Kevin is an IOTA Evangelist, going "beyond blockchain" for the Internet of Things (IoT). IOTA's Tangle does not have blocks, mining or fees, and is quantum computing resistant.
NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment NXP MIFARE Team
This webinar shows you how you can use NXP's innovative MIFARE Plus and MIFARE DESFire products for secure closed loop payments in multi-vendor systems.
NFC: Accelerating Momentum, Expanding Opportunities NFC Forum
Presentation by Paula Hunter, NFC Forum Executive Director, from October 7, 2015 at the NFC Solutions Summit
Presentation defines NFC, gives an update on the industry, shares several use-cases, and discusses what is next for NFC technology.
CONNECTED OBJECTS - how NFC technology enables a more environmentally-friendl...Pierre Metivier
20, 40, 80 billions connected objects in the smart cities of the future by 2020 as foreseen by many large IT companies and consulting firms. But is our planet ready for as many billions Ion-lithium battery equiped objects ? What about the impact on our environment ? Hopefully, there are solutions to reduce the need of batteries in connected objets and energy harvesting is one important field of study. NFC, better known for contactless payment and transportation cards, is one technology that can be used to reduce the needs of batteries in connected objects, allowing a cleaner and greener environment, as this track will present.
Smart Cities and Countries Congress, Sept. 3, Paris
NFC, short for Near Field Communication, is a short range wireless RFID technology that makes use of interacting electromagnetic radio fields instead of the typical direct radio transmissions used by technologies such as Bluetooth. It is meant for applications where a physical touch, or close to it, is required in order to maintain security. NFC is planned for use in mobile phones for, among other things, payment, in conjunction with an electronic wallet
Near field communication - Data transmissionDhruv Patel
Near field communication (NFC) is a set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into proximity, usually no more than a few inches.
NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment NXP MIFARE Team
This webinar shows you how you can use NXP's innovative MIFARE Plus and MIFARE DESFire products for secure closed loop payments in multi-vendor systems.
NFC: Accelerating Momentum, Expanding Opportunities NFC Forum
Presentation by Paula Hunter, NFC Forum Executive Director, from October 7, 2015 at the NFC Solutions Summit
Presentation defines NFC, gives an update on the industry, shares several use-cases, and discusses what is next for NFC technology.
CONNECTED OBJECTS - how NFC technology enables a more environmentally-friendl...Pierre Metivier
20, 40, 80 billions connected objects in the smart cities of the future by 2020 as foreseen by many large IT companies and consulting firms. But is our planet ready for as many billions Ion-lithium battery equiped objects ? What about the impact on our environment ? Hopefully, there are solutions to reduce the need of batteries in connected objets and energy harvesting is one important field of study. NFC, better known for contactless payment and transportation cards, is one technology that can be used to reduce the needs of batteries in connected objects, allowing a cleaner and greener environment, as this track will present.
Smart Cities and Countries Congress, Sept. 3, Paris
NFC, short for Near Field Communication, is a short range wireless RFID technology that makes use of interacting electromagnetic radio fields instead of the typical direct radio transmissions used by technologies such as Bluetooth. It is meant for applications where a physical touch, or close to it, is required in order to maintain security. NFC is planned for use in mobile phones for, among other things, payment, in conjunction with an electronic wallet
Near field communication - Data transmissionDhruv Patel
Near field communication (NFC) is a set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into proximity, usually no more than a few inches.
Overview of NXP MIFARE product portfolio. Product families include: MIFARE Classic, MIFARE Plus, MIFARE DESFire and MIFARE Ultralight. Details the evolution and innovation of the various product families are given.
Which new scenarios are enabled by Windows 10 for NFC, Bluetooth LE & Beacons?Andreas Jakl
Beacons are one of the hottest topics of mobile development right now. Bluetooth Smart / LE is indispensable for Wearables and the Internet of Things (IoT). NFC is now finally arriving in the mass market.
With Windows 10, Microsoft has significantly expanded the possibilities for proximity technologies. In this overview, you will learn about the new scenarios and see several concrete examples of what is possible and how you can leverage it for your own projects!
Agenda:
NFC
- NFC simulation
- Smart Cards
- Raw NFC tag access
- Host card emulation (HCE)
Bluetooth Smart
- Bluetooth Beacon support
- Beacon specifications (iBeacon, Eddystone & co)
A Librarian's Field Guide to Near Field CommunicationKristen Yarmey
A presentation given by Sheli McHugh and Kristen Yarmey in October 2011 at the Pennsylvania Library Association annual conference in State College, PA.
Near Field Communication (NFC) is a new technology that allows devices such as cell phones to transmit information wirelessly across a small distance. While it has many commercial applications (e.g., using your cell phone as a credit card at the grocery store), NFC could also have future applications for libraries as a new way to link physical materials with digital information. Placing particular attention on cataloging, metadata, and circulation, this presentation will discuss potential strategies for utilizing NFC in libraries, from peer to peer loaning to embedding catalog records in books.
Show different Standards as ECMA 340 and 352. Talks about security problems and solutions. Shows ECMA 385 and 386 as a SSE & SCH services for p2p mode.
As conclusions:
NFC by itself cannot provide protection against eavesdropping or data modification. The solution is the establishment of a secure channel over NFC. Since Man in the Middle attacks are unfeasible, a Diffie- Heffman cryptography can be applied. NFC-SEC standard uses ECDH crypto and AES algorithm.
The presentation describes a variety of solutions in the IoT area and provides hints on creating distributed systems. It focuses on modern standards in the field of IoT, their disadvantages and prospects.
This presentation by Oleksii Savochkin (Engineering Team Lead, Consultant, GlobalLogic Lviv) was delivered at GlobalLogic Lviv Embedded Tech Talk on November 23, 2017.
Overview of NXP MIFARE product portfolio. Product families include: MIFARE Classic, MIFARE Plus, MIFARE DESFire and MIFARE Ultralight. Details the evolution and innovation of the various product families are given.
Which new scenarios are enabled by Windows 10 for NFC, Bluetooth LE & Beacons?Andreas Jakl
Beacons are one of the hottest topics of mobile development right now. Bluetooth Smart / LE is indispensable for Wearables and the Internet of Things (IoT). NFC is now finally arriving in the mass market.
With Windows 10, Microsoft has significantly expanded the possibilities for proximity technologies. In this overview, you will learn about the new scenarios and see several concrete examples of what is possible and how you can leverage it for your own projects!
Agenda:
NFC
- NFC simulation
- Smart Cards
- Raw NFC tag access
- Host card emulation (HCE)
Bluetooth Smart
- Bluetooth Beacon support
- Beacon specifications (iBeacon, Eddystone & co)
A Librarian's Field Guide to Near Field CommunicationKristen Yarmey
A presentation given by Sheli McHugh and Kristen Yarmey in October 2011 at the Pennsylvania Library Association annual conference in State College, PA.
Near Field Communication (NFC) is a new technology that allows devices such as cell phones to transmit information wirelessly across a small distance. While it has many commercial applications (e.g., using your cell phone as a credit card at the grocery store), NFC could also have future applications for libraries as a new way to link physical materials with digital information. Placing particular attention on cataloging, metadata, and circulation, this presentation will discuss potential strategies for utilizing NFC in libraries, from peer to peer loaning to embedding catalog records in books.
Show different Standards as ECMA 340 and 352. Talks about security problems and solutions. Shows ECMA 385 and 386 as a SSE & SCH services for p2p mode.
As conclusions:
NFC by itself cannot provide protection against eavesdropping or data modification. The solution is the establishment of a secure channel over NFC. Since Man in the Middle attacks are unfeasible, a Diffie- Heffman cryptography can be applied. NFC-SEC standard uses ECDH crypto and AES algorithm.
The presentation describes a variety of solutions in the IoT area and provides hints on creating distributed systems. It focuses on modern standards in the field of IoT, their disadvantages and prospects.
This presentation by Oleksii Savochkin (Engineering Team Lead, Consultant, GlobalLogic Lviv) was delivered at GlobalLogic Lviv Embedded Tech Talk on November 23, 2017.
Iot: Introduction ,architecture ,application especially engineering ,software,hardware,protocols and challenges
nodered software code for Iot simulation
Presentation Slide deck from the Ag gateway 2016 Emerging Technology forum. Covers LPWan, LoRa and IoT for agriculture. I enjoyed presenting on this topic and the lively discussions that followed. I expect to see interesting developments in IoT for Agriculture and LPWan will be a big part.
I am interested in speaking at technology events and would be able to give this or similar talk.
Smart city concept has a great potential improve the quality of life by use of Internet of Things paradigm.
Deployment of Wireless Sensor Networks would provide huge amount of data
It would present massive and unstructured data management and analysis challenges.
Cloud based storage and Big Data techniques show promise to generate actionable intelligence from these data streams.
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17Ed Hightower
These are the slides used at the CIE-IEEE 2017 Tech Symposium at University of Texas at Dallas. Ed Hightower presente brief history of IoT, who are key players in the Low Power WAN space and how all this could enable Smart Cities and Smart Health.
A Presentation by:
REMMY NWEKE, 2016 Fellow, Cyber Security Policy Defender
Secretary, Cyber Security Experts Association of Nigeria (CSEAN)
Lagos Branch
To mark the Cyber Security Awareness Campaign,
October 2016
Smart contracts offer the potential to bring greater automation and efficiency to the derivatives market. But can a derivatives contract ever be fully automated? Will smart contracts take the place of paper contracts? ISDA’s Ciarán McGonagle explores the issues.
Joint report on regulatory sandboxes and innovation hubs🌍 Norbert Gehrke
The European Supervisory Authorities (ESAs) published today a joint report on innovation facilitators (regulatory sandboxes and innovation hubs). The report sets out a comparative analysis of the innovation facilitators established to date within the EU. The ESAs also set out best practices for the design and operation of innovation facilitators.
The number of innovation facilitators in the EU has grown rapidly in recent years. As at the date of the report, 21 EU Member States and 3 EEA States have established innovation hubs and 5 EU Member States have regulatory sandboxes in operation. A comparative analysis of these national innovation facilitators is set out in the report and, based on this analysis, a set of best practices has been prepared. The best practices are intended to: (i) promote consistency across the single market in the design and operation of innovation facilitators; (ii) promote transparency of regulatory and supervisory policy outcomes from arising from interactions in the context of innovation facilitators; and (iii) facilitate cooperation between national authorities, including consumer and data protection authorities.
The ESAs also set out options, to be considered in the context of future EU-level work on innovation facilitators, to promote coordination and cooperation between innovation facilitators which would support the scaling-up of FinTech across the single market.
English Version: Japan FSA New Crypto Currency Exchange Registration Form🌍 Norbert Gehrke
This is an automatic translation of the Japan FSA new crypto currency exchange application, generated by taking the original document and converting it with Microsoft Translate. It is not perfect, but for those not fluent in Japanese, should provide enough information to judge on the complexity of the requirements when filing for a new exchange.
Japan FSA 4th Study Group on Virtual Currency Exchanges - Gary Gensler🌍 Norbert Gehrke
The minutes of the 4th "Study Group on Virtual Currency Exchanges", which took place on June 15, 2018, have been published recently. At this meeting, through video call, the participants included:
Joichi Ito, Director of Massachusetts Institute of Technology Media Laboratory
Gary Gensler, previously Chairman of the Commodity Futures Trading Commission (CFTC)
Sagar Sarbhai, Head of Government & Regulatory Relations, APAC & Middle East at Ripple
These are the slides supporting Sagar Sarbhai's presentation
Japan FSA 4th Study Group on Virtual Currency Exchanges - Gary Gensler🌍 Norbert Gehrke
The minutes of the 4th "Study Group on Virtual Currency Exchanges", which took place on June 15, 2018, have been published recently. At this meeting, through video call, the participants included:
Joichi Ito, Director of Massachusetts Institute of Technology Media Laboratory
Gary Gensler, previously Chairman of the Commodity Futures Trading Commission (CFTC)
Sagar Sarbhai, Head of Government & Regulatory Relations, APAC & Middle East at Ripple
These are the slides supporting Gary Gensler's presentation
Advanced Blockchain AG - Shareholder Meeting August 16, 2018🌍 Norbert Gehrke
Advanced Blockchain AG (ABAG) is Germany's first and only publicly listed blockchain company (Duesseldorf stock exchange). During an informal briefing at our annual shareholder meeting, we presented an overview of our offerings and vision for the company.
We have curated this list of Japanese FinTech companies with a relative broad definition of “FinTech” in mind, also with the objective to introduce you to a number of companies that you might not have come across so far (so we have intentionally not included famous ones like bitflyer or Moneytree in this list). If you happen to know a company that starts with “Y”, please do let us know!
The New York University (NYU) School of Professional Studies (SPS) in Tokyo is looking for a Director who will lead the recently launched Global Executive Certificates, in addition to other strategic and programmatic goals for Japan.
The New York University (NYU) School of Professional Studies (SPS) in Tokyo is looking for an Assistant Director who will be tasked with supporting the academic offerings of professional development and English-language programs at NYUSPS Tokyo. Responsibilities include, but are not limited to, overseeing course delivery and operations, supporting faculty recruitment and onboarding, facilitating student recruitment and enrollment efforts, and contributing to the daily administration of programs at NYUSPS Tokyo. This position reports directly to the Director, NYUSPS Tokyo.
This is he Hyperledger deck that Brian Behlendorf presented at the meetup in Tokyo, it has many useful links to other Hyperledger resources for you to explore.
The 20 largest OECD countries have a combined public pension deficit of $78 Trillion. Many large corporate pension schemes are likewise significantly underfunded.
With over 44% of men and 55% of women now expected to live into their 90s, many consumers will outlive their private savings by 5 years and some by at least 10 years.
Current retirement income products such as life annuities are unpopular due to low returns mostly caused by the high costs charged by Insurers, which act as centralized “guarantors".
We propose a solution to the costly central guarantor problem by using our patent pending peer-to-peer tontine pensions administered by an unbiased, mathematically robust smart-actuary which ensures that the pension is ALWAYS fully funded. And because tontine pensions provide lifetime income without requiring a guarantor, they significantly reduce the cost of providing pension benefits and thus significantly increase the income paid out to retirees.
Tontines are a 365-year-old financial innovation which successfully financed many European
countries and states as well as numerous private projects such as roads, bridges and hotels. They make periodic payouts shared among their members for as long as they live. In later years, as the number of surviving members declines, the payout per-member rises, often dramatically.
Tontines were first offered in the US in 1868 by insurance companies and they were wildly successful. Over 50% of households invested the modern equivalent of $170Bn before Insurer malpractice caused sales to halt after a 1906 investigation revealing improper uses of capital as well as tampering with the ledger of members which undermined trust in the whole process.
In the century long absence of the tontines, retirement savings rates have plummeted.
2009 saw the emergence of distributed ledger technologies for immutable financial record-keeping which creates a new form of pseudonymous trust between users based upon math.
As such, consumers can now safely and collectively self-insure the financial risks of living longer by entering into secure, low-cost peer-to-peer tontines.
This paper proposes a fully regulated peer-to-peer tontine issuing ecosystem which can offer:
• greater financial benefits payouts to the hundreds of millions of global consumers spending ~$350BN per year on retirement income solutions,
• a digital currency which incentivizes IFAs and RIAs to take no-load tontines to their clients, and
• an un-biased, self-correcting, autonomous smart-actuary which can be trusted to ensure the tontine pension is ALWAYS fully funded and always acts in the best interest of the members.
Slides leveraged from EOS London Developers' Meetup a few days earlier. David Packham argues that EOS is one of the most promising third-generation blockchain/distributed ledger technologies yet to hit the market. With the release scheduled for mid-year, we would like to create some awareness about the project in Japan, and also discuss one of the many ecosystem projects that are being proposed on top of EOS, Chintai as a platform for token leasing.
IOTA - Tokyo Meetup #2 - nakamo.to and peaq - 2017-12-14🌍 Norbert Gehrke
Michael Geike, CEO of Advanced Blockchain AG, and Robert A. Küfner, CEO of nakamo.to, at tonight's #IOTA - Tokyo and Tokyo FinTech Meetup joint session
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
4. ➢ Global communications
network
➢ Connects billions of….
○ Computers
○ Mobile phones
○ Now custom devices
➢ Web: the UI of Internet
○ Starting with websites
4
What is the Internet?
5. ➢ Mid 1900s - Early 2000s
➢ Personal computers
becoming mainstream
➢ Static information pages
➢ Webmasters determine
information on site
➢ Connect by hyperlink
5
Web 1.0 (The Static Web)
6. ➢ Mid 2000s - Early 2010s
➢ Client - Server - Client
➢ AJAX, CSS, and widgets
➢ Social web, interactivity
➢ Rise of open-source
➢ Rise of social media
➢ Rise of e-commerce and
Digital payments
6
Web 2.0 (The Interactive Web)
10. ➢ Supply Side (More Ubiquity)
○ Moore’s Law
○ Maker Movement/Customization
○ Smaller Embedded Devices/Machines
➢ Demand Side (Greater Need)
○ Intel gathering: Data = Oil, “Smart” = Insightful Info
■ For internal and external consumption
○ Predictive Analytics (i.e. Maintenance)
○ Now there is an arm’s race, FOMO
10
Why IoT? Why Now
14. ➢ Cell sites networks
➢ 3G/4G (LTE)/5G
➢ Range:
○ GSM: 200 km max
○ HPSA: 35 km max
➢ Large quantities of data,
less latency
➢ High power consumption
➢ Use cases: self-driving cars,
telemetry health care
➢ “Visa” of IoT Networks
14
Cellular
15. ➢ Connects to router (wireless
access point → Ethernet)
➢ Range: 100 m max
➢ Data Rate: 150-600 Mbps
➢ Fastest Data Rate
➢ Most power consuming
➢ Vulnerable to attack
➢ Use cases: This presentation!
15
Wi-Fi
16. ➢ Short-distance communications
➢ Radio Frequency ID (RFID)
○ Use RF to ID and tag objects
○ Range < 12 m, Data: ~600 kbps
○ Use cases: retail and warehouse
merchandise tagging, car
➢ Near Field Communications (NFC)
○ D2D proximity communications
○ Range: < 10 cm, Data: 100-400 kbps
○ Use cases: contactless card tech,
newer cell phones, badge
➢ Bluetooth Low Energy (BLE)
○ Battery-powered + RF chip beacon
○ Range: < 70 m, Data: ~1 Mbps
○ Use cases: beacons UI, wearables
16
Radio Frequency (RF)
17. ➢ Low Power [Wireless] Wide Area
Network (LPWAN)
➢ Interconnects battery-powered
devices with a central hub
➢ WAN: kilometers, LAN: meters
➢ Battery (2.5 Ah) Life: 10-20 years
➢ Greater number of devices
➢ LoRa: 2-15 km, < 27 kbps
➢ SigFox/UNB: 3-50 km, < 100 bps
➢ RPMA: ~5-10 km, more power comp
➢ Use Cases: Smart Cities, Industry
4.0, AgTech
17
LPWAN
19. ➢ Edge-to-edge (E2E), with gateway
➢ Endpoints become signal receivers
➢ Non-interference
➢ ZigBee
○ 7 years for batteries
○ Range: 10-100 m, Data: 20-250 kbps
○ Use Cases: utility, retail
➢ Z-Wave
○ Range: ~30 m, Data: 10-40 kbps
○ Use Cases: home automation
19
Mesh networks
22. 22
IoT Protocols Cheat Sheet
Network Distance Battery Life Data Rate Topology
Cellular Very Long Low High Centralized
Wifi Short Very Low Very High Decentralized
RF Very Short Medium Medium P2P
LPWAN Long Very High Very Low Decentralized
Mesh Medium High Low Distributed
Inversely correlated
24. 24
2) Security Vulnerability
➢ Vulnerable Cryptography
➢ Data can be intercepted
OTA
➢ Examples:
○ Dyn Inc.
○ Factories
○ Medical Devices
○ Smart Cars
26. ➢ Distributed Ledger
○ REDUCES SINGLE
POINT OF FAILURE
○ Use cases: IDoT, Data
Encryption, Audit Trail
➢ Type of Propagated Data:
○ Transactions
○ Blocks
26
Basics
27. ➢ Public Key Cryptography
○ Sign and create Digital Signatures
○ Ex: transaction, software update, ID
➢ Consensus Mechanism
○ Set of confirmed and verified
transactions for distributed ledgers
○ PoW/PoS/others...
27
Properties of Blockchain
28. 28
Blockchain/DLT Avg Tx Size Max Block Size Avg Block Interval
Bitcoin < 1 kB 1 MB 10 min
Bitcoin Cash < 1 kB 8 MB 10 min
Litecoin < 1 kB 4 MB 2.5 min
Ethereum Up to ~53,000
Gas limit (for SC)
3,141,592
Gas (~800 kB)
15-17 sec
IOTA 1 - 2 kB* - -
29. ➢ RACE TO FIRST!
➢ Need Power Supply
➢ Need Fastest
Connectivity
➢ Need Fastest
Computing
➢ Biggest Mining Pools
29
Mining (PoW)
34. ➢ Early blockchain + IoT startup,
founded in 2012
➢ Vertical SPADE Framework
➢ Filament Tap device/beacon
➢ Use telehash for distributed
endpoint device comms
➢ Device discovery over Wifi,
radio, and Bluetooth
➢ Blockname: address on Bitcoin
➢ Blocklet: L2 accounting on BTC
➢ Use cases: rails, freights, and
other infrastructure
34
Filament
35. ➢ Comprehensive IoT-DLT app
platform provider
➢ IoT CMS, Device Registry, Data
Collection/Analytics
➢ Supports ZigBee, ZWave, BLE,
BT, and UWB
➢ Use Cases: Dynamic EV
Charging, Smart City
parking/utilities metering
➢ Using IOTA feeless network
35
Netobjex
36. ➢ Wisdom Alter Label Trade
Organizations and Networks
➢ VIOT (Value IoT)
➢ Phase 1.0: dev RFID tags to
placed onto materials not
accessible to the Internet
➢ Use Cases: retail, warehousing,
logistics (P 2.0), smart
manufacturing (P 3.0)
36
WaltonChain
37. ➢ Decentralized ISPs (monopolistic)
➢ Incentivized Community Mesh
➢ Create software for existing
hardware to connect to each other
➢ Hops with best AND cheapest paths
➢ IoT connectivity depending on hop
distances (i.e. LPWAN large hops)
➢ Uses Ethereum blockchain
➢ IoT network agnostic
37
Althea Mesh
38. ➢ Sensor (i.e. temperature
logger) records
environment conditions
while package is in transit
➢ Uses BLE or NFC
➢ Blockchain agnostic,
starting with Ethereum
➢ Use Cases: pharmaceutical
supply chain
38
Modum