digital integration across the product lifecycle. Horizontal integration allows information and materials to flow between cooperating corporations, while vertical integration creates flexible manufacturing systems through integration of sensors, controls and other subsystems. End-to-end engineering integration digitally connects all stages from design to recycling to enable customized product development.
An IoT gateway bridges communication between devices, sensors, systems and the cloud. It offers local processing and storage, and can autonomously control devices based on sensor data. IoT gateways aggregate, process and filter data for secure transmission from the edge to the cloud. They bridge different sensing domain protocols with network domain protocols through protocol conversion and multi-interface connectivity to various wireless standards. Common features of IoT gateways include supporting multiple interfaces, protocol conversion, manageability, and acting as a bridge between sensing and network domains.
State of the market for IoT/IIoT and the cloud: What are the emerging opportunities for using interconnected devices and the cloud to provide enterprises with operational efficiencies and more effective mobility?
Cloud computing refers to applications and services delivered over the Internet. It provides on-demand access to shared computing resources like servers, storage, databases and software that can be provisioned with minimal management effort. Major cloud service models include SaaS, PaaS and IaaS. The cloud computing market is growing rapidly with major players like Amazon, Microsoft and Google dominating different segments. Emerging services like STaaS, Daas and Caas are facilitating wider cloud adoption.
This document provides an overview of the course "Cloud Computing" including details about the textbook, instructor, units, and topics covered. The first unit introduces cloud computing concepts such as the history, definitions, characteristics, benefits, and computing platforms/technologies including Amazon Web Services, Google AppEngine, and Microsoft Azure. It also discusses principles of parallel and distributed computing including eras of computing, differences between parallel and distributed models, and hardware architectures.
Insurtech, Cloud and Cybersecurity - Chartered Insurance InstituteHenrique Centieiro
Nov. 2020 presentation on Insurtech, how cloud is enabling insurtech and cybersecurity for cloud and insurtech.
Prepared by Henrique Centieiro for CII - Chartered Insurance Institute Hong Kong
Cloud computing refers to delivering computing services over the Internet. It allows users to access on-demand resources like storage, processing power, and software applications without maintaining physical infrastructure. Key characteristics of cloud computing include on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Cloud services can be deployed via public, private, hybrid, or community models. Common service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Introduction of Cloud Computing & Historical Background
Cloud Service Models & Cloud Deployment Models
Benefits of Cloud Computing
Risks and Challenges
Future Trends in Cloud Computing
Edge Computing, Serverless Computing, AI & Machine Learning in Cloud, Security and
Compliance
Needs and Obstacles for Cloud Deployment
Conclusion
This was presented at 2009 Web World Conference.
The presentation analyzes some trends of cloud computing, and prospects the futures of cloud computing.
Cloud computing is a revolution in IT that provides great job opportunities. It uses shared computing resources over the Internet instead of local servers or personal devices. There are different types of cloud including public, private, and hybrid. Cloud services include SaaS, PaaS, and IaaS. Cloud provides advantages like scalability, availability, and pay-per-use which reduces costs. Major cloud providers are expanding offerings and making acquisitions. Cloud jobs are expected to grow significantly in coming years.
Cloud computing refers to delivering computing services over the internet. It allows users to access resources and services on-demand without needing local infrastructure. Key characteristics include on-demand self-service, broad network access, resource pooling for efficient utilization, and rapid elasticity of resources. Deployment models include public, private, hybrid, and community clouds. Service models are infrastructure as a service, platform as a service, and software as a service. Cloud computing provides benefits such as cost savings, flexibility, scalability, and reliability.
Cloud computing refers to delivering computing services over the internet. It allows users to access resources and services on-demand without needing local infrastructure. Key characteristics include on-demand self-service, broad network access, resource pooling for efficient utilization, and rapid elasticity of resources. Deployment models consist of public, private, and hybrid clouds. Service models are infrastructure as a service, platform as a service, and software as a service. Cloud computing provides benefits such as cost savings, scalability, flexibility, reliability, and collaboration.
Cloud computing refers to delivering computing services over the internet. It allows users to access resources and services on-demand without needing local infrastructure. Key characteristics include on-demand self-service, broad network access, resource pooling for efficient utilization, and rapid elasticity of resources. Deployment models consist of public, private, and hybrid clouds. Service models are infrastructure as a service, platform as a service, and software as a service. Cloud computing provides benefits such as cost savings, scalability, flexibility, reliability, and collaboration.
This document provides an overview of cloud computing concepts and platforms from leading cloud providers like Amazon Web Services, Google App Engine, and Microsoft Azure. It discusses cloud characteristics like on-demand access and elastic scaling. It also covers the three main service models (IaaS, PaaS, SaaS) and four deployment models (public, private, hybrid, community). The document reviews features of each provider's cloud environment and compares their computing, storage, and database offerings. It provides an example cost calculation for storing and accessing data on different cloud platforms.
The document provides an overview of cloud computing, including its key concepts and components. It discusses the different deployment models (public, private, hybrid, community clouds), service models (IaaS, PaaS, SaaS), characteristics, benefits, history and evolution. Communication protocols used in cloud computing like HTTP, HTTPS and various RPC implementations are also mentioned. The role of open standards in cloud architecture including virtualization, SOA, open-source software and web services is assessed.
The document provides an introduction to cloud computing, including its key characteristics, deployment models, service models, architecture, benefits, and use cases. It defines cloud computing as the delivery of computing services over the internet, allowing users to access resources and services on-demand without needing local infrastructure. The document outlines the main characteristics, deployment options, and service models of cloud computing.
Now a days the work is being done by hiring the space and resources from the cloud providers in order to do work effectively and less costly. This paper describes the cloud, its challenges, evolution, attacks along with the approaches required to handle data on cloud. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. The need of this review paper is to provide the awareness of the current emerging technology which saves the cost of users.
Cloud computing provides on-demand access to shared computing resources that can be rapidly provisioned with minimal management effort. It has characteristics of on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Cloud computing provides advantages like cost reduction, universal access, flexibility, and potential environmental benefits. Factors driving adoption include consumerization of IT, economic pressures, globalization, workforce trends, and the rise of data and analytics. Concerns include technology maturity, lack of standards, and security concerns.
Cloud-Computing.pptx for exam it will help to youf2355810
Cloud computing allows accessing computing resources from anywhere without needing physical infrastructure. It offers scalability, flexibility, and cost savings by reducing upfront investments and maintenance costs. There are different types of cloud including public, private, and hybrid clouds. Common cloud services are SaaS, PaaS, and IaaS. Major cloud providers include AWS, Microsoft Azure, and Google Cloud Platform. The future of cloud computing involves continued evolution enabling new innovations.
This document provides an overview of AWS Cloud solutions from Dony Riyanto. It begins with introducing basic concepts of cloud computing, trends, experiences, and future predictions. It then discusses what AWS is, compares AWS to other cloud providers, and the technologies used by AWS like virtualization. It outlines several AWS services including EC2, IAM, S3, RDS, and Lambda. It discusses strategies for learning AWS and concludes with an introduction to cloud computing fundamentals.
SRE Demystified - 16 - NALSD - Non-Abstract Large System DesignDr Ganesh Iyer
This document discusses Non-abstract Large System Design (NALSD), an iterative process for designing distributed systems. NALSD involves designing systems with realistic constraints in mind from the start, and assessing how designs would work at scale. It describes taking a basic design and refining it through iterations, considering whether the design is feasible, resilient, and can meet goals with available resources. Each iteration informs the next. NALSD is a skill for evaluating how well systems can fulfill requirements when deployed in real environments.
According to Google, SRE is what you get when you treat operations as if it’s a software problem. In this video, I briefly explain key SRE processes. Video: https://youtu.be/BdFmRJAnB6A
This document discusses various types of documents used by SRE teams at Google for different purposes:
1. Quarterly service review documents and presentations that provide an overview of a service's performance, sustainability, risks, and health to SRE leadership and product teams.
2. Production best practices review documents that detail an SRE team's website, on-call health, projects vs interrupts, SLOs, and capacity planning to help the team adopt best practices.
3. Documents for running SRE teams like Google's SRE workbook that provide guidance on engagement models.
4. Onboarding documents like training materials, checklists, and role-playing drills to help new SREs.
SRE Demystified - 12 - Docs that matter -1 Dr Ganesh Iyer
According to Google, SRE is what you get when you treat operations as if it’s a software problem. In this video, I briefly explain important documents required for onboarding new services, running services and production products.
Youtube video here: https://youtu.be/Uq5jvBdox48
According to Google, SRE is what you get when you treat operations as if it’s a software problem. In this video, I briefly explain the term SRE (Site Reliability Engineering) and introduce key metrics for an SRE team SLI, SLO, and SLA.
Youtube Channel here: https://www.youtube.com/playlist?list=PLm_COkBtXzFq5uxmamT0tqXo-aKftLC1U
According to Google, SRE is what you get when you treat operations as if it’s a software problem. In this video, I briefly explain continuous release engineering and configuration management.
Youtube channel here: https://youtu.be/EgpCw15fIK8
According to Google, SRE is what you get when you treat operations as if it’s a software problem. In this video, I briefly explain what is release engineering and important release engineering philosophies.
Youtube channel here: https://youtu.be/EgpCw15fIK8
SRE aims to balance system stability and agility by pursuing simplicity. The key aspects of simplicity according to SRE are minimizing accidental complexity, reducing software bloat through unnecessary lines of code, designing minimal yet effective APIs, creating modular systems, and implementing single changes in releases to easily measure their impact. The ultimate goal is reliable systems that allow for developer agility.
According to Google, SRE is what you get when you treat operations as if it’s a software problem. In this video, I briefly explain various practical alerting considerations and views from Google.
Youtube channel here: https://youtu.be/EgpCw15fIK8
According to Google, SRE is what you get when you treat operations as if it’s a software problem. In this video, I briefly explain distributed monitoring concepts.
Youtube channel here: https://youtu.be/EgpCw15fIK8
According to Google, SRE is what you get when you treat operations as if it’s a software problem. In this video, I briefly explain what is and isn't toil, how to identify, measure and eliminate them.
Youtube channel here: https://youtu.be/EgpCw15fIK8
According to Google, SRE is what you get when you treat operations as if it’s a software problem. In this video, I briefly explain how SREs engage with other teams especially service owners / developers.
Youtube channel here: https://youtu.be/EgpCw15fIK8
According to Google, SRE is what you get when you treat operations as if it’s a software problem. In this video, I briefly explain different SLIs typically associated with a system. I will explain Availability, latency and quality SLIs in brief.
Youtube channel here: https://youtu.be/EgpCw15fIK8
Machine Learning for Statisticians - IntroductionDr Ganesh Iyer
Introduction to Machine Learning for Statisticians. From the webinar given for Sacred Hearts College, Tevara, Ernakulam, India on 8/8/2020. It briefly introduces ML concepts and what does it mean for statisticians.
Making Decisions - A Game Theoretic approachDr Ganesh Iyer
Webinar recording of the webinar conducted on 18-07-2020 for Rajagiri School of Engineering and Technology.
Speaker - Dr Ganesh Neelakanta Iyer
Topics:
Overview of Game Theory, Non cooperative games, cooperative games and mechanism design principles.
Game Theory and its engineering applications delivered at ViTECoN 2019 at VIT, Vellore. It gives introduction to types of games, sample from different engineering domains
Machine learning and its applications was a gentle introduction to machine learning presented by Dr. Ganesh Neelakanta Iyer. The presentation covered an introduction to machine learning, different types of machine learning problems including classification, regression, and clustering. It also provided examples of applications of machine learning at companies like Facebook, Google, and McDonald's. The presentation concluded with discussing the general machine learning framework and steps involved in working with machine learning problems.
Characteristics of successful entrepreneurs, How to start a business, Habits of successful entrepreneurs, Some highly successful entrepreneurs - Walt Disney, Small kids who are very successful
Introduction to dockers and kubernetes. Learn how this helps you to build scalable and portable applications with cloud. It introduces the basic concepts of dockers, its differences with virtualization, then explain the need for orchestration and do some hands-on experiments with dockers
Containerization Principles Overview for app development and deploymentDr Ganesh Iyer
This is the slide deck from recent Workshop conducted as part of IEEE INDICON 2018 on Containerization principles for next-generation application development and deployment.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Cloud and Industry4.0
1. Cloud and Industry 4.0 –
A Match made in the heaven
ganesh.vigneswara@gmail.com, ni_ganesh@cb.amrita.edu
Dr Ganesh Neelakanta Iyer
Amrita Vishwa Vidyapeetham
Associate Professor, Dept of Computer Science and Engg
Amrita School of Engineering, Coimbatore
2. About Me • Associate Professor, Amrita Vishwa Vidyapeetham
• Masters & PhD from National University of Singapore (NUS)
• Several years in Industry/Academia
• Architect, Manager, Technology Evangelist, Visiting Faculty
• Talks/workshops in USA, Europe, Australia, Asia
• Cloud/Edge Computing, IoT, Software Engineering, Game
Theory, Machine Learning
• Kathakali Artist, Composer, Speaker, Traveler, Photographer
GANESHNIYER http://ganeshniyer.com
3. Agenda
Introduction
Challenges of today’s world
Industry 4.0
Cloud Computing
Cloud and Industry 4.0
Fog and Edge Computing
Technology enablers of
Industry 4.0
ML and DL with Cloud
Services
Platforms
Infrastructure
Robotics and Cloud
IoT/IIoT and Cloud
Challenges and Best
Practices
4. DISCLAIMER
• Materials in this slides are taken with the help of google.
Due credit of the materials goes to the original people
• For all guys who are forced to be here today, please enjoy
Dilbert cartoons and pictures of countries I have been
• No MATHEMATICAL Formula in this 250 slide deck. Deal?
5. The Challenges of today’s world
Slides credit:
Fred Streefland
Cyber Security Strategist EMEA
Paloalto Networks
20. Cloud Computing - A vision to reality
Three decades ago, John Gage
(Sun Microsystems) made the
prophetic statement that:
“The network is the computer.”
Twenty-five years later, the advent
of Cloud Computing has finally
made this a reality.
Dr Ganesh Neelakanta Iyer 20
http://www.tmforum.org/CloudServicesBrokerage/10617/home.html
http://cloudcomputingcompaniesnow.com
http://archive.opengroup.org/public/member/q400/gage.jpg
21. Definition of Cloud Computing
21
NIST defines Cloud Computing as1: “Cloud computing is a model for
enabling ubiquitous, convenient, on-demand network access to a
shared pool of configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort or service
provider interaction.”
[1] P. Mell and T. Grance. The NIST definition of cloud computing. NIST Special Publication 800-145, 2011.
http://cloudcomputingcompaniesnow.com/
24. Cloud Delivery Models....
Software as a Service
(SaaS)
Platform as a Service
(PaaS)
Infrastructure as a Service
(IaaS)
CloudServiceModels
A software distribution model in which applications are hosted
by a service provider and made available to customers over
Internet
A way to rent resources (e.g. hardware, operating systems etc)
over the Internet. The service delivery model allows the customer
to rent virtualized servers and associated services for running
existing applications or developing and testing new ones.
A provision model in which an organization outsources the
equipment used to support operations, including storage,
hardware, servers and networking components.
25. SaaS
• Software as a service
• Ready made software
which can be altered to
suit your requirements
• Often delivered from a
public server (public
cloud)
Dr Ganesh Neelakanta Iyer 25
27. SaaS: Starbucks
Starbucks wanted to know what
customers think about them
• Wanted a quick customized
CRM application
• Starbucks used Salesforce's
Force.com service to quickly
build out websites that tie into
new customer campaigns, as
the coffee giant attempts to
transform it business
28. What is driving the move to SaaS?
Market dynamics and disruptive technologies are driving the shift to SaaS consumption models
Developers want
Lines of Business want CxOs want
Low touch, easy to consume,
continuously updated software
SocialMobile
Embedded Intelligence
Cloud
Big Data
Predictability
Lower costs
Quicker business value
Access from anywhere
To create new offerings by
composing services from
multiple providers
IT Operations wants
To manage on-premise, Cloud, and hybrid environments
29. IaaS
• Raw infrastructure provided
to users
– Compute resources
– Storage
– Database
• Users can do whatever they
want to on that IaaS offering
Dr Ganesh Neelakanta Iyer 29
30. IaaS: Netflix
• Needed an infrastructure to manage heavy lifting – Off load all
infrastructure complexity
• AWS helped achieve scalability, productivity, adapt to new features
• Netflix now: 86M users, 190 countries, 150M hours of streaming per day,
3 AWS regions and 12 availability zones, 100,000+ AWS instances
Dr Ganesh Neelakanta Iyer 30
31. PaaS
• Platform as a service (PaaS) is a complete development and
deployment environment in the cloud, with resources that enable you
to deliver everything from simple cloud-based apps to sophisticated,
cloud-enabled enterprise applications
• You purchase the resources you need from a cloud service
provider on a pay-as-you-go basis and access them over a secure
Internet connection
• Like IaaS, PaaS includes infrastructure—servers, storage and
networking—but also middleware, development tools, business
intelligence (BI) services, database management systems and more
• PaaS is designed to support the complete web application lifecycle:
building, testing, deploying, managing and updating
Dr Ganesh Neelakanta Iyer 31
32. PaaS: Dominos
For Dominos, already more than 60 per cent of
orders come through the online system. Scalability
and availability are crucial
• Underpinning that is a highly scalable, robust, reliable platform that can be deployed right around the
world, reaching each and every customer wherever they are and whenever they want us
• All their core business systems – their digital ordering systems, Dynamics ERP, back office
operations and supply chain systems – are in Microsoft cloud platform.
33. Cloud Delivery Models in a nutshell
Dr Ganesh Neelakanta Iyer 33
Hosted
applications/apps
Development tools,
database management,
business analytics
Operating systems Servers and storage Networking
firewalls/security
Data center physical
plant/building
35. 1. On-demand self service
• Cloud computing resources can be
provisioned without human interaction
from the service provider
• In other words, a customer can
provision additional computing
resources as needed without going
through the cloud service provider
• This can be a storage space, virtual
machine instances, database
instances, and so on
Dr Ganesh Neelakanta Iyer 35
36. 2. Broad network access
• Capabilities are available
over the network and
accessed through
standard mechanisms that
promote use by
heterogeneous thin or
thick client platforms (e.g.,
mobile phones, tablets,
laptops, and workstations)
• Network bandwidth and
latency are very important
Dr Ganesh Neelakanta Iyer 36
37. 3. Multi-tenancy and resource pooling
• Multi-tenancy allows multiple
customers to share the same
applications or the same physical
infrastructure while retaining privacy
and security over their information
• Resource pooling means that
multiple customers are serviced from
the same physical resources
• Providers' resource pool should be
very large and flexible enough to
service multiple client requirements
and to provide for economy of scale.
Dr Ganesh Neelakanta Iyer 37
38. 4. Rapid elasticity and scalability
• Ability to quickly provision
resources in the cloud as
customer need them
• And then to remove them when
they don't need them
• Cloud computing resources can
scale up or down rapidly and, in
some cases, automatically, in
response to business demands
• Elasticity means rapidly provision
and de-provision any of the cloud
computing resources
Dr Ganesh Neelakanta Iyer 38
39. 5. Measured Service
• Ability to quickly provision
resources in the cloud as
customer need them
• And then to remove them when
they don't need them
• Cloud computing resources can
scale up or down rapidly and, in
some cases, automatically, in
response to business demands
• Elasticity means rapidly provision
and de-provision any of the cloud
computing resources
Dr Ganesh Neelakanta Iyer 39
41. Deployment
deployment
dɪˈplɔɪm(ə)nt/
Noun
1. the movement of troops or equipment to a place or position for military
action.
"the authorities announced deployment of extra security forces in towns and
cities to prevent violence"
2. the action of bringing resources into effective action.
"the rapid deployment of high-speed cable Internet services to consumers"
42. Software Deployment
• Software deployment is all of the
activities that make a software
system available for use
– Get the software out to the
customers
– Creating Installation Packages
– Documentation – Installation Guide
etc
• Deployment strategies may vary
depending of what kind of
software we create (Web,
Desktop, Mobile), , etc.
Dr Ganesh Neelakanta Iyer 42
43. Cloud Deployment models
• Cloud allows you to deploy your applications in multiple
ways
Dr Ganesh Neelakanta Iyer 43
44. Public Cloud
• The public cloud is defined as computing services offered by
third-party providers over the public Internet, making them
available to anyone who wants to use or purchase them
• They may be free or sold on-demand, allowing customers to
pay only per usage for the CPU cycles, storage or bandwidth
they consume
• Using public cloud services generates the types of economies
of scale and sharing of resources that can reduce costs and
increase choices of technologies.
Dr Ganesh Neelakanta Iyer 44
47. Public Cloud - Features
• Cloud is open to the wide public
• Offers solutions for minimizing IT infrastructure costs
• Multi-tenancy is key
• A public cloud can offer any kind of services
• Most likely one or more datacenters constitutes the
physical infrastructure
• Pay as you use
Dr Ganesh Neelakanta Iyer 47
48. Public Cloud - concerns
• Loss of control – Provider has full control on the
infrastructure and the data lying there
• Security
• Regulatory issues
Dr Ganesh Neelakanta Iyer 48
49. Private Cloud
• Virtual distributed systems that rely on a private
infrastructure and provide internal users with dynamic
provisioning of computing resources
• Core business operations are in-house
• Key advantages
– Customer information protection
– Infrastructure ensuring SLAs
– Compliance with standard procedures and operations
• Major drawback – Inability to scale elastically on-demand
Dr Ganesh Neelakanta Iyer 49
50.
51. Virtual Private Cloud
• On-demand configurable pool of
shared computing resources
allocated within a public cloud
environment, providing a certain
level of isolation between the
different organizations using the
resources
• In a VPC, providing isolation within
the cloud, is accompanied with a
VPN function that secures, by
means of authentication and
encryption, the remote access of the
organization to its VPC cloud
resources
52. Community Cloud
• A community cloud is a cloud
service model that provides a
cloud computing solution to a
limited number of individuals or
organizations that is governed,
managed and secured
commonly by all the
participating organizations or a
third party managed service
provider
Dr Ganesh Neelakanta Iyer 52
53. Examples
• QTS Healthcare Community Cloud
• Healthcare Community Cloud provides
a solution for people at different
endpoints to access this information
conveniently and securely
• Physician groups, hospitals, health plan
administrators, healthcare
clearinghouses, and other members of
the healthcare community are
revolutionizing the way they collaborate
via the cloud
• The Northwest Regional Data Center
• Established in 1972, NWRDC initially
offered mainframe services to
universities across the state as
a community cloud system
• A self-governance model makes
NWRDC a computing cooperative of
over 70 member orgs with access to
enterprise-level services and
facilities that would be difficult and
expensive to implement individually
• Still heavily rooted in education,
NWRDC now provides services to a
wide range of universities, colleges, and
state, county, and city governments
Dr Ganesh Neelakanta Iyer 53
https://www.qtsdatacenters.com/resources/blog/2016/05/1
8/introducing-healthcare-community-cloud
https://er.educause.edu/articles/2015/8/a-
community-cloud-the-northwest-regional-data-
center
54. Hybrid Cloud
• A hybrid cloud is a computing environment
which combines a public cloud and
a private cloud by allowing data and
applications to be shared between them
• When computing and processing demand
fluctuates, hybrid cloud computing gives
businesses the ability to seamlessly scale
their on-premises infrastructure up to the
public cloud to handle any overflow -
without giving third-party datacenters
access to the entirety of their data
• Organisations gain the flexibility and
computing power of the public cloud for
basic and non-sensitive computing tasks,
while keeping business-critical applications
and data on-premises, safely behind a
company firewall.
Dr Ganesh Neelakanta Iyer 54
58. Cloud and Industry 4.0
• No matter what industry you’re in, cloud technology is a
critical enabler of the next Industrial Revolution, by providing
the means for businesses to innovate around these
technologies
– Pascal Giraud, Oracle EMEA
• The Cloud is the connective tissue of Industrie 4.0, the key
element that makes it possible to develop a production
strategy that is innovative, more effective and effcient by
leveraging sensors, artificial intelligence and robotics
– Reply Red, Consultants, UK
Dr Ganesh Neelakanta Iyer 58
59. ROI on cloud projects
Increased business flexibility and agility
• The Cloud makes it possible to scale computing power, as well as network and storage capacity, with ease, guaranteeing that infrastructural
elasticity which allows the company to cope with sudden peaks in activity
Increased operational efficiency
• Zero deployment time, with a significant reduction in operational activities and infrastructure maintenance.
Shorter innovation cycles
• Constant updating and continuous improvement of services related to the Cloud platforms, with the guarantee of maximum simplification
of the IT infrastructure.
Cost reduction
• The reduction of IT infrastructure management costs (power, UPS devices, connectivity, airconditioning, staff, etc.) and simplified maintenance
Dr Ganesh Neelakanta Iyer 59
60. Cloud Manufacturing
• process of utilizing well established
manufacturing resources, such as Enterprise
Resource Planning (ERP), through the cloud
• This way, the information can be viewed,
updated and applied at any time or place
• Cloud manufacturing was intended to handle
“big manufacturing” which means it follows the
whole manufacturing process from the
designing stage to production to maintenance
• It incorporates other key technologies such as
Industrial IoT (IIoT), CPS etc
Dr Ganesh Neelakanta Iyer 60
https://erpsoftwareblog.com/cloud/2016/06/what-is-cloud-manufacturing/ |
ERP Cloud Blog
61. Cloud Manufacturing
• Companies can already begin to envision
production not as a process, but as a genuine
service
• in the not too distant future, it will be possible to
use
– virtual plants (simple 3D printers or new generation
numerical control machines),
– located strategically close to the target consumers
(thereby reducing investments in inventory) and
– reducing the production capacity to capitalise on
sales results quickly and to adapt to changing
market conditions with flexibility
Dr Ganesh Neelakanta Iyer 61
https://erpsoftwareblog.com/cloud/2016/06/what-is-cloud-manufacturing/ |
ERP Cloud Blog
63. Edge Computing
• Edge computing is a
method of optimizing
cloud computing systems
"by taking the control of
computing applications,
data, and services away
from some central nodes
(the "core") to the other
logical extreme (the
"edge") of the Internet"
which makes contact with
the physical world -
Wikipedia
Dr Ganesh Neelakanta Iyer 63
64. Fog Computing
• Fog computing pushes intelligence
down to the local area network (LAN)
level of network architecture, processing
data in a fog node or IoT gateway
• Edge computing pushes the
intelligence, processing power, and
communication capabilities of an edge
gateway or appliance directly into
devices
• Cisco created the term fog computing
years ago to describe a layer of
computing at the edge ofthe network
that could allow pre-processed data to
be quickly and securely transported to
the cloud.
Dr Ganesh Neelakanta Iyer 64
65. Need for FOG/EDGE
• The shop floor and the assembly line are becoming
increasingly more connected
• The number of devices, such as 3D cameras, new-
generation numerical control machines and various kinds
of sensors that generate data in real time to ensure a
more efficient productive process, are actively increasing
• Internet networks are increasingly more congested and it
is impossible to reprocess salient information in a short
period of time
Dr Ganesh Neelakanta Iyer 65
66. Enabling technologies for EDGE
Cloud
Computing
Sensors and
Intelligent
objects
5G Wireless
networks
M2M
Connections
Dr Ganesh Neelakanta Iyer 66
67. Edge + Cloud
• An integrated system to run different applications very close to production
• Also connected to cloud for management of applications, remote updates
67
https://www.cleantech.com/energy-power-
shifts-from-iot-cloud-to-edge-computing/
68. Edge + Cloud
• Say you had a pattern detector that triggers an alert if there’s a rapid
rise in (equipment) temperature
– EDGE Computing - You can handle that locally by going into the control
and changing some parameters or notifying some other system on the
plant floor
• If you want to compare the average temperature of every red
machine in a plant to red machines located everywhere in the world,
each red machine at the edge computes its average temperature,
sends that result to the cloud, and then the cloud sends down the
average of all the machines to the edge
– CLOUD Computing – Aggregate Analytics
Dr Ganesh Neelakanta Iyer 68
https://www.ctemag.com/news/articles/industry-40-
advantages-edge-computing
69. Edge Computing and its relevance to
Industry 4.0
Edge computing will keep you safe
• Industry 4.0 is all about connecting machines, so your manufacturing processes can react more quickly and
intelligently to changing factory floor conditions
Edge computing will make your Big Data small
• Bringing intelligence to your manufacturing operations means collecting data from sensors in your equipment and
analyzing data to make real-time decisions and predictive maintenance
Edge computing will give you ultra-low latency
• With edge computing, you can easily connect machines from different manufacturers with an independent and
resilient logic layer running local triggers ultra-fast
Edge computing can be the integration layer between your factory floor data and your ERP
system
• Edge computing can be the real-time, event-driven integration layer between your factory floor data and your
enterprise systems that will help you speed up and automate business processes and digital insights
Dr Ganesh Neelakanta Iyer 69https://iiot-world.com/connected-industry/4-0-reasons-why-edge-computing-is-relevant-for-industry-4-0/
70. Building The Intelligent Supply Chain
• The Internet of Things (IoT) makes business applications interact with the
physical world
• Big Data makes large data sets accessible for advanced analytics and
intelligence
• Machine learning (ML) and artificial intelligence (AI) automate repetitive
processes and learn from human exception handling and decision-making
• Advanced analytics finds data patterns to support decisions and predict
the future
• Blockchain distributes collaborative processes across the entire value
network
• Data intelligence finds new value in data assets for new business models
Dr Ganesh Neelakanta Iyer 70
72. Enablers of Industry 4.0 and role of Cloud
• Cloud services for users with no ML knowledge
• Cloud platform services for expert ML guys
• Cloud Infra for deep learning
Artificial
Intelligence
• Task offloading to cloud – mobile robots
• Cloud based robotic services
• Knowledge sharing platform for robots via cloud
Robotics
• Data processing with Cloud
• Extend the processing to the edge
• IoT analytics
IoT
Dr Ganesh Neelakanta Iyer 72
75. Artificial Intelligence
• “The study of the modelling of human mental functions by
computer programs.” —Collins Dictionary
Dr Ganesh Neelakanta Iyer 75https://medium.com/life-of-a-technologist/what-would-the-managers-manage-in-
the-age-of-ai-6a00c26df257
76. Artificial Intelligence
• AI is composed of 2 words Artificial and Intelligence
• Anything which is not natural and created by humans is artificial
• Intelligence means ability to understand, reason, plan etc.
• So any code, tech or algorithm that enable machine to mimic,
develop or demonstrate the human cognition or behavior is AI
Dr Ganesh Neelakanta Iyer 76
77. Possible applications of AI
Dr Ganesh Neelakanta Iyer 77https://pbs.twimg.com/media/DUn4kQzXkAAaqGS.jpg
82. Why machine learning is hard?
Learning to identify an ‘apple’?
Apple Apple corporation Peach
Colour Red White Red
Type Fruit Logo Fruit
Shape Oval Cut oval Round
Slide credit: Edit
83. So much for a cat.
Principle of machine learning
Slide credit: Edit
87. Deep Learning
• “Deep Learning is a subfield of machine learning
concerned with algorithms inspired by the structure and
function of the brain called artificial neural networks”
—Machine Learning Mastery
Dr Ganesh Neelakanta Iyer 87
88. Deep Learning
• It’s a particular kind of machine
learning that is inspired by the
functionality of our brain cells called
neurons which lead to the concept
of artificial neural network(ANN)
• ANN is modeled using layers of
artificial neurons or computational
units to receive input and apply an
activation function along with
threshold
Dr Ganesh Neelakanta Iyer 88
https://towardsdatascience.com/cousins-of-artificial-intelligence-dda4edc27b55
89. What is Deep Learning?
Dr Ganesh Neelakanta Iyer 89
https://medium.com/swlh/ill-tell-you-why-deep-learning-is-so-popular-and-in-demand-
5aca72628780
90. AI vs ML vs DL
Dr Ganesh Neelakanta Iyer 90https://twitter.com/IainLJBrown/status/952846885651443712
92. Cloud-based Machine Learning Services
• Machine learning platforms are one of the fastest growing
services of the public cloud
• Unlike other cloud-based services, ML and AI platforms
are available through diverse delivery models such as
– cognitive computing
– automated machine learning
– ML model management
– ML model serving and
– GPU-based computing
Dr Ganesh Neelakanta Iyer 92
93. ML and AI
spectrum in Cloud
• Like the original
cloud delivery
models of IaaS,
PaaS, and SaaS,
ML and AI
spectrum span
infrastructure,
platform and high-
level services
exposed as APIs
Dr Ganesh Neelakanta Iyer 93
https://www.forbes.com/sites/janakirammsv/2019/01/01/an-executives-
guide-to-understanding-cloud-based-machine-learning-
services/#7fa721383e3e
94. Cognitive Services
• Cognitive computing is delivered as a set of APIs that offer computer
vision, natural language processing (NLP) and speech services
• Developers can consume these APIs like any other web service or
REST API
• Developers are not expected to know intricate details of machine
learning algorithms or data processing pipelines to take advantage
of these services
• As the consumption of these services rises, the quality of cognitive
services increases
• With the increase in data and usage of the services, cloud providers
are continually improving the accuracy of the predictions
Dr Ganesh Neelakanta Iyer 94
95. Automated ML
• Developers can use the APIs after training the service
with custom data
• AutoML offers a middle ground to consuming pre-trained
models vs. training custom models from scratch
• From object detection to sentiment analysis, you will be
able to tap into readily available AI services
• Think of these APIs the SaaS equivalent of AI where you
only pay for what you use
Dr Ganesh Neelakanta Iyer 95
97. Amazon Rekognition
https://aws.amazon.com/rekognition/
• Amazon Rekognition makes it easy to add image and video analysis to
your applications
• You just provide an image or video to the Rekognition API, and the service
can identify the objects, people, text, scenes, and activities, as well as
detect any inappropriate content.
• Amazon Rekognition also provides highly accurate facial analysis and
facial recognition on images and video that you provide.
• You can detect, analyze, and compare faces for a wide variety of user
verification, people counting, and public safety use cases
Dr Ganesh Neelakanta Iyer 97
98. Amazon Rekognition
https://aws.amazon.com/rekognition/
• Amazon Rekognition is based on the same proven, highly scalable,
deep learning technology developed by Amazon’s computer vision
scientists to analyze billions of images and videos daily, and requires
no machine learning expertise to use
• Amazon Rekognition is a simple and easy to use API that can
quickly analyze any image or video file stored in Amazon S3.
• Amazon Rekognition is always learning from new data, and we are
continually adding new labels and facial recognition features to the
service
Dr Ganesh Neelakanta Iyer 98
109. Google Cloud Vision API
https://cloud.google.com/products/ai/building-blocks/
• Cloud Vision offers both pretrained models via an API and the ability to
build custom models using AutoML Vision to provide flexibility depending
on your use case
• Cloud Vision API enables developers to understand the content of an
image by encapsulating powerful machine learning models in an easy-to-
use REST API
• It quickly classifies images into thousands of categories, detects individual
objects and faces within images, and reads printed words contained within
images
• You can build metadata on your image catalog, moderate offensive
content, or enable new marketing scenarios through image sentiment
analysis. Dr Ganesh Neelakanta Iyer 109
110. Google AutoML Vision
• AutoML Vision Beta makes it possible for developers
with limited machine learning expertise to train high-
quality custom models
• After uploading and labeling images, AutoML Vision will
train a model that can scale as needed to adapt to
demands
• AutoML Vision offers higher model accuracy and faster
time to create a production-ready model.
Dr Ganesh Neelakanta Iyer 110
116. Characteristics
• Insight from your images
– Easily detect broad sets of objects in your images, from flowers,
animals, or transportation to thousands of other object categories
commonly found within images
– Vision API improves over time as new concepts are introduced and
accuracy is improved. With AutoML Vision, you can create custom
models that highlight specific concepts from your images
– This enables use cases ranging from categorizing product images to
diagnosing diseases
Dr Ganesh Neelakanta Iyer 116
117. Characteristics
• Extract text
– Optical Character Recognition (OCR) enables you to detect text
within your images, along with automatic language
identification.
– Vision API supports a broad set of languages
Dr Ganesh Neelakanta Iyer 117
118. Characteristics
• Power of the web
– Vision API uses the power of Google Image Search to find
topical entities like celebrities, logos, or news events
– Millions of entities are supported, so you can be confident that
the latest relevant images are available
– Combine this with Visually Similar Search to find similar images
on the web.
Dr Ganesh Neelakanta Iyer 118
119. Characteristics
• Content moderation
– Powered by Google SafeSearch, easily moderate content and
detect inappropriate content from your crowd-sourced images
– Vision API enables you to detect different types of inappropriate
content, from adult to violent content.
Dr Ganesh Neelakanta Iyer 119
120. Image search
Use Vision API and AutoML Vision to make images searchable across broad topics and
scenes, including custom categories.
Dr Ganesh Neelakanta Iyer 120
https://cloud.google.com/solutions/image-search-app-with-cloud-vision/
121. Document classification
Access information efficiently by using the Vision and Natural Language APIs to transcribe and
classify documents.
Dr Ganesh Neelakanta Iyer 121
122. Product Search
Find products of interest within images and visually search product catalogs using Cloud Vision API
Dr Ganesh Neelakanta Iyer 122
123. Cloud Vision API features
Label
detection
Web detection
Optical
character
Handwriting
recognitionBETA Logo detection
Object
localizerBETA
Integrated
REST API
Landmark
detection
Face detection
Content
moderation
ML Kit
integration
Product
searchBETA
Image
attributes
Dr Ganesh Neelakanta Iyer 123
126. Video Intelligence
• Google also assures the Video Intelligence to perform
video analysis, classification, and labeling
• This allows searching through the videos based on the
extracted metadata
• It is also possible to detect the change of the scene and
filter the explicit content.
Dr Ganesh Neelakanta Iyer 126
127.
128.
129.
130. Microsoft Computer Vision
• Extract rich information from images to categorize and
process visual data—and perform machine-assisted
moderation of images to help curate your services
• This feature returns information about visual content found in
an image
• Use tagging, domain-specific models, and descriptions in four
languages to identify content and label it with confidence
• Apply the adult/racy settings to help you detect potential adult
content
• Identify image types and color schemes in pictures
Dr Ganesh Neelakanta Iyer 130
132. Microsoft Computer Vision
Dr Ganesh Neelakanta Iyer 132
Analyze an
image
Read text in
images
Preview: Read
handwritten
text from
images
Recognize
celebrities and
landmarks
Analyze video
in near real-
time
Generate a
thumbnail
134. ML Platform as a Service
• When cognitive APIs fall short of requirements, you can
leverage ML PaaS to build highly customized machine
learning models
• For example, while a cognitive API may be able to identify the
vehicle as a car, it may not be able to classify the car based
on the make and model
• Assuming you have a large dataset of cars labeled with the
make and model, your data science team can rely on ML
PaaS to train and deploy a custom model that’s tailormade for
the business scenario
Dr Ganesh Neelakanta Iyer 134
135. ML Platform as a Service
• Similar to PaaS delivery model where developers bring their
code and host it at scale, ML PaaS expects data scientists to
bring their own dataset and code that can train a model
against custom data
• They will be spared from provisioning compute, storage and
networking environments to run complex machine learning
jobs
• Data scientists are expected to create and test the code with
a smaller dataset in their local environments before running it
as a job in the public cloud platform
Dr Ganesh Neelakanta Iyer 135
136. ML Platform as a Service
• ML PaaS removes the friction involved in setting up and configuring data
science environments
• It provides pre-configured environments that can be used by data
scientists to train, tune, and host the model
• ML PaaS efficiently handles the lifecycle of a machine learning model by
providing tools from data preparation phase to model hosting
• They come with popular tools such as Jupyter Notebooks which are
familiar to the data scientists
• ML PaaS tackles the complexity involved in running the training jobs on a
cluster of computers
• They abstract the underpinnings through simple Python or R API for the
data scientists
Dr Ganesh Neelakanta Iyer 136
141. • Simplify and accelerate the building, training and deployment of your ML models
• Use automated ML to identify suitable algorithms and tune hyperparameters faster
• Seamlessly deploy to the cloud and the edge with one click
• Access all these capabilities from your favourite Python environment using the latest
open-source frameworks, such as PyTorch, TensorFlow and scikit-learn
142.
143. How to use Azure Machine Learning service
• Step 1: Creating
a workspace
• Install the SDK in
your favourite
Python
environment, and
create your
workspace to store
your compute
resources,
models,
deployments and
run histories in the
cloud.
Dr Ganesh Neelakanta Iyer 143
144. How to use Azure Machine Learning service
• Step 2: Build and
train
• Use frameworks of
your choice and
automated
machine learning
capabilities to
identify suitable
algorithms and
hyperparameters
faster. Track your
experiments and
easily access
powerful GPUs in
the cloud.
Dr Ganesh Neelakanta Iyer 144
145. How to use Azure Machine Learning service
• Step 3: Deploy and
manage
• Deploy models to the
cloud or at the edge
and leverage
hardware-
accelerated models
on field-
programmable gate
arrays (FPGAs) for
super-fast
inferencing. When
your model is in
production, monitor it
for performance and
data drift, and retrain
it as needed.
Dr Ganesh Neelakanta Iyer 145
146.
147. ML Infrastructure Services
• Think of ML infrastructure as the IaaS of the machine learning stack
• Cloud providers offer raw VMs backed by high-end CPUs and
accelerators such as graphics processing unit (GPU) and field
programmable gate array (FPGA)
• Developers and data scientists that need access to raw compute
power turn to ML infrastructure
• For complex deep learning projects that heavily rely on niche toolkits
and libraries, organizations choose ML infrastructure
• They get ultimate control of the hardware and software configuration
which may not be available from ML PaaS offerings
Dr Ganesh Neelakanta Iyer 147
148. ML Infrastructure Services
• Recent hardware investments from Amazon, Google,
Microsoft and Facebook, made ML infrastructure cheaper and
efficient
• Cloud providers are now offering custom hardware that’s
highly optimized for running ML workloads in the cloud
• Google’s TPU and Microsoft’s FPGA offerings are examples
of custom hardware accelerators exclusively meant for ML
jobs
• When combined with the recent computing trends such as
Kubernetes, ML infrastructure becomes an attractive choice
for enterprises
Dr Ganesh Neelakanta Iyer 148
149.
150.
151.
152.
153.
154. Deep Learning Cloud Service Providers
# Name URL
1 Alibaba https://www.alibabacloud.com
2 AWS EC2 https://aws.amazon.com/machine-learning/amis
3 AWS Sagemaker https://aws.amazon.com/sagemaker
4 Cirrascale http://www.cirrascale.com
5 Cogeco Peer 1 https://www.cogecopeer1.com
6 Crestle https://www.crestle.com
7 Deep Cognition https://deepcognition.ai
8 Domino https://www.dominodatalab.com
9 Exoscale https://www.exoscale.com
10 FloydHub https://www.floydhub.com/jobs
11 Google Cloud https://cloud.google.com/products/ai
12 Google Colab https://colab.research.google.com
13 GPUEater https://www.gpueater.com
14 Hetzner https://www.hetzner.com
15 IBM Watson https://www.ibm.com/watson
16 Kaggle https://www.kaggle.com
https://towardsdatascience.com/list-of-deep-
learning-cloud-service-providers-579f2c769ed6
157. Need for AI in Industry 4.0
• Industrial companies
often have large
amounts of data
without generating
any added value from
it. According to a
study by the World
Economics Forum in
cooperation with A.T.
Kearney is currently
70% of all collected
production data is not
used
158. Need for AI in Industry 4.0
• The development of market-ready AI tools and the availability
of scalable computing power enable manufacturers to
integrate machine learning into their processes
• By using these self-learning algorithms, companies can gain
proactive insights into production and thus become more
competitive
• Machine-learning algorithms bring two major advantages to
the production process:
– Improvement of product quality
– Flexibility of the production process
Dr Ganesh Neelakanta Iyer 158
161. Cloud Robotics
• Cloud robotics services that take the pain out of the robot
development lifecycle are a vital step forward on the path
to increased robot affordability and ease of development
Dr Ganesh Neelakanta Iyer 161
Robots as a service (plus the cloud)
• Low capital expenditures plus mad robot capabilities! Hence the rise of robot
rentals—on-location at your business—with cloud-enabled, pay-as-you-go
services attached
Robots in the cloud
• Programming a remote physical robot that’s accessible over the cloud
163. Robots in the cloud
• Democratize robotics by providing remote access
to a state-of-the-art multi-robot research facility
• The Robotarium project provides a remotely accessible swarm robotics
research platform that remains freely accessible to anyone
• Currently, Robotics research requires significant investments in terms of
manpower and resources to competitively participate
• However, we believe that anyone with new, amazing ideas should be able
to see their algorithms deployed on real robots, rather than purely
simulated
• In order to make this vision a reality, we have created a remote-access,
robotics lab where anyone can upload and test their ideas on real robotic
hardware
Dr Ganesh Neelakanta Iyer 163
164. Some newest Cloud Robotics platforms
AWS RoboMaker
• Integration of the open-source ROS framework with Amazon’s cloud-based machine learning services
Honda Robotics as a Service Platform
• Software platform (APIs/SDKs) for functions, such as collecting and sharing data, controlling
communication, changing states, and robotic cooperation
Google Cloud Robotics
• Collaborative robots, Solution for robots working at scale
Microsoft ROS for Windows
• The ROS for Windows provides your local robot with the benefits of Microsoft’s enterprise expertise
(Security, scalability) and cloud-based ML/AI services
Dr Ganesh Neelakanta Iyer 164
165. Honda RaaS
Dr Ganesh Neelakanta Iyer 165https://global.honda/innovation/CES/2019/raas_platform.html
166. IoT / IIoT and Cloud
Dr Ganesh Neelakanta Iyer 166
167. Evolution of Internet of Things
Dr Ganesh Neelakanta Iyer 167http://www.geocities.ws/cheps/internet.html
169. Industrial IoT (IIoT)
• Plant data is collected and sent for processing to the cloud, a
data center containing a group of servers connected to the
internet
• This centralized data handling system gives users a global
view of all connected equipment, which may be in a number
of different locations
• The system also allows users to quickly and easily update
software in far-flung machines
• However, “if you push everything to the cloud, you are
dependent on network connectivity up to a cloud system,”
Dr Ganesh Neelakanta Iyer 169
https://www.ctemag.com/news/articles/industry-40-
advantages-edge-computing
171. How IoT and Cloud complement each other?
171https://blog.resellerclub.com/what-is-the-role-of-cloud-computing-in-iot/
172. Why is Cloud essential to the success of
IoT?
Provides remote
processing power
• Cloud as a technology empowers IoT to move beyond
regular appliances such as air conditioners, refrigerators
etc
Provides security
and privacy
• It has enabled users with strong security measures by
providing effective authentication and encryption
protocols
Removes entry
barrier for hosting
providers
• Hosting providers do not have to depend on massive
equipment or even any kind of hardware that will not
support the agility IoT devices require
Facilitates inter-
device
communication
• Cloud acts as a bridge in the form of a mediator or
communication facilitator when it comes to IoT
Dr Ganesh Neelakanta Iyer 172
173. IIoT and challenges with Cloud
Network
Connectivity
If the network breaks down, so do critical cloud-based production
applications.
Latency it takes time for data to travel back and forth between the cloud and the
plant floor, applications that require real-time responses cannot work
properly
Data Load Consider a shop floor with 50 machines, to be monitored. Need to
collect data hundreds of times per second by a large number of
sensors.
Privacy and
Security
Firms reluctant to push secret and essential data out of their shops,
where it could be more vulnerable to theft
Dr Ganesh Neelakanta Iyer 173
179. Need Advanced Analytics and Machines to
Help Manage It
• Just as the increase in data will push companies to “the
edge,” it will also push them toward AI and ML
• Indeed, AI will also become a necessity, as the amount of
data created by the IoT will simply be too large for
humans to manage
• We will see a strong growth in analytics software and
tools to provide real-time data streaming for IoT devices
Dr Ganesh Neelakanta Iyer 179
180. Dr Ganesh Neelakanta Iyer 180https://www.accenture.com/in-en/internet-of-things-analytics
181. Dr Ganesh Neelakanta Iyer 181
https://www.accenture.com/in-en/internet-of-things-analytics
182. Example - AWS IoT Analytics
• Fully-managed service for sophisticated analytics on
massive volumes of IoT data
• Eliminate the cost and complexity typically required to
build your own IoT analytics platform
• Run analytics on IoT data and get insights to make better
and accurate decisions for IoT and ML use cases
Dr Ganesh Neelakanta Iyer 182
https://aws.amazon.com/iot-analytics/
193. and spawned an Intermodal Shipping Container Ecosystem
• 90% of all cargo now shipped in a standard container
• Order of magnitude reduction in cost and time to load and unload ships
• Massive reduction in losses due to theft or damage
• Huge reduction in freight cost as percent of final goods (from >25% to <3%) massive globalizations
• 5000 ships deliver 200M containers per year
194. Static website
Web frontend
User DB
Queue Analytics DB
Background workers
API endpoint
nginx 1.5 + modsecurity + openssl + bootstrap 2
postgresql + pgv8 + v8
hadoop + hive + thrift + OpenJDK
Ruby + Rails + sass + Unicorn
Redis + redis-sentinel
Python 3.0 + celery + pyredis + libcurl + ffmpeg + libopencv + nodejs +
phantomjs
Python 2.7 + Flask + pyredis + celery + psycopg + postgresql-client
Development VM
QA server
Public Cloud
Disaster recovery
Contributor’s laptop
Production Servers
The Challenge
Multiplicityof
Stacks
Multiplicityof
hardware
environments
Production Cluster
Customer Data Center
Doservicesand
appsinteract
appropriately?
CanImigrate
smoothlyand
quickly?
195. Results in M x N compatibility nightmare
Static website
Web frontend
Background workers
User DB
Analytics DB
Queue
Development
VM
QA Server
Single Prod
Server
Onsite
Cluster
Public Cloud
Contributor’s
laptop
Customer
Servers
? ? ? ? ? ? ?
? ? ? ? ? ? ?
? ? ? ? ? ? ?
? ? ? ? ? ? ?
? ? ? ? ? ? ?
? ? ? ? ? ? ?
196. Static website Web frontendUser DB Queue Analytics DB
Development
VM
QA server Public Cloud Contributor’s
laptop
Docker is a shipping container system for
code
Multiplicityof
Stacks
Multiplicityof
hardware
environments
Production
Cluster
Customer Data
Center
Doservicesand
appsinteract
appropriately?
CanImigrate
smoothlyand
quickly
…that can be manipulated using
standard operations and run
consistently on virtually any
hardware platform
An engine that enables any
payload to be encapsulated
as a lightweight, portable,
self-sufficient container…
197. Static website Web frontendUser DB Queue Analytics DB
Development
VM
QA server Public Cloud Contributor’s
laptop
Or…put more simply
Multiplicityof
Stacks
Multiplicityof
hardware
environments
Production
Cluster
Customer Data
Center
Doservicesand
appsinteract
appropriately?
CanImigrate
smoothlyand
quickly
Operator: Configure Once, Run
Anything
Developer: Build Once, Run
Anywhere (Finally)
198. Static website
Web frontend
Background workers
User DB
Analytics DB
Queue
Development
VM
QA Server
Single Prod
Server
Onsite
Cluster
Public Cloud
Contributor’s
laptop
Customer
Servers
Docker solves the M x N problem
199. Virtualization vs Containers
Dr Ganesh Neelakanta Iyer 199
https://blogs.msdn.microsoft.com/uk_faculty_connection/2016/09/23/gettin
g-started-with-docker-and-container-services/
202. IoT and Microservices
Low Cost
• Rely on microservices to add value and fill functional gaps; Gradually
roll out the network and continue to upgrade and maintain it in a cost-
effective manner as individual components get replaced
Faster Innovation
• A microservices development approach allows you to unlock innovation
and value faster by making it easy to test new combinations of “things”
and “services.”
• With microservices, you can tinker and test to your heart’s content and
quickly reap the benefits of innovative solutions to your problems.
http://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/Five-
things-to-know-about-the-future-of-microservices-and-IoT Dr Ganesh Neelakanta Iyer 202
203. IoT and Microservices
Isolated Risk
• Assembling your solution via microservices allows you to adjust and iterate
quickly, thus avoiding the danger of missing the mark
Flexibility and Agility
• Assembling your solution via microservices allows you to adjust and iterate
quickly, thus avoiding the danger of missing the mark
Unlimited value-add
• The digital upgrades you can provide via constantly evolving microservices,
however, are unlimited both in their scope and their frequency
• A camera may be designed to only capture 2D images, but depending on the
third-party service it’s linked to, it might provide you with statistical traffic
information, queue sizes or weather information.
http://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/Five-things-to-
know-about-the-future-of-microservices-and-IoT
Dr Ganesh Neelakanta Iyer 203
204. Deploy Azure IoT Edge on a simulated
device in Windows - preview
https://docs.microsoft.com/en-us/azure/iot-edge/tutorial-simulate-device-linux
Next slides are only for your reference; You can try it out by referring to the slides
or below URL at your spare time. It will help you understand the concepts in real.
205. Fully managed service that delivers cloud intelligence locally by deploying &
running AI, Azure services, and custom logic directly on cross-platform IoT devices
205
https://azure.microsoft.com/en-in/services/iot-edge/
Dr Ganesh Neelakanta Iyer
206. Azure IoT Edge
Next few slides help you to
• Create an IoT Hub
• Register an IoT Edge device
• Start the IoT Edge runtime
• Deploy a module
The simulated device that you
create in this tutorial is a monitor
on a wind turbine that generates
temperature, humidity, and
pressure data. You're interested in
this data because your turbines
perform at different levels of
efficiency depending on the
weather conditions. Dr Ganesh Neelakanta Iyer 206
207. Prerequisites
• This tutorial assumes that you're using a computer or virtual
machine running Windows to simulate an Internet of Things device
• Make sure you're using a supported Windows version:
– Windows 10
– Windows Server
• Install Docker for Windows and make sure it's running
• Install Python 2.7 on Windows and make sure you can use the pip
command
• Run the following command to download the IoT Edge control script
– pip install -U azure-iot-edge-runtime-ctl
Dr Ganesh Neelakanta Iyer 207
209. • Sign in to
the Azure portal -
https://portal.azur
e.com/
• Sign up
• You need to
provide a valid
credit card details
– However it is
absolutely free
– They will change
Rs2/- to see if
your card is valid
• Select Create a
resource >
Internet of Things
> IoT Hub.
Dr Ganesh Neelakanta Iyer 209
210. • In the IoT hub pane, enter the following
information for your IoT hub:
– Name: Create a name for your IoT hub. If the name
you enter is valid, a green check mark appears
– Pricing and scale tier: For this tutorial, select the F1 -
Free tier.
– Resource group: Create a resource group to host the
IoT hub or use an existing one.
– Location: Select the closest location to you
– Pin to dashboard: Check this option for easy access
to your IoT hub from the dashboard
• Click Create. Your IoT hub might take a few
minutes to create. You can monitor the progress in
the Notifications pane
Dr Ganesh Neelakanta Iyer 210
212. Register an IoT Edge device
• Create a device identity for your simulated device so that
it can communicate with your IoT hub
• In the Azure portal, navigate to your IoT hub.
• Select IoT Edge (preview) then select Add IoT Edge
Device
Dr Ganesh Neelakanta Iyer 212
213. Register an IoT
Edge device
• Create a device
identity for your
simulated device so
that it can
communicate with
your IoT hub
• In the Azure portal,
navigate to your IoT
hub.
• Select IoT Edge
(preview) then
select Add IoT Edge
Device
Dr Ganesh Neelakanta Iyer 213
214. Register an IoT Edge device
• Give your simulated device a unique device
ID.
• Select Save to add your device.
• Select your new device from the list of
devices.
• Copy the value for Connection string—
primary key and save it. You'll use this
value to configure the IoT Edge runtime in
the next section
Dr Ganesh Neelakanta Iyer 214
215. Configure the IoT Edge runtime
Install and start the Azure IoT Edge runtime on your device
Dr Ganesh Neelakanta Iyer 215
216. Configure the IoT Edge runtime
Install and start the Azure IoT Edge runtime on your device
• The IoT Edge runtime is deployed on all IoT Edge devices
• It comprises two modules
• The IoT Edge agent facilitates deployment and monitoring of
modules on the IoT Edge device
• The IoT Edge hub manages communications between
modules on the IoT Edge device, and between the device and
IoT Hub
• When you configure the runtime on your new device, only the
IoT Edge agent will start at first
• The IoT Edge hub comes later when you deploy a module
Dr Ganesh Neelakanta Iyer 216
217. Configure the IoT Edge runtime
Install and start the Azure IoT Edge runtime on your device
• Configure the runtime with your IoT Edge device connection
string from the previous section
– iotedgectl setup --connection-string "{device
connection string}" --auto-cert-gen-force-no-
passwords
• Start the runtime
– iotedgectl start
• Check Docker to see that the IoT Edge agent is running as a
module
– docker ps
Dr Ganesh Neelakanta Iyer 217
218. Deploy a Module
Manage your Azure IoT Edge device from the cloud to deploy a module which will send telemetry data to IoT Hub
Dr Ganesh Neelakanta Iyer 218
219. Deploy a Module
Manage your Azure IoT Edge device from the cloud to deploy a module which will send
telemetry data to IoT Hub
• One of the key capabilities of Azure IoT Edge is being
able to deploy modules to your IoT Edge devices from
the cloud
• An IoT Edge module is an executable package
implemented as a container
• In this section, you deploy a module that generates
telemetry for your simulated device
• In the Azure portal, navigate to your IoT hub.
– Go to IoT Edge (preview) and select your IoT Edge device.
– Select Set Modules.
– Select Add IoT Edge Module.
– In the Name field, enter tempSensor.
– In the Image URI field, enter microsoft/azureiotedge-
simulated-temperature-sensor:1.0-preview.
• Leave the other settings unchanged, and select Save
• Back in the Add modules step, select Next.
• In the Specify routes step, select Next.
• In the Review template step, select Submit
Dr Ganesh Neelakanta Iyer 219
220. Deploy a Module
Manage your Azure IoT Edge device from the cloud to deploy a module which will send telemetry data to IoT Hub
• Return to the device details page and select Refresh.
You should see the new tempSensor module running
along the IoT Edge runtime.
Dr Ganesh Neelakanta Iyer 220
221. View Generated Data
• In this tutorial, you created a new IoT Edge device and installed the IoT Edge runtime on it
• Then, you used the Azure portal to push an IoT Edge module to run on the device without having
to make changes to the device itself
• In this case, the module that you pushed creates environmental data that you can use
• Open the command prompt on the computer running your simulated device again
• Confirm that the module deployed from the cloud is running on your IoT Edge device
– docker ps
• View the messages being sent from the tempSensor module to the cloud.+
– docker logs –f tempSensor
Dr Ganesh Neelakanta Iyer 221
222. What Next?
• You can do a lot with what you have done and use the
generated data
• Stream Analytics
– Azure Stream Analytics provides a richly structured query
syntax for data analysis both in the cloud and on IoT Edge
devices
– Azure Stream Analytics (ASA) on IoT Edge empowers
developers to deploy near-real-time analytical intelligence
closer to IoT devices so that they can unlock the full value of
device-generated data
https://docs.microsoft.com/en-us/azure/iot-edge/tutorial-deploy-stream-analytics
Dr Ganesh Neelakanta Iyer 222
223. What Next?
• Machine Learning
– Analyzing real-time
sentiment on
streaming Twitter
data.
– Analyzing records
of customer chats
with support staff.
– Evaluating
comments on
forums, blogs, and
videos.
– Many other real-
time, predictive
scoring scenarios.
https://docs.microsoft.com/en-us/azure/stream-analytics/stream-analytics-machine-learning-integration-tutorial
Dr Ganesh Neelakanta Iyer 223
225. AWS IoT
• AWS IoT services enable you to easily and securely
connect and manage billions of devices
• You can gather data from, run sophisticated analytics on,
and take actions in real-time on your diverse fleet of IoT
devices from edge to the cloud
• They offer multiple solutions...
Dr Ganesh Neelakanta Iyer 225
227. AWS IoT Solutions
Amazon
FreeRTOS
IoT operating system for microcontrollers
OpenSource
AWS
Greengrass
Local compute, messaging, data caching, sync, and ML inference
capabilities for connected devices
AWS IoT
Core
Easily and securely connect devices to the cloud with an IoT platform
Reliably scale to billions of devices and trillions of messages
Dr Ganesh Neelakanta Iyer 227
228. AWS IoT Solutions
AWS IoT
Device
Management
Onboard, organize, monitor, and remotely manage
connected devices at scale
AWS IoT
Device
Defender
Security management for IoT devices
AWS IoT
Analytics
Run analytics on massive volumes of IoT data without
having to worry about all the cost and complexity typically
required to build your own IoT analytics platform
Dr Ganesh Neelakanta Iyer 228
229. AWS IoT Solutions
AWS IoT
1-Click
Trigger AWS Lambda functions from simple devices
Compute service that runs your code in response to events and
automatically manages the compute resources (Serverless computing)
AWS IoT
Button
Cloud Programmable Dash Button
Dr Ganesh Neelakanta Iyer 229
230. Challenges with Cloud and best practices
230
https://cloudacademy.com/blog/disadvantages-of-cloud-computing/
231. 1. Downtime
• Since cloud computing systems are internet-based,
service outages are always an unfortunate possibility and
can occur for any reason
• Can your business afford the impacts of an outage or
slowdown?
• An outage on Amazon Web Services in 2017 cost publicly
traded companies up to $150 million dollars and no
organization is immune, especially when critical business
processes cannot afford to be interrupted
232. Best Practices for minimizing planned
downtime in a cloud environment
• Design services with high availability and disaster recovery in mind.
Leverage the multi- availability zones provided by cloud vendors in your
infrastructure
• If your services have a low tolerance for failure, consider multi-region
deployments with automated failover to ensure the best business
continuity possible
• Define and implement a disaster recovery plan in line with your business
objectives that provide the lowest possible recovery time (RTO) and
recovery point objectives (RPO)
• Consider implementing dedicated connectivity such as AWS Direct
Connect, Azure ExpressRoute, or Google Cloud’s Dedicated Interconnect
or Partner Interconnect
– These services provide a dedicated network connection between you and the
cloud service point of presence
– This can reduce exposure to the risk of business interruption from the public
internet Dr Ganesh Neelakanta Iyer 232
233. 2. Security and Privacy
• Any discussion involving data must address security and privacy,
especially when it comes to managing sensitive data
• Of course, any cloud service provider is expected to manage and
safeguard the underlying hardware infrastructure of a deployment
– However, your responsibilities lie in the realm of user access
management, and it’s up to you to carefully weigh all the risk scenarios
• Though recent breaches of credit card data and user login
credentials are still fresh in the minds of the public, steps have been
taken to ensure the safety of data
– One such example is the General Data Protection Rule (GDPR), recently
enacted in the European Union to provide users more control over their
data
– Nonetheless, you still need to be aware of your responsibilities and follow
best practices
Dr Ganesh Neelakanta Iyer 233
234. Best practices for minimizing security and
privacy risks
• Understand the shared responsibility model of your cloud provider.
• Implement security at every level of your deployment.
• Know who is supposed to have access to each resource and service
and limit access to least privilege.
• Make sure your team’s skills are up to the task: Solid security skills
for your cloud teams are one of the best ways to mitigate security
and privacy concerns in the cloud.
• Take a risk-based approach to securing assets used in the cloud
• Extend security to the device.
• Implement multi-factor authentication for all accounts accessing
sensitive data or systems
Dr Ganesh Neelakanta Iyer 234
235. AWS Shared Responsibility Model
Dr Ganesh Neelakanta Iyer 235https://cloudacademy.com/blog/aws-shared-responsibility-model-security/
236. 3. Vulnerability to Attack
• In cloud computing, every component is online, which
exposes potential vulnerabilities
• Even the best teams suffer severe attacks and security
breaches from time to time
• Since cloud computing is built as a public service, it’s
easy to run before you learn to walk
• After all, no one at a cloud vendor checks your
administration skills before granting you an account: all it
takes to get started is generally a valid credit card
Dr Ganesh Neelakanta Iyer 236
237. Best practices to help you reduce cloud
attacks
• Make security a core aspect of all IT operations.
• Keep ALL your teams up to date with cloud security best practices.
• Ensure security policies and procedures are regularly checked and reviewed.
• Proactively classify information and apply access control.
• Use cloud services such as AWS Inspector, AWS CloudWatch, AWS CloudTrail, and
AWS Config to automate compliance controls.
• Prevent data exfiltration.
• Integrate prevention and response strategies into security operations.
• Discover rogue projects with audits.
• Remove password access from accounts that do not need to log in to services.
• Review and rotate access keys and access credentials.
• Follow security blogs and announcements to be aware of known attacks.
• Apply security best practices for any open source software that you are using
Dr Ganesh Neelakanta Iyer 237
238. 4. Limited control and flexibility
• To varying degrees (depending on the particular service),
cloud users may find they have less control over the function
and execution of services within a cloud-hosted infrastructure
• A cloud provider’s end-user license agreement (EULA) and
management policies might impose limits on what customers
can do with their deployments
• Customers retain control of their applications, data, and
services, but may not have the same level of control over
their backend infrastructure
Dr Ganesh Neelakanta Iyer 238
239. Best practices for maintaining control and
flexibility
• Consider using a cloud provider partner to help with implementing,
running, and supporting cloud services
• Understanding your responsibilities and the responsibilities of the cloud
vendor in the shared responsibility model will reduce the chance of
omission or error
• Make time to understand your cloud service provider’s basic level of
support
– Will this service level meet your support requirements?
– Most cloud providers offer additional support tiers over and above the basic
support for an additional cost
• Make sure you understand the service level agreement (SLA) concerning
the infrastructure and services that you’re going to use and how that will
impact your agreements with your customers
Dr Ganesh Neelakanta Iyer 239
240. 5. Vendor Lock-In
• Vendor lock-in is another perceived disadvantage of cloud
computing
• Differences between vendor platforms may create
difficulties in migrating from one cloud platform to another,
which could equate to additional costs and configuration
complexities
• Gaps or compromises made during migration could also
expose your data to additional security and privacy
vulnerabilities
Dr Ganesh Neelakanta Iyer 240
241. Best practices to decrease dependency
• Design with cloud architecture best practices in mind
– All cloud services provide the opportunity to improve availability and
performance, decouple layers, and reduce performance bottlenecks
– If you have built your services using cloud architecture best practices, you are
less likely to have issues porting from one cloud platform to another.
• Properly understanding what your vendors are selling can help avoid lock-
in challenges
• Employing a multi-cloud strategy is another way to avoid vendor lock-in
– While this may add both development and operational complexity to your
deployments, it doesn’t have to be a deal breaker
– Training can help prepare teams to architect and select best-fit services and
technologies
• Build in flexibility as a matter of strategy when designing applications to
ensure portability now and in the future.
Dr Ganesh Neelakanta Iyer 241
242. 6. Costs
• Adopting cloud solutions on a small scale and for short-term
projects can be perceived as being expensive
• Pay-as-you-go cloud services can provide more flexibility and
lower hardware costs, however, the overall price tag could
end up being higher than you expected
• Until you are sure of what will work best for you, it’s a good
idea to experiment with a variety of offerings
• You might also make use of the cost calculators made
available by providers like Amazon Web Services and Google
Cloud Platform
Dr Ganesh Neelakanta Iyer 242
243. Best practices to reduce costs
• Try not to over-provision, instead of looking into using
auto-scaling services
• Scale DOWN as well as UP
• Pre-pay if you have a known minimum usage
• Stop your instances when they are not being used
• Create alerts to track cloud spending
Dr Ganesh Neelakanta Iyer 243
246. Summary
• Going forward, the cloud will allow Industry 4.0 to develop
mature, automated systems that will provide a flexible and
fully connected supply chain where human interaction
reduces to a minimum through autonomous predictions
and self-regulating supply chains
• Cloud platforms are being developed to securely capture
and analyse information from a range of devices to
automate and optimise business processes
Dr Ganesh Neelakanta Iyer 246
248. Are we all set to loose out jobs?
• “ROBOTS ARE STEALING OUR JOBS”
(Entrepreneur, April 2019)
• “AI EXPERT SAYS AUTOMATION COULD REPLACE 40%
OF JOBS IN 15 YEARS” (Fortune, Jan. 2019)
• “JOB LOSS FROM AI? THERE’S MORE TO FEAR!”
( Forbes, Aug. 2018)
Dr Ganesh Neelakanta Iyer 248
249. Don’t panic – just prepare
Dr Ganesh Neelakanta Iyer 249
250. Are you ready for a career you’ve never
even dreamed of?
Children entering primary school today will work in jobs that
don’t exist yet. And the likelihood is, so will you. In fact,
according to the Dell Technologies’ Realize 2030 Report, 85%
of jobs in 2030 haven’t been invented yet. That’s just over 10
years away, and will certainly affect your work life
251. Dr Ganesh Neelakanta Iyer
ni_amrita@cb.amrita.edu
ganesh.vigneswara@gmail.com
GANESHNIYER
http://ganeshniyer.com/
https://www.amrita.edu/faculty/ni-ganesh