- Internet of Things is a world-wide network of interconnected objects which are outfitted with sensors, actuators and Radio Frequency Identification (RFID) devices.
- FutureGen Solutions presents an idea of Cloud Based Company providing IoT integrated solutions to Customers.
- The Management, Technical and Cost volume prents our idea to establish FutureGen Solutions in the Iot market.
FTC Internet of Things Report
The report includes the following recommendations for companies developing Internet of Things devices:
build security into devices at the outset, rather than as an afterthought in the design process;
train employees about the importance of security, and ensure that security is managed at an appropriate level in the organization;
ensure that when outside service providers are hired, that those providers are capable of maintaining reasonable security, and provide reasonable oversight of the providers;
when a security risk is identified, consider a “defense-in-depth” strategy whereby multiple layers of security may be used to defend against a particular risk;
consider measures to keep unauthorized users from accessing a consumer’s device, data, or personal information stored on the network;
monitor connected devices throughout their expected life cycle, and where feasible, provide security patches to cover known risks.
The Devices are Coming! How the “Internet of Things” will affect IT.Spiceworks Ziff Davis
The devices are coming! Think you’re ready for the Internet of Things? We surveyed over 440 IT pros about this latest IT trend and released in this report. Find out what IT pros had to say about this IT shake up and what you can do to prepare.
How will the Internet of Things (IoT) impact "living services?"Ian Gertler
According to THIS new report from FJORD and Accenture Digital, the Internet of Things (IoT) will make a tremendous impact on so-called "living services." Living Services are the result of two powerful forces: the digitization of everything and ‘liquid’ consumer expectations. Where will we experience these living services?
- OUR HOMES: Managing energy, shopping,
security, environment, entertainment, our diaries and
budgeting.
- OUR BODIES: Fitness and dietary advice, training,
illness diagnostics and personal health diary planning.
- OUR FAMILIES: Everyday schedule management, diary coordination, location and status updates and cultural and
social event recommendations.
- OUR JOBS: Coordinating travel arrangements, diary workload management, learning and reading
recommendations, resource management and decision-making advice.
- OUR CARS/TRANSPORT: Driving management and support, maintenance management, route planning, traffic information, insurance assessments, roadside attractions and services, media and work communications, fuel and
energy management, social media and entertainment.
- OUR MONEY: Balance management, moving money, shopping decision-making, investment advice, mortgage
advice and borrowing.
- OUR SHOPPING: Automated ordering, price comparisons, discount or promotion research, budget
advice, automated search and offer comparisons and social sharing.
- OUR LEISURE TIME: Realtime, contextually appropriate
recommendations, content curation, bespoke offers, information on travel/parking options, decisionmaking
tools.
- OUR LEARNING: Learning and career plans tailored to the individual child’s specific developmental needs, right down to realtime monitoring of her mood and alertness; automatic recording of students’ presence or absence
from a class; realtime parental involvement in classrooms.
- OUR CITIES: Managing congestion, combatting
crime, street lighting, infrastructure, the environment, building repairs, waste collection and planning.
FTC Internet of Things Report
The report includes the following recommendations for companies developing Internet of Things devices:
build security into devices at the outset, rather than as an afterthought in the design process;
train employees about the importance of security, and ensure that security is managed at an appropriate level in the organization;
ensure that when outside service providers are hired, that those providers are capable of maintaining reasonable security, and provide reasonable oversight of the providers;
when a security risk is identified, consider a “defense-in-depth” strategy whereby multiple layers of security may be used to defend against a particular risk;
consider measures to keep unauthorized users from accessing a consumer’s device, data, or personal information stored on the network;
monitor connected devices throughout their expected life cycle, and where feasible, provide security patches to cover known risks.
The Devices are Coming! How the “Internet of Things” will affect IT.Spiceworks Ziff Davis
The devices are coming! Think you’re ready for the Internet of Things? We surveyed over 440 IT pros about this latest IT trend and released in this report. Find out what IT pros had to say about this IT shake up and what you can do to prepare.
How will the Internet of Things (IoT) impact "living services?"Ian Gertler
According to THIS new report from FJORD and Accenture Digital, the Internet of Things (IoT) will make a tremendous impact on so-called "living services." Living Services are the result of two powerful forces: the digitization of everything and ‘liquid’ consumer expectations. Where will we experience these living services?
- OUR HOMES: Managing energy, shopping,
security, environment, entertainment, our diaries and
budgeting.
- OUR BODIES: Fitness and dietary advice, training,
illness diagnostics and personal health diary planning.
- OUR FAMILIES: Everyday schedule management, diary coordination, location and status updates and cultural and
social event recommendations.
- OUR JOBS: Coordinating travel arrangements, diary workload management, learning and reading
recommendations, resource management and decision-making advice.
- OUR CARS/TRANSPORT: Driving management and support, maintenance management, route planning, traffic information, insurance assessments, roadside attractions and services, media and work communications, fuel and
energy management, social media and entertainment.
- OUR MONEY: Balance management, moving money, shopping decision-making, investment advice, mortgage
advice and borrowing.
- OUR SHOPPING: Automated ordering, price comparisons, discount or promotion research, budget
advice, automated search and offer comparisons and social sharing.
- OUR LEISURE TIME: Realtime, contextually appropriate
recommendations, content curation, bespoke offers, information on travel/parking options, decisionmaking
tools.
- OUR LEARNING: Learning and career plans tailored to the individual child’s specific developmental needs, right down to realtime monitoring of her mood and alertness; automatic recording of students’ presence or absence
from a class; realtime parental involvement in classrooms.
- OUR CITIES: Managing congestion, combatting
crime, street lighting, infrastructure, the environment, building repairs, waste collection and planning.
The Internet of Things is an emerging topic of technical, social, and economic significance. Consumer products, durable goods, cars and trucks, industrial and utility components, sensors, and other everyday objects are being combined with Internet connectivity and powerful data analytic capabilities that promise to transform the way we work, live, and play. Projections for the impact of IoT on the Internet and economy are impressive, with some anticipating as many as 100 billion connected IoT devices and a global economic impact of more than $11 trillion by 2025.
Shaping the right strategy, managing thebiggest risk.Until recently, the Internet of Things (IoT) was on the strategic agenda of only the largest and most progressive insurers. The IoT was largely viewed as a futuristic concept, and many insurers adopted a “wait and see” attitude.
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Capgemini
The potential trillion dollar Internet of Things (IoT) business opportunity rests precariously on one critical factor – security. 71% of executives in our survey agreed that security concerns will influence customers’ purchase decision for IoT products. However, despite increasing cyber attacks and ample warning from security experts, most organizations do not provide adequate security and privacy safeguards for their IoT products. In fact, only 33% of IoT executives in our survey believe that the IoT products in their industry are highly resilient to cyber security attacks. Further, despite rising consumer concerns regarding data privacy, 47% of organizations do not provide any privacy related information regarding their IoT products.
So, why are organizations lagging behind in securing their IoT products and systems? Key reasons for this include an expanded attack surface, inefficiencies in the IoT product development process, and the lack of specialized security skill-sets. For instance, our survey showed that only 48% of companies focus on securing their IoT products from the beginning of the product development phase. Building a secure IoT system begins with the recognition that security needs to be as much of a priority as the features and functionality of an IoT product. The report highlights the key measures that organizations must take in order to put security at the core of their IoT value proposition.
The Internet of Things: The next growth engine for the semiconductor industryPwC
The ongoing explosion of mobile devices---smartphones, tablets, ultramobiles, and wearables---continues to drive growth in the semiconductor industry. But it's the Internet of Things---with sensors in everything from automobiles, to electric meters, to refrigerators---that will drive industry growth over the next five years.
This in-depth report looks at 2015-2019 growth by component, region and application with particular focus on the role of semiconductors in the IoT ecosystem and how companies can capture value from this developing megatrend.
WHITE PAPER▶ Insecurity in the Internet of ThingsSymantec
The Internet of Things (IoT) market has begun to take off. Consumers can buy connected versions of nearly every household appliance available. However, despite its increasing acceptance by consumers, recent studies of IoT devices seem to agree that “security” is not a word that gets associated with this category of devices, leaving consumers potentially exposed.
To find out for ourselves how IoT devices fare when it comes to security, we analyzed 50 smart home devices that are available today. We found that none of the devices enforced strong passwords, used mutual authentication, or protected accounts against brute-force attacks. Almost two out of ten of the mobile apps used to control the tested IoT devices did not use Secure Sockets Layer (SSL) to encrypt communications to the cloud. The tested IoT technology also contained many common vulnerabilities.
All of the potential weaknesses that could afflict IoT systems, such as authentication and traffic encryption, are already well known to the security industry, but despite this, known mitigation techniques are often neglected on these devices. IoT vendors need to do a better job on security before their devices become ubiquitous in every home, leaving millions of people at risk of cyberattacks
Research Proposal - CSR - The Voice of the StakeholderAmany Hamza
In light of the recent financial crisis, the practices of CSR have come to the fore in media reports and academic debates. In this context, the goal of this research is, first, to examine the impact of the financial crisis on the implications of CSR activities in relation to stakeholders’ expectations in the financial services industry and, second, to help banking managers to understand what should be done for the benefit of their stakeholders and their own business sustainability.
Internet of Things, is a new revolution of the Internet. Objects make themselves recognizable and they get intelligence thanks to the fact that they can communicate information about themselves and they can access information that has been aggregated by other things. Alarm clocks go off early if there’s traffic; plants communicate to the sprinkler system when it’s time for them to be watered; running shoes communicate time, speed and distance so that their wearers can compete in real time with people on the other side of the world; medicine containers tell your family members if you forget to take the medicine. All objects can get an active role thanks to their connection to the Internet.
Evolving the service provider architecture to unleash the potential of IoT - ...FrenchWeb.fr
D'ici 2020, il y aura plus de 28 milliards d'objets connectés installés, et le marché présentera un potentiel de 7 trillions de dollars, selon les résultats de l'étude. Pour atteindre ces niveaux de performances, les infrastructures de réseau actuelles doivent cependant évoluer, pour gérer les grandes quantités de données qui seront produites, le nombre croissant de connexions qui auront lieu sur ces réseaux, ou encore assurer la sécurité de ces infrastructures.
Optimizing the Internet of Things: Key Strategies for Commercial InsurersCognizant
The Internet of Things (IoT) is having a significant effect on both consumer-facing and commercial enterprises. At the consumer level, this can be seen in the increasing number of sensor-based smart devices flooding the marketplace. Yet the biggest economic impact is in the industrial and service-based segments, including commercial insurance. By aligning their business requirements with the capabilities of the Internet of Things, insurers can sharpen operational efficiencies, open new revenue streams, drive profitable growth and keep customers close.
HI Team,
I am looking for a job change. I am having 5+ years of development and 1 year of Pen testing Experience. I am looking for Hyderabad location. Details below
Relevant IT Experience: 5.7 Years
Web application security testing Exp : 1 year
Contact number: 9742855955
Notice period: 90 days (Negotiable)
Current Location: Bangalore
Preferred Location: Hyderabad
Thanks,
Raju
Aress have been developing mobile apps for many years with the breadth of our expertise extending to other OS (BlackBerry and Symbian), communications protocols (Bluetooth, GPRS and Near Field Communication) and messaging services (SMS, MMS).
Mobile App Development- Project Management ProcessBagaria Swati
Are you looking to build new capabilities or extend capabilities of existing business software to enhance productivity and profitability.
Key performance metrics are:
1. application scope management
2. project status and dependencies
3. prompt action for defect containment and defect resolution
4. schedule variance and budget variance analysis
Follow a well-defined and mature application development process based on business case analysis.
Who Manages a Project?
Highly-trained Project Managers at
CodeMyMobile manage the complete
application development lifecycle with a
focus on efficiency. Our experienced
project managers lead planning,
coordination, communication and control
of activities pertaining to technology
initiatives, ensuring that project outcomes
are in line with our customers’ business
objectives and comply with overall time,
cost and quality success criteria.
Responsibilities of the Project Manager:
Manage the project goals, scope and project
teams to ensure overall project success,
including customer satisfaction.
Develop and proactively manage project plans,
including scheduling, identification of risks,
contingency plans, issues management, and
allocation of available resources.
Project Control & Risk Management:
Monitor progress against the overall project
plan, leading the team toward successful
milestone completion.
Identify, communicate and manage project
issues and risks, notifying and/or escalating
appropriately to the customer or internally.
The Internet of Things is an emerging topic of technical, social, and economic significance. Consumer products, durable goods, cars and trucks, industrial and utility components, sensors, and other everyday objects are being combined with Internet connectivity and powerful data analytic capabilities that promise to transform the way we work, live, and play. Projections for the impact of IoT on the Internet and economy are impressive, with some anticipating as many as 100 billion connected IoT devices and a global economic impact of more than $11 trillion by 2025.
Shaping the right strategy, managing thebiggest risk.Until recently, the Internet of Things (IoT) was on the strategic agenda of only the largest and most progressive insurers. The IoT was largely viewed as a futuristic concept, and many insurers adopted a “wait and see” attitude.
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Capgemini
The potential trillion dollar Internet of Things (IoT) business opportunity rests precariously on one critical factor – security. 71% of executives in our survey agreed that security concerns will influence customers’ purchase decision for IoT products. However, despite increasing cyber attacks and ample warning from security experts, most organizations do not provide adequate security and privacy safeguards for their IoT products. In fact, only 33% of IoT executives in our survey believe that the IoT products in their industry are highly resilient to cyber security attacks. Further, despite rising consumer concerns regarding data privacy, 47% of organizations do not provide any privacy related information regarding their IoT products.
So, why are organizations lagging behind in securing their IoT products and systems? Key reasons for this include an expanded attack surface, inefficiencies in the IoT product development process, and the lack of specialized security skill-sets. For instance, our survey showed that only 48% of companies focus on securing their IoT products from the beginning of the product development phase. Building a secure IoT system begins with the recognition that security needs to be as much of a priority as the features and functionality of an IoT product. The report highlights the key measures that organizations must take in order to put security at the core of their IoT value proposition.
The Internet of Things: The next growth engine for the semiconductor industryPwC
The ongoing explosion of mobile devices---smartphones, tablets, ultramobiles, and wearables---continues to drive growth in the semiconductor industry. But it's the Internet of Things---with sensors in everything from automobiles, to electric meters, to refrigerators---that will drive industry growth over the next five years.
This in-depth report looks at 2015-2019 growth by component, region and application with particular focus on the role of semiconductors in the IoT ecosystem and how companies can capture value from this developing megatrend.
WHITE PAPER▶ Insecurity in the Internet of ThingsSymantec
The Internet of Things (IoT) market has begun to take off. Consumers can buy connected versions of nearly every household appliance available. However, despite its increasing acceptance by consumers, recent studies of IoT devices seem to agree that “security” is not a word that gets associated with this category of devices, leaving consumers potentially exposed.
To find out for ourselves how IoT devices fare when it comes to security, we analyzed 50 smart home devices that are available today. We found that none of the devices enforced strong passwords, used mutual authentication, or protected accounts against brute-force attacks. Almost two out of ten of the mobile apps used to control the tested IoT devices did not use Secure Sockets Layer (SSL) to encrypt communications to the cloud. The tested IoT technology also contained many common vulnerabilities.
All of the potential weaknesses that could afflict IoT systems, such as authentication and traffic encryption, are already well known to the security industry, but despite this, known mitigation techniques are often neglected on these devices. IoT vendors need to do a better job on security before their devices become ubiquitous in every home, leaving millions of people at risk of cyberattacks
Research Proposal - CSR - The Voice of the StakeholderAmany Hamza
In light of the recent financial crisis, the practices of CSR have come to the fore in media reports and academic debates. In this context, the goal of this research is, first, to examine the impact of the financial crisis on the implications of CSR activities in relation to stakeholders’ expectations in the financial services industry and, second, to help banking managers to understand what should be done for the benefit of their stakeholders and their own business sustainability.
Internet of Things, is a new revolution of the Internet. Objects make themselves recognizable and they get intelligence thanks to the fact that they can communicate information about themselves and they can access information that has been aggregated by other things. Alarm clocks go off early if there’s traffic; plants communicate to the sprinkler system when it’s time for them to be watered; running shoes communicate time, speed and distance so that their wearers can compete in real time with people on the other side of the world; medicine containers tell your family members if you forget to take the medicine. All objects can get an active role thanks to their connection to the Internet.
Evolving the service provider architecture to unleash the potential of IoT - ...FrenchWeb.fr
D'ici 2020, il y aura plus de 28 milliards d'objets connectés installés, et le marché présentera un potentiel de 7 trillions de dollars, selon les résultats de l'étude. Pour atteindre ces niveaux de performances, les infrastructures de réseau actuelles doivent cependant évoluer, pour gérer les grandes quantités de données qui seront produites, le nombre croissant de connexions qui auront lieu sur ces réseaux, ou encore assurer la sécurité de ces infrastructures.
Optimizing the Internet of Things: Key Strategies for Commercial InsurersCognizant
The Internet of Things (IoT) is having a significant effect on both consumer-facing and commercial enterprises. At the consumer level, this can be seen in the increasing number of sensor-based smart devices flooding the marketplace. Yet the biggest economic impact is in the industrial and service-based segments, including commercial insurance. By aligning their business requirements with the capabilities of the Internet of Things, insurers can sharpen operational efficiencies, open new revenue streams, drive profitable growth and keep customers close.
HI Team,
I am looking for a job change. I am having 5+ years of development and 1 year of Pen testing Experience. I am looking for Hyderabad location. Details below
Relevant IT Experience: 5.7 Years
Web application security testing Exp : 1 year
Contact number: 9742855955
Notice period: 90 days (Negotiable)
Current Location: Bangalore
Preferred Location: Hyderabad
Thanks,
Raju
Aress have been developing mobile apps for many years with the breadth of our expertise extending to other OS (BlackBerry and Symbian), communications protocols (Bluetooth, GPRS and Near Field Communication) and messaging services (SMS, MMS).
Mobile App Development- Project Management ProcessBagaria Swati
Are you looking to build new capabilities or extend capabilities of existing business software to enhance productivity and profitability.
Key performance metrics are:
1. application scope management
2. project status and dependencies
3. prompt action for defect containment and defect resolution
4. schedule variance and budget variance analysis
Follow a well-defined and mature application development process based on business case analysis.
Who Manages a Project?
Highly-trained Project Managers at
CodeMyMobile manage the complete
application development lifecycle with a
focus on efficiency. Our experienced
project managers lead planning,
coordination, communication and control
of activities pertaining to technology
initiatives, ensuring that project outcomes
are in line with our customers’ business
objectives and comply with overall time,
cost and quality success criteria.
Responsibilities of the Project Manager:
Manage the project goals, scope and project
teams to ensure overall project success,
including customer satisfaction.
Develop and proactively manage project plans,
including scheduling, identification of risks,
contingency plans, issues management, and
allocation of available resources.
Project Control & Risk Management:
Monitor progress against the overall project
plan, leading the team toward successful
milestone completion.
Identify, communicate and manage project
issues and risks, notifying and/or escalating
appropriately to the customer or internally.
TechOut Solutions, LLC - A Short Introduction to Our Services and ProcessesKabeed Mansur
TechOut Solutions – founded in 2012 as a US-Bangladesh joint venture – assists US based clients with the design, development, and deployment of enterprise level IT solutions with a keen focus on quality assurance. By using our innovative offsite/offshore development model TechOut Solutions is able to deliver unparalleled value to our customers by reducing the risks traditionally associated with offshore development.
Our Mission: To become a trusted partner for our clients by providing them with low cost, high quality, and faster time-to-market software solutions.
Core Services:
Our offshore development team works in three core areas: Software Development, Web Development, and, Internet Marketing.
Software Development Services: Custom Software Development, .NET Application Development, Software Development in C/C++, and Mobile Application Development for Apple and Android.
Web Development Services: ASP.NET Development, PHP/MySQL (LAMP) Development, Java Web Application Development, and Mobile Web.
Internet Marketing Services: Search Engine Optimization, Social Media Marketing, and Pay Per Click Management.
Technologies:
ASP.NET, C#.NET, C/C++, VB.NET, JavaScript, Ajax, Ruby on Rails, JQuery, Objective C, Java - J2SE, JSP-Servlet, J2EE, EJB3, J2ME, PHP, .NET Framework, XNA, Spring MVC, .Net MVC Struts, iPhone, Android and Windows phone, MS SQL Server, Oracle, MySQL
The Software Engineering Profession SWE311The Software Enginee.docxssusera34210
The Software Engineering Profession SWE311
The Software Engineering Profession SWE311-1503A-01 7/27/2015
Antoine Sims
Table of Contents
Project Outline 2
Overview 2
IT Infrastructure 3
Software Engineering Practices 4
Methodology 4
Software Engineering Standards 7
Standards 7
Software Engineering Communications 9
Communication 9
Software Engineering Ethics and Roles 12
TBD 12
Software Engineering Issues 13
TBD 13
References 14
Phase 3. Repurposed: “This task contains portions of material that were originally submitted during the phase 3 discussion board The Software Engineering Profession in SWE311 with Professor Tricic
Project Outline
Overview
Bungie.net is a company that serves as a community role for online gamers that have been around since 1996. Gamers continue to use the site as a place to gather information about news, events and technical information on upcoming games and projects. The primary function of the site is to serve as a community hub for anything that is Bungie Studios related. Any game or project that Bungie has is available for discussion through forums. Online gamers can also track there stats for games that they play. The site also serves as a means for Bungie to get feedback about gaming experience before issuing out updates to the latest gameplay updating.
“Bungie.net leverages the Microsoft .NET Framework running on Microsoft Windows 2003 and Microsoft SQL 2000 Servers to serve up over 3 million page views per day and accumulating over 300 GB of data a month of online game statistics from the almost 1 million online games played every day. Not only is Bungie.net built to scale, but its design and inventive features have not gone unnoticed, since it was rated as the "Most Innovative Design" by IGN Entertainment. The site also exceeds a 99 percent up-time ratio even through peak usage periods such as the week of the Halo 2 release. Clearly, the release of the Bungie.net site defines a new milestone in the era of online game play. This case study provides insight into this accomplishment” (Microsoft Corporation, 2005).
IT Infrastructure
Bungie has two IT department consists of two separate entities. One of those entities is an IT department that maintains the Bungie.net website and the other is its engineering department. The engineering department is the department where Bungie creates its software for the video game that they develop. In the IT Department or Operations there are several positions such as IT engineer, IT support/server specialist, and datacenter operations specialist. These people maintain the online gaming data and the website. They deal with the servers keeping them up and running. The Engineering Department has a host of position that incorporate it such as database engineers, infrastructure/platform engineers, mobile engineers, leads, online engineers, tools engineers, game server tools engineers, engine programmers, game service engineers, activities engineers, graphics pr ...
This is a Software Estimation Guide for Practitioners, It includes information about the Software Estimation Process, Complexities, Estimation Methods (Size, Effort, Cost) and Techniques (Function Point, COCOMO and the Use Case based Estimation)
M/s Checkmate Global Technologies leverage cutting-edge technologies such as data analytics and AI, cloud computing, and blockchain to drive efficiency and growth. Our commitment to quality ensures fully responsive, user-friendly design, while our agile approach guarantees the fastest delivery.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
1. 1
TCOM 750
Request for Proposal Response
Management Volume
SUBMITTED BY
Candice Fernandes
Anagha Kankekar
Pramod Sonawane
Akshay Aayeer
Chinmay Upasani
Mark Mikhael
Chinmay Jade
Iman Sheshtawy
Submitted On: May 6th
2016
Internet of Things
FutureGen Solutions
2. 2
Table of Contents
1. Introduction ………………………………………………………………………………………………………………………….3
2. Our Approach………………………………………………………………………………………………………………………..3
3. Program Plan…………………………………………………………………………………………………………………………3
3.1.Project Organization……………………………………………………………………………………………………………..3
3.2.Key Personnel and Responsibilities……………………………………………………………………………………….4
4. Organized Schedule………………………………………………………………………………………………………………5
5. Our Perceptions and Profiles………………………………………………………………………………………………..5
5.1 Company Profile…………………………………………………………………………………………………………………..5
6. Engineering and Management……………………………………………………………………………………………..6
3. 3
FutureGen Solutions Management Volume
1. Introduction
The start-up of a project is the building block for the success of the start-up of a new
organization. It is very important for an organization to completely analyze and understand
the project profile in order to develop. Our approach leverages out very skilled personnel
with leading edge processes to deliver superior solutions on time and on budget. FutureGen
solutions is a new organization with one focus and one aim – Your success along with
Ours!
2. Our Approach
Our approach to project management is aimed at bringing out the best results possible. The
bases of project planning are the process and activity of planning the architecture,
organizing our schedules, motivating our team, and create an optimized balance between
the resource usage and the duration to achieve specific goals based on our program plan.
We work hard towards providing superior performance while still complying with the time
and funds constrain to meet your unique goal. Once our project scope is defined and the
appropriate methods to implement is determined we will list the various tasks necessary to
complete the project and the duration to finish it and group it into a comprehending work
breakdown structure. Our focus is on your unique result with a defined beginning.
3. Program plan
3.1 Project Organization
The purpose of project organization is to keep the team and management up to date on the
project's progress. FutureGen Solutions is led by our Program Manager(PM) who has
complete authority on behalf of the corporation to make the right decision in making our
project successful. Her duties include planning and strategically developing the project
along with allocating resources intelligently. The PM, the Chief Engineer (CE) and the
Finance Manager (FM) together will be directly responsible for analyzing the requirements
and defining the project scope and boundaries throughout the team. There are two team
that report back to the project manager i.e. the CE’s team and the FM’s team. The CE leads
the Development team of Software Engineers, Network Engineers, App Developer and
cloud engineer. The Business Strategist leads the QA team consisting of the Test and
Evaluation Engineers and Information Security. The PM is supported by the other staff as
detailed in Table 1 that shows the team members individual responsibilities.
4. 4
Image 1: Peer-to-Peer Solutions Organization Proposed Organization Positions us for Rapid
Response with Accountability and Expertise Applied as Appropriate
3.2 Key Personnel/Responsibilities
Name Program Title Reports To Responsibilities
Fernandes,
Candice
Program Manager Self Overall Program Operations and Quality
Sonawane,
Pramod
Chief Engineer PM System Design, Performance, and Quality
Upasani,
Chinmay
Cloud Support
engineer
Chief Eng. Hardware Assembly, Some SW Development and
cloud computing.
Jade, Chinmay Lead SW Dev. Chief Eng. Overall Software Design, Unit, and System
Testing, Code Dev.
Kankekar,
Anagha
SW Dev./App
Developer
Lead SW
Dev.
Code Development, Documentation of SW
Functions
Aayeer, Akshay Network Engineer Chief Eng. Network Designs and architecture
Mikhael, Mark Finance Manager PM Budget and Schedule
Sheshtawy,
Iman
Business Analyst &
Documentation
FM Business Analysis, Engineering Documentation,
User Manuals
Table 1: Personnel Are Organized and Indexed by Name, Title, Reporting, and Responsibilities
5. 5
4.Organized Schedule
Our schedule is detailed with through accounting for activities, personnel, duration, and
dependencies that ensure that no activity is overlooked and that all activities receive the
appropriate scrutiny and resources for success.
Image 2: Our Schedule Plans for All Phases, and Intimately Links Each Phase with Dependencies,
Required Personnel and Risks
5. Our Perceptions and Profiles
5.1 Company Profile
FutureGen Solutions, Inc. is a start-up located in Fairfax, Virginia. We have eight hard-working,
enthusiastic and dedicated employees with high skill experience in various domains. We have
special engineers with purely corporate experience in the private industry, while others worked for
Telecomm carriers, Internet Service Providers, international consortiums, networking device
vendors and start-ups. Our team is proud to achieve many industry certifications including PMP,
CISSP, CCIE, RHCSA, RHCE, VCP6-DCV, Java 8 and AWS. The thing that makes our company
stand out is that we understand the needs of a simple user and have provided users with services
that are user friendly yet reliable and effective. Our company believes in making low cost and
flexible integrated home control and monitoring system using a highly efficient router which also
supports cellular technology along with IP connectivity for accessing and controlling devices and
appliances remotely using mobile application. Our single hub solution comes with a gateway and
reports the analysis back to our robust cloud servers. Based on the analysis, the Gateway will
automatically decide when to adjust or run a specific task inside the home. Therefore, it deems fit
to also call our service the “Internet of everything”.
6. 6
6. Engineering and Management
FGS is implemented on basis of the classic System Engineering “V”. A series of documented
baselines are established, including a concept of operations that defines the user needs, a set of
system requirements, and high-level and detailed design.
The hardware and software are procured or built at the bottom of the "V," and the components
of the system are integrated and verified on the right side. Ultimately, the completed system is
validated to measure how well it meets the user's needs. Our planning process includes Planning
for operation, Scoping and Financing, System requirements, Software and Hardware
development, System verification and deployment, System validation and Changes and upgrades
as shown in Figure, but we have a unique process for the Design and Test phases that sets us
apart from our competitors and assures quality in our products. We use the ‘Vee’ structure
systematically from left to right for our project planning such that we have divided the operations
on various level of the ‘Vee’. We have split the Project team into two different but equal groups
such like that of the ‘Vee’ that provide quality and balance against each other throughout the
development cycle. The left wing encompasses of the Engineering & Development team who is
under the daily guidance of the CE who is directly responsible for providing the detailed
requirements to the Software Engineers, Network Engineering and the hardware requirements.
This side of the ‘Vee' ensures complete and thorough planning of the architecture and design of
the project. After the E&D team are ready with their detailed design, the software/hardware
development and installation is implemented.
The Quality Assurance team is led by the Network Engineer & Cloud Engineer. The “QA” team
implements the device Testing and Evaluation and the Security Assurance operations. This team
is the backbone for the right side of the ‘Vee’ structure whose sole responsibility includes testing,
7. 7
verification, deployment and validation. In addition, the QA team makes sure every aspect of the
project complies with all applicable industry standards,IEEE,TCP/IP,ANSI,etc
The QA compliance team is the counter-balance to the Development team and acts as an
independent evaluator of the products delivered by the Development team. Finally, a vital part
of the planning process is the maintenance and any new changes and upgrades for future use
and improvisation.
8. 1
TCOM 750
Request for Proposal Response
Technical Volume
SUBMITTED BY
Candice Fernandes
Anagha Kankekar
Pramod Sonawane
Akshay Aayeer
Chinmay Upasani
Mark Mikhael
Chinmay Jade
Iman Sheshtawy
Submitted On: May 6th
2016
Internet of Things
FutureGen Solutions
9. 2
Table of Contents
1. Introduction ..............................................................................................................................................4
2. Big Idea......................................................................................................................................................4
3. Concept of Operations..............................................................................................................................6
3.1 IOT making our life easy......................................................................................................................7
3.2 Devices provided by FutureGen..........................................................................................................7
i. Fitbit..............................................................................................................................................7
ii. iSensor HD.....................................................................................................................................8
iii. NEST ..............................................................................................................................................8
iv. Philips Hue ....................................................................................................................................8
3.3 Devices that user can integrate with FutureGen................................................................................9
i) Security .............................................................................................................................................9
ii) Health..............................................................................................................................................10
3.4 Cloud Application..............................................................................................................................10
4. Design and Architecture..........................................................................................................................11
4.1 System of system Architecture. ........................................................................................................11
4.2 FutureGen Gateway (Almond+) Technical Specifications.................................................................11
4.3 Interoperability and Standards Compliance .....................................................................................12
i. Almond Router.................................................................................................................................12
ii. Types of Operating Systems Supported..........................................................................................12
iii. Types of Protocols Supported........................................................................................................12
iv. Altronix SMP3E Power Supply........................................................................................................13
v. External Storage – Seagate 1TB Hard disk ......................................................................................13
vi. USB Dongle - Verizon Pantech 4G LTE USB Modem UML290........................................................13
4.4 Off the Shelf, Open Source & Openly available Components...........................................................13
i. Software Update ..............................................................................................................................13
ii. Firmware Upgrade Implementation ...............................................................................................13
iii. Protocols.........................................................................................................................................14
iii. FutureGen’s addresses these requests in the following manner...................................................14
iv. FutureGen makes use of the following off the shelf components.................................................15
5. Security and Privacy................................................................................................................................16
5.1 Configuration of Devices...................................................................................................................16
5. 2 Information Assurance, Security and Protection against Cyber Warfare Attacks...........................17
10. 3
i. Application and Data........................................................................................................................17
ii. Home Security.................................................................................................................................18
6. Risk Management ...................................................................................................................................19
7. Robust and Resilient Design....................................................................................................................20
7.1 Backup Internet Connection .............................................................................................................20
7.2 Backup Storage .................................................................................................................................20
7.3 Backup Power supply........................................................................................................................20
7.4 Backup Connectivity..........................................................................................................................20
8. Support Challenged Communication......................................................................................................21
8.1 Cellular ..............................................................................................................................................21
8.2 Satellite .............................................................................................................................................22
11. 4
1. Introduction
Internet of Things is a world-wide network of interconnected objects which are outfitted with
sensors, actuators and Radio Frequency Identification (RFID) devices. These devices are uniquely
addressable and use standard communication protocols in a heterogeneous networking
environment including objects of totally different functionality, technology and application fields.
Building upon the revolutionary success of mobile communication, Internet networks, the
advances in sensor, RFID, Nano and other smart technologies, the IoT expands the current Internet
with the objective of Connecting objects outfitted with sensor and RFID devices (smart objects).
Detecting changes in the physical status of connected things in real-time. Identifying and
localizing the smart objects. Monitoring the changes in the physical status of connected things.
2. Big Idea
We have a dream and that too a big one. And we want to turn it into reality. IoT is such a technology
has been reaching out to the world in a fast forward fashion.
Have you ever had thought sometimes, that perhaps you need something to work on the tips of
your fingers, obeying each every command like a Gennie. Well, now a days we have become
slaves of our dear mobile phones and its time we show them who the master is.
We at FutureGen Solutions are here to present the world with the already hyped technology (IoT)
and showcase the same in a way that would charm and improve our lives on a daily basis.
Our big idea is to provide our customers with a magic box (router). The magic box on receiving
commands from the customers, will do exactly as said. Now, who wouldn’t want play little boss
at home right?
The main aspect that sets FutureGen apart is that we have been consumers of IoT devices and
know exactly what the common man’s needs are and how to fulfill them.
Along with our magic box, FGS will provide our customers with four devices that have been
electively customized as per the most common needs of heath, security, energy and entertainment.
We not only provide our customers with services but, we care more about our customer’s security
and privacy.
Backup will never be an issue again since we at FGS will guarantee you services that wouldn’t let
you down at any time.According to recent surveys we have noticed that if you have only Wi-Fi
connectivity in accordance with IoT or cellular connectivity with IoT, you are rendered helpless.
FGS, keeping all of these points in mind have designed such a solution that has amalgamated both
the technologies and integrated it into a single device.
So no worries, if you’re Wi-Fi connection goes down, switch over to your cellular connection and
you’re still the BOSS!!!
More over the user’s smart doesn’t have internet as well as cellular connectivity our partner firm
AQL have their own SMSC gateway which stores the SMS of the intended user till the user gets
back network connectivity.An external storage of 1TB is also provided so that if both the internet
services goes down the data can be stored on this storage temporarily and once the network is back
12. 5
again it can transfer all the data from the storage to the cloud which will free up all the space on
the external hard drive.
In case of a power outage FutureGen Solutions has provided an UPS (Uninterrupted Power
Supply) which will help our router to stay online all the time with zero down time even when there
is a cut in the power or any fluctuation in the power.
For FutureGen Solutions, quality service and your well-being comes first!!!
Smart Phone Interface of FutureGen
13. 6
3. Concept of Operations
Figure 1
1. The concept of operation is actually quite simple. FutureGen has collaborated with “Almond+”
to white label the latter’s router with a proprietary firmware upgrade and will be supplying this
unit as part of a pre-packaged solution. The router supports all major service providers.
2. Various IoT sensors will be connected to the Almond+ router, these devices can be from
various categories like Health, Security, Energy Management and Entertainment.
3. We need to connect all the IoT devices which the user has, to the Almond+ router so that we
can transmit the output data of the devices and make them available on the FutureGen
application running on user’s smart phone after processing on the Cloud.
4. The Almond+ router will send the the data to the Cloud over a secure VPN using IPsec tunnel.
5. This data is processed and analyzed by our proprietary software on the cloud. The software is
smart enough to categorize the data depending on mission criticality. Health data for example,
is assigned the topmost processing priority. Thus, in case of a health condition alert, an
immediate notification is sent to the customer via the FutureGen App on their smartphone.
SMS alerts are also sent over the cellular network (via AQL firm) as a redundant alerting
system.
6. A life threat alert is sent to the local hospital, other emergency services and the customer’s
relatives if significant heart rate peaks and similar life threatening surges are observed in the
health data received. At the time of service installation, the customer can add the emergency
contact details of the nearby, preferred hospitals and their relatives.
14. 7
7. In the user portal, the residential address is stored on the cloud, so whenever our software
notifies the emergency service they have the customer’s home address and their relatives’
contact information. This reduces the response time. The user can modify the above mentioned
information by their own, using the unique username and password.
8. Unauthorized access to a user’s account is prohibited by the use of a user id and password login
the FutureGen secure website using HTTPS.
9. The data stored on the cloud is encrypted using the 256-AES.
10. Support for redundant, cellular internet service via LTE is provided using an external USB
modem.
11. If both mediums to the internet connection fail, we also provide external backup storage for
important health data that is retransmitted to the cloud when the connection is restored.
12. An uninterrupted power supply with a short duration power backup is also provided which will
help our router to stay online in case of power cuts and fluctuations.
3.1 IOT making our life easy
The next big trend that people are talking about is the Internet of Things. The Internet of Things
(IoT) will be huge in several ways. The forces that are driving it and the benefits that are motivating
it are increasingly numerous, as more and more organizations, industries, and technologists are
focusing their goals on implementing the Internet of Things. The number of connected devices on
the IoT network will be huge. The ease with which IOT amalgamates itself in to our day to day
life has made the entry of technology into our daily chores, a smooth journey. In short, we can
summarize the internet of things will be more personal and predictive. This will make life easy,
comfortable with the help of mobility and cloud. The internet of things will merge the physical
world and the virtual world to create a highly personalized and often predictive connected
experience. The main sectors in which IOT can help improve our daily life is Security, Health,
Energy and Entertainment.
3.2 Devices provided by FutureGen
i. Fitbit
We are providing our customers with Fitbit in our package. Fitbit is a wrist band which measures
your sleep cycles, keeps a count on how many steps you walk. It can act as your morning alarm.
It gracefully wakes you up in the morning with gentle vibrations and blinking of LED light on the
Fitbit according to the time which is set by you as an alarm. Fitbit also tracks the number of hours
the user slept. When the user wakes up in the morning the Fitbit senses it and sends the data to the
NEST which will monitor the temperature and control all the other IOT devices. It will start the
fans in the house which will draw the cool morning air from outside the house so that the user can
15. 8
enjoy the cool and fresh air. If the temperature in the afternoon is high it will automatically adjust
the temperature by controlling the AC. It will also start the coffee machine for the user and by the
time the user reaches the kitchen a hot coffee is ready for the user. While the user is sleeping the
Fitbit will keep a track of your heart rate and if it increases the Fitbit will vibrate intensively which
will notify the user that there is some problem in his vitals. The user can get a detailed information
of his vitals in the FutureGen App in his smart phone, and a notification will be send to his relatives
and emergency services. The customer can monitor his health and vitals and well as of his family
members. FutureGen’s app will provide notifications to the user regarding his diet and health 24/7
and will also send emergency alert messages in case of a health emergency to the user as well as
the hospital. The doctors will receive all the vital signs recorded by the Fitbit and can thus evaluate
all the data and can act quickly on whether to send an EMT (Emergency Medical Technician) to
the customer or just give him some regular medication advice. The user will also get a notification
about the same and will be notified about the incoming EMT.
ii. iSensor HD
iSensor HD is an equipment used for home security. It has a motion as well as audio sensor. iSensor
HD is a modular, self-installed, home security system. It is a small and unimposing security device
that can be mounted on walls, ceilings, or even set atop a desk. Several sensors can be added
around your home. Offering up to 1280 x 720 HD quality in real-time, the iSensor HD aims to
bring the ease of self-installation and the ultra-high level of 256-bit encryption to the home security
market. It has a viewing angle of 240 degrees. In case of any security breach the user will be
provided with a snapshot of the intruder and he can start online streaming of video and audio on
his app and if he feels it’s a security threat he can start recording the video over the cloud or the
external storage of the device and also call for emergency. iSensor HD has camera with infrared
so it can be used in day as well as in night.
iii. NEST
Nest learns the temperatures you like and programs itself in about a week. Nest automatically
turns itself down when nobody’s home to help you save energy. User can also control the energy
consumption by controlling the NEST and also conserving energy. NEST can communicate other
IOT devices like Fitbit, Air conditioner, Fans, etc. to give better performance.
iv. Philips Hue
The motion sensor camera will detect whenever the user enters the room or exit the room, and
accordingly it will instruct the Philips Hue to turn on the lights when user is entering and turn them
off when the user is leaving. The user can also control this Philips Hue from the FutureGen app on
his smart phone. He can increase or decrease the intensity of light and also change its colors.
16. 9
3.3 Devices that user can integrate with FutureGen
i) Security
Security is a pivotal part of our lives. We do not want any of our private data to be viewed by an
anonymous person. Therefore, every organization implementing technology places security first.
a. Motion Sensor Camera
Monitoring your homes and its access points can represent a boon to your overall security. IoT
will allow network cameras to think independently and make smart decisions on their own.
Imagine a mesh of network cameras that correspond between each other to alert the next camera
of a person or object entering shortly from the left of a given scene. IoT-enabled cameras may also
be able to cover up for one of their peers being damaged or obstructed. As enthralled as we are
with the individual capabilities of IoT devices, in the security world the more important aspect of
this trend is how all the components work together to solve a tangible challenge. First of all, IoT-
based systems must be easy to design, install, maintain and use.
b. Burglar Alarm
An automatic device which will give an alarm when a window, door, safe, etc. is vandalized by a
burglar. With the implementation of IOT with the burglar alarm we can be notified of the unusual
activities taking place at our home with a technology that is within our reach i.e. our mobile phones.
Phone notifications are a good way to get alerted about an unusual activity. It is not always possible
for a user to monitor the data with a Mobile app or a website. If they get a notification about a
certain activity or a sudden variation in data they will come to know this by time and can
immediately check it with the mobile app and can take the further steps.
c. Face Recognition System
Facial recognition is a powerful tool when combined with IoT. Face recognition technology along
with IoT measures and matches the unique characteristics for the purposes of identification or
authentication. Often leveraging a digital or connected IoT based camera, facial recognition
software can detect faces in images, quantify their features, and then match them against stored
templates in a database.
d. Smart Locks System
Smart door locks are arguably one of the nicest of smart home comforts. They can automatically
detect your presence via the Bluetooth connection in your smartphone and unlock your front door
for you. They let you send electronic keys to your friends that work only during times that you
specify. Some will even connect to your larger home automation system, telling your smart
thermostat when you’re away so it can enter its energy-saving mode.
17. 10
ii) Health
a. Grocery Management
Grocery Management is another health application that can be implemented apart from fitness and
medical response. Smart Refrigerators today are capable of connecting to Wi-Fi and maintain
grocery inventory. The customer can be notified and the items can automatically be added to the
shopping list on the customer’s smartphone. Items to be bought can also set for automatic online
purchase from the customer’s preferred grocery retailer.
b. Medication Timer Alert
The internet of things offers a cure for many of the afflictions plaguing the NHS and an opportunity
for patients to take control of their health. The medical timer alerts the user about its medicine
reminders and it does so by beeping, vibrating, ringing, buzzing and talk up.
c. Emergency Alert System
One of the use case for IoT is connected devices that can communicate and take actions
autonomously to alert on emergency situations inside a large building (Schools, Hospitals, and
Retail Stores etc.). API development to trigger specific actions in IoT devices, Mobile apps to
control IoT devices like sirens, locks & alarms, Socket communication between mobile devices and
Middleware to communicate with different devices.
3.4 Cloud Application
FutureGen will run our own application on Amazon Web Services. After receiving the data from
the user on the uplink link, this software will segregate the data based on from which sensor the
data was provided and based on the specific user. This software will also have the ability to
Analyze the data and take necessary action based on the data provided from the sensors. For
example, if the data is received from the Sensor like Fitbit, Software will be intelligent enough to
decide whether the Data is the lifesaving alert or just a daily checkup data. If the data is lifesaving
Alert, it will send the Alert to the Emergency services along with the home address of the patient
as well as to the relatives of the patient.
It not only sends the critical Alert over the internet but also send on the cellular network on the
user phone in case if the user device does not have any internet connectivity. We have collaboration
with major cellular companies like Verizon and AT&T.
18. 11
4. Design and Architecture
4.1 System of system Architecture.
The systems-of-systems Architecture consist of sub systems and corresponding application that is
needed to make the whole system works. The core of the system is the gateway router upon which
out IoT devices and services are built upon.
4.2 FutureGen Gateway (Almond+) Technical Specifications
Almond+ have the touchscreen interface with resolution of 320x240 pixels
4 Gigabit LAN and 1 Gigabit WAN Ports
Almond Router
Security Health Energy Entertainment
Motion Sensor
Camera
Burglar Alarm
Facial Recognition
System
Smart Locks
System
Fitbit
Grocery
Management
Medication Timer
Alert
Emergency Alert
System
Thermostat
Smart Lighting
Smart Meter for
Electricity & Gas
Water
Management
System
Smart Music
System
TV Shows Alert
Smart TV
19. 12
2 USB 3.0 ports
Multi-Purpose: Router / Range Extender / Wireless Bridge / Access Point
Dual Band Concurrent 802.11bgn + 11ac (AC1750)
Home automation: ZigBee HA 1.2, Z-Wave,
VPN Server, Port Forwarding, DMZ, UPnP
USB File sharing
Free iOS & Android Apps & Browser
UI Range: 50-200 ft. (Depends on Construction)
Power Supply: 12V, 2.5A (Input: 110 - 220V, 50-60Hz).
Home Security & Home Automation
Almond+ also acts as a versatile smart home security and automation hub. Just add compatible
sensors.
Remote Access and Control
Using a free iOS/Android app, you can remotely access the router and connected smart home
devices. You can create rules and schedules, and receive smartphone alerts when pre-set events
happen.
4.3 Interoperability and Standards Compliance
FutureGen’s home gateway will be using the “Almond+” Router, Altronix SMP3E Power supply
as interrupted power supply and USB Dongle.
i. Almond Router
a. Data Transfer Rate: 300 Mbps
b. WiFi Bands: 2.4 GHz
c. Connector type: RJ-45
d. Integrated Switch: 2-port Switch
e. Interface type: LAN, USB2.0, WAN
f. Key Feature: USB Port
g. Support 2G /3G/4G Dongles
ii. Types of Operating Systems Supported
a. IOS
b. Android
c. Windows
iii. Types of Protocols Supported
a. TCP/IP v4 & TCP/IPv6
b. Wireless Protocol: 802.11b/g/n, Zigbee, Z-Wave.
c. Data link Protocol: Ethernet, Fast Ethernet, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n,
d. Home Automation
e. VPN
20. 13
iv. Altronix SMP3E Power Supply
a. Voltage supplied: 6/12/24VDC
b. Current Supplied: 2.5 A
v. External Storage – Seagate 1TB Hard disk
a. USB 3.0 Interface
b. Backward compatible with USB 2.0
c. Data transfer rate up to 4.8 Gbps
vi. USB Dongle - Verizon Pantech 4G LTE USB Modem UML290
a. LTE(700)+ EVDO Rev.A(800/1900)
b. Utilizes QUALCOMM MDM 9600 chip set
c. Supports 4G and 3G network technologies
d. Data Speeds LTE bands : Typical download speeds of up to 25 to 50 Mbps in Mobile
Broadband coverage area
e. CDMA bands: Typical download speeds of 600 Kbps to 1.4 Mbps and upload speeds of 500
to 800 Kbps in Mobile Broadband coverage area.
4.4 Off the Shelf, Open Source & Openly available Components
i. Software Update
a) Software development will have a protocol converter which will help it to cope up with the
future technology. As we are giving it a scope of upgrading the software it can run any protocols
or devices that will be developed in the future.
b) The FutureGen firmware on each device will come with a call-home feature that
automatically retrieves the latest software updates and patches.
ii. Firmware Upgrade Implementation
We will Flash our own Software on top of the Almond+ router through rights obtained by
collaborating with securifi. This would allow us to customize our software to provide support
across multiple IoT devices. The software would also incorporate our protocol converter that
would allow the data to be transmitted to our cloud application. The data which is obtained from
the IoT devices would be encapsulated with the TCP header and prepared to be sent across the
secured VPN link using IPsec tunnel.
Through firmware upgrades on the air, we would be able to provide support for any new IoT
devices and have support for IoT supported protocols. The smart router will secure the IOT
sensors. Each node will be configured to statically and tied to each IOT sensor’s MAC address and
authenticated based. While transmitting the data over the VPN link it will be transmitted over a
256 bit AES encrypted VPN link.
If the wired internet connection between the AWS and the user house goes down, then our 4G LTE
will be used to send data to the Cloud since Almond+ support 4G dongles. To make more robust
user can use two different service providers: one service provider for wired internet connection
21. 14
and another for wireless internet connection. If both internet connection fails, we also provide
external backup storage for important health data and retransmitted to the cloud when the
connection is restored. We are collaborating with the AQL firm which provides the SMS service
to the Customers. It will send the SMS for emergency Services like Healthcare and Security only.
In that we are sending SMS only for life threatening issues. Our proprietary software on the AWS
will send the SMS through AQL firm on Cellular network. So even if the user phone does not have
any internet connectivity and have only cellular connectivity they will receive SMS. In normal
operation where user phone is having both internet as well as Cellular connectivity, he will receive
Alert message through internet and SMS.
iii. Protocols
a. ZigBee: It is a radio frequency communication standard based on IEEE 802.15.4. The
ZigBee coordinator is responsible for creating and maintaining the network. Each
electronic device is ZigBee managed by the coordinator. The ZigBee standard provides
250 kbps data rates and 40kbps is what is required for most of the controller devices.
b. Z-Wave: It is a protocol for communication among devices used for automation. It uses
radio frequency for controlling and signaling. It tries to build simpler and less expensive
devices than Zigbee. Most of the manufacturers make Z-Wave compatible products, mostly
in lighting and control space.
c. Wi-Fi: It is the used for two main purpose: one for communication standards for
multimedia application in home automation and second as an alternative to ZigBee based
on the controller. This is mainly used because homes increasingly have Wi-Fi networks
and Wi-Fi enabled devices such as PDA’s and mobile phones.
iii. FutureGen’s addresses these requests in the following manner
a. The “Almond+” Router is a device that is available online and in stores and it supports
IOS, Windows and Android operating systems.
b. Altronix - An Uninterruptable power supply which will help our router to stay online all
the time with zero down time even when there is a cut in the power or any fluctuation in
the power.
c. USB - Verizon Pantech 4G LTE USB Modem UML290 – This will provide a cellular
internet service for data usage as redundancy for the internet connection.
d. We will add a protocol converter which will allow the unit to be agnostics to protocols.
e. The Almond+ hardware has built in chipsets for each wireless protocol.
f. FutureGen’s Software team will develop a software that will integrate the data obtained
from all the devices into one single format and send it to the cloud form which the data can
be retrieved anytime.
g. FutureGen’s software developing team will write and develop a code to accept multiple
languages from the most popular brands. The software will also send notifications to the
user if the user’s cloud space is getting full and provide him with different option either to
upgrade his storage or to delete the previous data.
22. 15
iv. FutureGen makes use of the following off the shelf components
Nest Thermostat Fitbit
iSensor HD Philips Hue Lights
Apple Devices Android Devices Windows Devices
23. 16
D-Link Devices Lorex Surviellance
Zen Thermostat Centrallite Thermostat
5. Security and Privacy
5.1 Configuration of Devices
We will connect IOT devices supporting different platforms like ZigBee, Z-Wave, WI-Fi
to the ‘Almond+’ Router. This router will have internet connectivity through the modem
as well as through USB Dongle.
To prevent the router from shutting down due to power failure we are connecting a UPS.
In case if both the internet connections go down we don’t want our user to lose any data,
hence we have an external storage of 1 TB connected to the router which will save the data
temporarily.
24. 17
5. 2 Information Assurance, Security and Protection against Cyber
Warfare Attacks
i. Application and Data
FutureGen uses Almond+ as a router to connect all the devices together. The Almond+ router
supports integration of up to 100 sensors for proper functioning.
The coverage area of the router will be confined to a customer’s personal area through the use
of Login ID and passwords. Every house will have a profile created by FutureGen into its
database for usage with 1 Login ID and password for each customer premise.
Every house will have a primary user and multiple secondary users. The primary user will
receive a one-time activation key when a new user tries to log into the router. New users with
this one time activation key can control the services given by FutureGen to the premise.
This will stop any hacker from guessing the password and getting into the system and control
it remotely.
User data will be stored on the cloud. This data will be sent to the cloud by creating a VPN
(Virtual Private Network) for each user. This VPN tunnel will be unique for each user so that
user data is not tampered or manipulated by any hacker.
VPNs, or Virtual Private Networks, allow users to securely access a private network and share
data remotely through public networks. Much like a firewall protects your data on your
computer, VPNs protect it online.
We use IPsec to secure the VPN tunnel which is created. IPsec encrypts the entire data packet
which is entire through the tunnel.
IPsec is easier to maintain and more secure. IPsec is based on network layer so we can monitor
all kinds of traffic that is passing through the network.
Moreover, IPsec is not application dependent. IPsec VPN’s can run on any applications.
FutureGen will be hosting their server on the AMAZON cloud which is public cloud. The data
which is stored on the cloud needs to be secured. So, we will be using 256 AES encryption to
encrypt our data and keep it secured on the cloud.
AES is Advanced Encryption Standard which uses symmetric key algorithm i.e. same key is
used for encryption and decryption.
25. 18
Amazon Cloud is a huge space for storage of which we will be leasing some space for FutureGen.
We will be segregating the cloud into different parts for each user to use to maintain security and
privacy for each of them.
We will also have a firewall for malware and virus protection.
ii. Home Security
Motion Sensor Camera
FutureGen provides home security by using Motion Sensor cameras. Motion Sensor cameras
move in the direction of a persons by sensing the person’s movement.
The main purpose of the motion detector camera is to sense an intruder and send an alert to the
control system.
Motion detector cameras come into effect when the system is told that there is no one at home
or during night time when no motion is to be detected around the premises.
FutureGen provides control and monitoring of the motion sensor camera with alerts and alarms
through the application and website remotely.
The compound lights are turned on during night time if the motion sensor camera detects motion
to alert the intruder that the premises is secured.
Burglar Alarm
A Burglar Alarm is triggered when there is any intrusion in the system.
Intrusion can be any unauthorized person trying to enter the house by tampering the smart locks.
When the burglar alarm is triggered the user receives an alert on the application, also there is
large noise alerting the intruder as well as the neighbors.
Also, when the burglar alarm is triggered the emergency services are alerted through the
software.
26. 19
Facial Recognition System
FutureGen uses Facial Recognition System for authorizing users to enter the home.
The home resident’s faces are saved in the database and only those matching the database are
granted entry to enter the house.
The facial recognition system is connected to the Smart lock, which is opened when the facial
recognition matches.
Smart Locks System
Smart Lock system is Wi-Fi enabled and can be controlled through the application.
The application will provide an interface to control locks.
Smart lock will be connected to the facial recognition system and burglar alarm.
Fire and Smoke Alarm
All smoke detectors consist of two basic parts: a sensor to sense the smoke and a very loud
electronic horn to wake people up.
When smoke is detected the alarm is triggered and an alert is sent to the user application.
User can trigger the burglar alarm and can also contact the emergency services using the
application.
6. Risk Management
The Project Manager is responsible for all the risk management. He should be able to suggest a
systematic and proactive approach to overcome risks.
Risk – Budget over runs
Mitigation – Fundraising through GoFundMe and similar services.
Risk - Loss of valued employees
Mitigation – Employees hired are multi-talented people and can multitask to do different things.
E.g. – Even if the Cloud Support Engineer leaves the company at some stage our Network Engineer
is capable to do cloud related service.
Risk - Power failure
Mitigation – We will be providing temporary power backup till the permanent services are being
restored
Risk – Market share not captured
Mitigation – We will try to raise more fund and analyze the market requirements in a better way
and come with improved solutions.
27. 20
Risk – Cloud Server Reliability
Mitigation – With increasing number of customers we will be implementing multiple server
instances and use load balancers to load balance the traffic coming from multiple customers to
make or service more efficient.
Risk – Delay to send the data through the VPN to the cloud.
Mitigation – We are implementing QoS to give preference to send Health and Security data with
higher level of preference.
Risk - Internet access for rural area customers
Mitigation – Identify cellular carriers with best data coverage in the area.
7. Robust and Resilient Design
7.1 Backup Internet Connection
At the customer side the router will have internet connections from two service providers, one
through the modem and other through the USB data modem.
7.2 Backup Storage
In case both the internet connection fail on the router, we have temporary external data storage
which will store the data temporarily. As soon as the internet connection comes up data will be
sent to the cloud.
7.3 Backup Power supply
If the power goes down the router will get switch off and all the services will be interrupted
including the monitoring of emergency services. To prevent this we are providing UPS so that it
gives sufficient time for the existing power backup at the customer premise.
7.4 Backup Connectivity
We collaborated with the AQL firm. This firm is having their own Message Gateway, our
proprietary software on the Cloud is capable enough to decide which data is critical and requires
less response time. Software will send this data to the AQL gateway which will use the cellular
network to send the SMS on the user’s smart phone. So in a case user don’t have the internet
connection, then also user will receive the Emergency Alert messages. Also if the user don’t have
the internet as well as cellular connection in that case the AQL firm Gateway have their own
message storage, so as soon as the user gets back the network connectivity, a message is sent from
the storage.
28. 21
8. Support Challenged Communication
8.1 Cellular
If the wired internet connection between the AWS and the user house goes down, then our 4G LTE
will be used to send data to the Cloud since Almond+ support 4G dongles. To make more robust
user can use two different service providers: one service provider for wired internet connection
and another for wireless internet connection. If both internet connection fails, we also provide
external backup storage for important health data and retransmitted to the cloud when the
connection is restored. We are collaborating with the AQL firm which provides the SMS service
to the Customers. It will send the SMS for emergency Services like Healthcare and Security only.
In that we are sending SMS only for life threatening issues. Our proprietary software on the AWS
will send the SMS through AQL firm on Cellular network. So even if the user phone does not have
any internet connectivity and have only cellular connectivity they will receive SMS. In normal
operation where user phone is having both internet as well as Cellular connectivity, he will receive
Alert message through internet and SMS.
29. 22
8.2 Satellite
In the future if the user is living in a place where there is no internet connectivity as well as cellular
connectivity, the user can enjoy our services through the satellite connectivity. In which the user
can upload or retrieve the data from the cloud using satellite connectivity. We will provide a
satellite modem to the user through which he can connect to the cloud.
***********
30. 1
TCOM 750
Request for Proposal Response
Cost Volume
SUBMITTED BY
Candice Fernandes
Anagha Kankekar
Pramod Sonawane
Akshay Aayeer
Chinmay Upasani
Mark Mikhael
Chinmay Jade
Iman Sheshtawy
Submitted On: May 6th
2016
Internet of Things
FutureGen Solutions
31. 2
Table of Contents
1. Costing Overview………………………………………………………………………………………………………………….3
2. Customer’s Package………………………………………………………………………………………………………………4
3. Development Particulars……………………………………………………………………………………………………….5
4. Man Hours and Salary of the Employees……………………………………………………………………………….6
32. 3
1.Costing Overview
With an investment of $100,000, FG plans to use the money for research, application development,
and testing. The management design of FG is executed following the “V” program plan, which
will allow for planning, CONOPS, requirements, designing, and testing.
FUTURE-GEN’s plan is to use the Almond+ as a hardware platform. By taking this
approach, FG does not need to spend additional money on the design, and development of
hardware platforms. Using the Almond+ will cut the hardware cost aside from actually purchasing
the device. FG estimates that a licensing deal can be made with Almond+ for $10,000. Selecting
a hardware platform that can communicate with each protocol, will cut time and cost for the FG
engineers by only needing to create a software that will be used to flash the Almond+, a new user
interface, and an energy application, healthcare application, entertainment application, and
security application.
The initial software development estimate of the user interface will be the most expensive
effort because it will require at least one month to design, develop, and test which will be about
880 man hours of initial firmware/GUI development, with an estimate cost of $65,200. Once FG
engineers create the firmware/user interface GUI, we will use the remaining $44,165 on Cloud
Storage Leasing, testing equipment, and unforeseen costs.
To make a return on the initial investment, FG plans to charge subscription fees/App fees.
See the bullet points below for explanation.