SlideShare a Scribd company logo
piotr.krol@3mdeb.com
http://3mdeb.com
http://lmgtfy.com/?q=3mdeb
rafal.korszun@kleder.co
http://kleder.co
•Sensors Sensor channel MCU
IoT
Hubs/Transceivers
IoT Hub channel
Credits to Michael Schloh von Bennewitz: https://fosdem.org/2016/schedule/event/deviot19/
•Scalability Security
Readiness Interoperability
IoT HTTP/2 protocol IoT HTTP protocol IoT MQTT protocol
PHP
-
Amazon CognitoAWS IAM
Amazon CognitoAWS IAM
Xamarin iOS
Credits https://aws.amazon.com/iot/how-it-works/
AWS IoT
Alarm board
IoT MQTT protocol
Armed Status
Light
Window sensor
Alarm Status
Light
AWS IoT
IoT shadow IoT policy IoT certificate
IoT hardware board
Amazon Cognito
mobile client
AWS IAM
MainActivity
Run App
CognitoCachingCredentialsProvider
New()
AWSIotDataClient
New()
setEndpoint()
getThingShadow()
contact@3mdeb.com
https://github.com/3mdeb/aws-iot-mqtt-pubsub
https://github.com/rafalkorszun/awsIotExample
http://kleder.co
http://3mdeb.com
How to build IoT solution using cloud infrastructure?
How to build IoT solution using cloud infrastructure?

More Related Content

What's hot

Css sf azure_8-9-17-stories_from_the_soc_paul fletcher_al
Css sf azure_8-9-17-stories_from_the_soc_paul fletcher_alCss sf azure_8-9-17-stories_from_the_soc_paul fletcher_al
Css sf azure_8-9-17-stories_from_the_soc_paul fletcher_al
Alert Logic
 
Stories from the Security Operations Center
Stories from the Security Operations CenterStories from the Security Operations Center
Stories from the Security Operations Center
Alert Logic
 
Lacework AWS Security Week Presentation
Lacework AWS Security Week PresentationLacework AWS Security Week Presentation
Lacework AWS Security Week Presentation
Lacework
 
SSL Pinning
SSL PinningSSL Pinning
SSL Pinning
yarden hanan
 
Microservices Security: dos and don'ts
Microservices Security: dos and don'tsMicroservices Security: dos and don'ts
Microservices Security: dos and don'ts
Minded Security
 
[OPD 2019] Web Apps vs Blockchain dApps
[OPD 2019] Web Apps vs Blockchain dApps[OPD 2019] Web Apps vs Blockchain dApps
[OPD 2019] Web Apps vs Blockchain dApps
OWASP
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
Alert Logic
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
Alert Logic
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOps
Alert Logic
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare data
Cloudflare
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
Alert Logic
 
Jenkins Terraform Vault
Jenkins Terraform VaultJenkins Terraform Vault
Jenkins Terraform Vault
Shrivatsa Upadhye
 
CSS17: Houston - Stories from the Security Operations Center
CSS17: Houston - Stories from the Security Operations CenterCSS17: Houston - Stories from the Security Operations Center
CSS17: Houston - Stories from the Security Operations Center
Alert Logic
 
The user s identities
The user s identitiesThe user s identities
The user s identities
Giuliano Latini
 
API Security in a Microservices World
API Security in a Microservices WorldAPI Security in a Microservices World
API Security in a Microservices World
42Crunch
 
Inherent Security Design Patterns for SDN/NFV Deployments
Inherent Security Design Patterns for SDN/NFV DeploymentsInherent Security Design Patterns for SDN/NFV Deployments
Inherent Security Design Patterns for SDN/NFV Deployments
OPNFV
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
Alert Logic
 
'Moon' Security Management System for OPNFV
'Moon' Security Management System for OPNFV'Moon' Security Management System for OPNFV
'Moon' Security Management System for OPNFV
OPNFV
 
Node JS reverse shell
Node JS reverse shellNode JS reverse shell
Node JS reverse shell
Madhu Akula
 
Containers at risk a review of 21,000 cloud environments
Containers at risk  a review of 21,000 cloud environmentsContainers at risk  a review of 21,000 cloud environments
Containers at risk a review of 21,000 cloud environments
dhubbard858
 

What's hot (20)

Css sf azure_8-9-17-stories_from_the_soc_paul fletcher_al
Css sf azure_8-9-17-stories_from_the_soc_paul fletcher_alCss sf azure_8-9-17-stories_from_the_soc_paul fletcher_al
Css sf azure_8-9-17-stories_from_the_soc_paul fletcher_al
 
Stories from the Security Operations Center
Stories from the Security Operations CenterStories from the Security Operations Center
Stories from the Security Operations Center
 
Lacework AWS Security Week Presentation
Lacework AWS Security Week PresentationLacework AWS Security Week Presentation
Lacework AWS Security Week Presentation
 
SSL Pinning
SSL PinningSSL Pinning
SSL Pinning
 
Microservices Security: dos and don'ts
Microservices Security: dos and don'tsMicroservices Security: dos and don'ts
Microservices Security: dos and don'ts
 
[OPD 2019] Web Apps vs Blockchain dApps
[OPD 2019] Web Apps vs Blockchain dApps[OPD 2019] Web Apps vs Blockchain dApps
[OPD 2019] Web Apps vs Blockchain dApps
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOps
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare data
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Jenkins Terraform Vault
Jenkins Terraform VaultJenkins Terraform Vault
Jenkins Terraform Vault
 
CSS17: Houston - Stories from the Security Operations Center
CSS17: Houston - Stories from the Security Operations CenterCSS17: Houston - Stories from the Security Operations Center
CSS17: Houston - Stories from the Security Operations Center
 
The user s identities
The user s identitiesThe user s identities
The user s identities
 
API Security in a Microservices World
API Security in a Microservices WorldAPI Security in a Microservices World
API Security in a Microservices World
 
Inherent Security Design Patterns for SDN/NFV Deployments
Inherent Security Design Patterns for SDN/NFV DeploymentsInherent Security Design Patterns for SDN/NFV Deployments
Inherent Security Design Patterns for SDN/NFV Deployments
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
 
'Moon' Security Management System for OPNFV
'Moon' Security Management System for OPNFV'Moon' Security Management System for OPNFV
'Moon' Security Management System for OPNFV
 
Node JS reverse shell
Node JS reverse shellNode JS reverse shell
Node JS reverse shell
 
Containers at risk a review of 21,000 cloud environments
Containers at risk  a review of 21,000 cloud environmentsContainers at risk  a review of 21,000 cloud environments
Containers at risk a review of 21,000 cloud environments
 

Viewers also liked

nasa
nasanasa
Sé parte de la nueva era, sé
Sé parte de la nueva era, séSé parte de la nueva era, sé
Sé parte de la nueva era, sé
Madelyn Piñeros
 
Okyanos Heart Institute Cardiac Cell Therapy 120319103208 Phpapp02 (3)
Okyanos Heart Institute Cardiac Cell Therapy 120319103208 Phpapp02 (3)Okyanos Heart Institute Cardiac Cell Therapy 120319103208 Phpapp02 (3)
Okyanos Heart Institute Cardiac Cell Therapy 120319103208 Phpapp02 (3)
Mansur_Abdullah
 
Quem? - Jesus
Quem? - JesusQuem? - Jesus
Quem? - Jesus
Hamer Iboshi
 
Pharmaindustryanoverview 100906074601-phpapp02(1)
Pharmaindustryanoverview 100906074601-phpapp02(1)Pharmaindustryanoverview 100906074601-phpapp02(1)
Pharmaindustryanoverview 100906074601-phpapp02(1)
Ifrah Harun
 
sciPADS presentation @ NPSE conference 2014 in Florence, Italy
sciPADS presentation @ NPSE conference 2014 in Florence, ItalysciPADS presentation @ NPSE conference 2014 in Florence, Italy
sciPADS presentation @ NPSE conference 2014 in Florence, Italy
Dica Lab
 
Presentation1
Presentation1Presentation1
Presentation1
yonas1402
 
Social Media India
Social Media IndiaSocial Media India
Social Media India
Nitin Ratra
 
Bc Marketing Global
Bc Marketing GlobalBc Marketing Global
Bc Marketing Global
Mansur_Abdullah
 
fishes and fishermans
fishes and fishermansfishes and fishermans
fishes and fishermans
Pratika Karthikeyan
 
Vitamins t uesday report
Vitamins t uesday reportVitamins t uesday report
Vitamins t uesday report
May Vallerie Vizcara
 
Barriers To Energy Efficiency in Industrial Parks
Barriers To Energy Efficiency in Industrial ParksBarriers To Energy Efficiency in Industrial Parks
Barriers To Energy Efficiency in Industrial Parks
CUSP | Univ of Guelph
 
52 Advanced Energy Technologies - MREA 2016 Workshop
52 Advanced Energy Technologies - MREA 2016 Workshop52 Advanced Energy Technologies - MREA 2016 Workshop
52 Advanced Energy Technologies - MREA 2016 Workshop
CUSP | Univ of Guelph
 
Okyanos Heart Institute Cardiac Cell Therapy
Okyanos Heart Institute Cardiac Cell TherapyOkyanos Heart Institute Cardiac Cell Therapy
Okyanos Heart Institute Cardiac Cell Therapy
Mansur_Abdullah
 
Эффективная монетизация нишевых социальных сетей
Эффективная монетизация нишевых социальных сетейЭффективная монетизация нишевых социальных сетей
Эффективная монетизация нишевых социальных сетей
Andrey Soloviev ★
 
The Earth and Its Motion
The Earth and Its MotionThe Earth and Its Motion
The Earth and Its Motion
dakilanglahi
 
Bleaching Unit By Elpis Dental
Bleaching Unit By Elpis DentalBleaching Unit By Elpis Dental
Bleaching Unit By Elpis Dental
Elpis Dental
 
สำนวนภาษาไทย เรื่อง ดินพอกหางหมู
สำนวนภาษาไทย  เรื่อง ดินพอกหางหมู สำนวนภาษาไทย  เรื่อง ดินพอกหางหมู
สำนวนภาษาไทย เรื่อง ดินพอกหางหมู The'Book Phansri
 

Viewers also liked (20)

Slag van de nijl
Slag van de nijlSlag van de nijl
Slag van de nijl
 
nasa
nasanasa
nasa
 
Sé parte de la nueva era, sé
Sé parte de la nueva era, séSé parte de la nueva era, sé
Sé parte de la nueva era, sé
 
Okyanos Heart Institute Cardiac Cell Therapy 120319103208 Phpapp02 (3)
Okyanos Heart Institute Cardiac Cell Therapy 120319103208 Phpapp02 (3)Okyanos Heart Institute Cardiac Cell Therapy 120319103208 Phpapp02 (3)
Okyanos Heart Institute Cardiac Cell Therapy 120319103208 Phpapp02 (3)
 
Quem? - Jesus
Quem? - JesusQuem? - Jesus
Quem? - Jesus
 
Pharmaindustryanoverview 100906074601-phpapp02(1)
Pharmaindustryanoverview 100906074601-phpapp02(1)Pharmaindustryanoverview 100906074601-phpapp02(1)
Pharmaindustryanoverview 100906074601-phpapp02(1)
 
sciPADS presentation @ NPSE conference 2014 in Florence, Italy
sciPADS presentation @ NPSE conference 2014 in Florence, ItalysciPADS presentation @ NPSE conference 2014 in Florence, Italy
sciPADS presentation @ NPSE conference 2014 in Florence, Italy
 
Presentation1
Presentation1Presentation1
Presentation1
 
Social Media India
Social Media IndiaSocial Media India
Social Media India
 
Bc Marketing Global
Bc Marketing GlobalBc Marketing Global
Bc Marketing Global
 
fishes and fishermans
fishes and fishermansfishes and fishermans
fishes and fishermans
 
Slag van de nijl
Slag van de nijlSlag van de nijl
Slag van de nijl
 
Vitamins t uesday report
Vitamins t uesday reportVitamins t uesday report
Vitamins t uesday report
 
Barriers To Energy Efficiency in Industrial Parks
Barriers To Energy Efficiency in Industrial ParksBarriers To Energy Efficiency in Industrial Parks
Barriers To Energy Efficiency in Industrial Parks
 
52 Advanced Energy Technologies - MREA 2016 Workshop
52 Advanced Energy Technologies - MREA 2016 Workshop52 Advanced Energy Technologies - MREA 2016 Workshop
52 Advanced Energy Technologies - MREA 2016 Workshop
 
Okyanos Heart Institute Cardiac Cell Therapy
Okyanos Heart Institute Cardiac Cell TherapyOkyanos Heart Institute Cardiac Cell Therapy
Okyanos Heart Institute Cardiac Cell Therapy
 
Эффективная монетизация нишевых социальных сетей
Эффективная монетизация нишевых социальных сетейЭффективная монетизация нишевых социальных сетей
Эффективная монетизация нишевых социальных сетей
 
The Earth and Its Motion
The Earth and Its MotionThe Earth and Its Motion
The Earth and Its Motion
 
Bleaching Unit By Elpis Dental
Bleaching Unit By Elpis DentalBleaching Unit By Elpis Dental
Bleaching Unit By Elpis Dental
 
สำนวนภาษาไทย เรื่อง ดินพอกหางหมู
สำนวนภาษาไทย  เรื่อง ดินพอกหางหมู สำนวนภาษาไทย  เรื่อง ดินพอกหางหมู
สำนวนภาษาไทย เรื่อง ดินพอกหางหมู
 

Similar to How to build IoT solution using cloud infrastructure?

Essential Capabilities of an IoT Cloud Platform - April 2017 AWS Online Tech ...
Essential Capabilities of an IoT Cloud Platform - April 2017 AWS Online Tech ...Essential Capabilities of an IoT Cloud Platform - April 2017 AWS Online Tech ...
Essential Capabilities of an IoT Cloud Platform - April 2017 AWS Online Tech ...
Amazon Web Services
 
Essential Capabilities of an IoT Cloud Platform - AWS Online Tech Talks
Essential Capabilities of an IoT Cloud Platform - AWS Online Tech TalksEssential Capabilities of an IoT Cloud Platform - AWS Online Tech Talks
Essential Capabilities of an IoT Cloud Platform - AWS Online Tech Talks
Amazon Web Services
 
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
Amazon Web Services
 
The Lifecycle of an AWS IoT Thing
The Lifecycle of an AWS IoT ThingThe Lifecycle of an AWS IoT Thing
The Lifecycle of an AWS IoT Thing
Amazon Web Services
 
Workshop AWS IoT @ SIDO
Workshop AWS IoT @ SIDOWorkshop AWS IoT @ SIDO
Workshop AWS IoT @ SIDO
Julien SIMON
 
Workshop AWS IoT @ IoT World Paris
Workshop AWS IoT @ IoT World ParisWorkshop AWS IoT @ IoT World Paris
Workshop AWS IoT @ IoT World Paris
Julien SIMON
 
IoT on azure
IoT on azureIoT on azure
IoT on azure
Joanna Lamch
 
AWS Innovate: Building an Internet Connected Camera with AWS IoT- Tim Cruse
AWS Innovate: Building an Internet Connected Camera with AWS IoT- Tim CruseAWS Innovate: Building an Internet Connected Camera with AWS IoT- Tim Cruse
AWS Innovate: Building an Internet Connected Camera with AWS IoT- Tim Cruse
Amazon Web Services Korea
 
Project humix overview - For Raspberry pi community meetup
Project humix overview - For  Raspberry pi  community meetupProject humix overview - For  Raspberry pi  community meetup
Project humix overview - For Raspberry pi community meetup
Jeffrey Liu
 
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.Open IoT Cloud Architecture, Web of Things, Shenzhen, China.
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.
Jollen Chen
 
Azure IoT Hub
Azure IoT HubAzure IoT Hub
Azure IoT Hub
Shahriar Hossain
 
Developing Connected Applications with AWS IoT - Technical 301
Developing Connected Applications with AWS IoT - Technical 301Developing Connected Applications with AWS IoT - Technical 301
Developing Connected Applications with AWS IoT - Technical 301
Amazon Web Services
 
IoT and Maker Crossover (IMCO) Conference 2015
IoT and Maker Crossover (IMCO) Conference 2015IoT and Maker Crossover (IMCO) Conference 2015
IoT and Maker Crossover (IMCO) Conference 2015
Jollen Chen
 
Putting microservices on a diet with istio
Putting microservices on a diet with istioPutting microservices on a diet with istio
Putting microservices on a diet with istio
QAware GmbH
 
Putting microservices on a diet with Istio
Putting microservices on a diet with IstioPutting microservices on a diet with Istio
Putting microservices on a diet with Istio
QAware GmbH
 
Html5
Html5Html5
Html5
senthil k
 
MQTT with Java - a protocol for IoT and M2M communication
MQTT with Java - a protocol for IoT and M2M communicationMQTT with Java - a protocol for IoT and M2M communication
MQTT with Java - a protocol for IoT and M2M communication
Christian Götz
 
AWS IoT 및 Mobile Hub 서비스 소개 (김일호) :: re:Invent re:Cap Webinar 2015
AWS IoT 및 Mobile Hub 서비스 소개 (김일호) :: re:Invent re:Cap Webinar 2015AWS IoT 및 Mobile Hub 서비스 소개 (김일호) :: re:Invent re:Cap Webinar 2015
AWS IoT 및 Mobile Hub 서비스 소개 (김일호) :: re:Invent re:Cap Webinar 2015
Amazon Web Services Korea
 
Essential Capabilities of an IoT Cloud Platform - AWS Online Tech Talks
Essential Capabilities of an IoT Cloud Platform - AWS Online Tech TalksEssential Capabilities of an IoT Cloud Platform - AWS Online Tech Talks
Essential Capabilities of an IoT Cloud Platform - AWS Online Tech Talks
Amazon Web Services
 
End to end IoT Solution using Mongoose OS.
End to end IoT Solution using Mongoose OS.End to end IoT Solution using Mongoose OS.
End to end IoT Solution using Mongoose OS.
Emertxe Information Technologies Pvt Ltd
 

Similar to How to build IoT solution using cloud infrastructure? (20)

Essential Capabilities of an IoT Cloud Platform - April 2017 AWS Online Tech ...
Essential Capabilities of an IoT Cloud Platform - April 2017 AWS Online Tech ...Essential Capabilities of an IoT Cloud Platform - April 2017 AWS Online Tech ...
Essential Capabilities of an IoT Cloud Platform - April 2017 AWS Online Tech ...
 
Essential Capabilities of an IoT Cloud Platform - AWS Online Tech Talks
Essential Capabilities of an IoT Cloud Platform - AWS Online Tech TalksEssential Capabilities of an IoT Cloud Platform - AWS Online Tech Talks
Essential Capabilities of an IoT Cloud Platform - AWS Online Tech Talks
 
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
 
The Lifecycle of an AWS IoT Thing
The Lifecycle of an AWS IoT ThingThe Lifecycle of an AWS IoT Thing
The Lifecycle of an AWS IoT Thing
 
Workshop AWS IoT @ SIDO
Workshop AWS IoT @ SIDOWorkshop AWS IoT @ SIDO
Workshop AWS IoT @ SIDO
 
Workshop AWS IoT @ IoT World Paris
Workshop AWS IoT @ IoT World ParisWorkshop AWS IoT @ IoT World Paris
Workshop AWS IoT @ IoT World Paris
 
IoT on azure
IoT on azureIoT on azure
IoT on azure
 
AWS Innovate: Building an Internet Connected Camera with AWS IoT- Tim Cruse
AWS Innovate: Building an Internet Connected Camera with AWS IoT- Tim CruseAWS Innovate: Building an Internet Connected Camera with AWS IoT- Tim Cruse
AWS Innovate: Building an Internet Connected Camera with AWS IoT- Tim Cruse
 
Project humix overview - For Raspberry pi community meetup
Project humix overview - For  Raspberry pi  community meetupProject humix overview - For  Raspberry pi  community meetup
Project humix overview - For Raspberry pi community meetup
 
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.Open IoT Cloud Architecture, Web of Things, Shenzhen, China.
Open IoT Cloud Architecture, Web of Things, Shenzhen, China.
 
Azure IoT Hub
Azure IoT HubAzure IoT Hub
Azure IoT Hub
 
Developing Connected Applications with AWS IoT - Technical 301
Developing Connected Applications with AWS IoT - Technical 301Developing Connected Applications with AWS IoT - Technical 301
Developing Connected Applications with AWS IoT - Technical 301
 
IoT and Maker Crossover (IMCO) Conference 2015
IoT and Maker Crossover (IMCO) Conference 2015IoT and Maker Crossover (IMCO) Conference 2015
IoT and Maker Crossover (IMCO) Conference 2015
 
Putting microservices on a diet with istio
Putting microservices on a diet with istioPutting microservices on a diet with istio
Putting microservices on a diet with istio
 
Putting microservices on a diet with Istio
Putting microservices on a diet with IstioPutting microservices on a diet with Istio
Putting microservices on a diet with Istio
 
Html5
Html5Html5
Html5
 
MQTT with Java - a protocol for IoT and M2M communication
MQTT with Java - a protocol for IoT and M2M communicationMQTT with Java - a protocol for IoT and M2M communication
MQTT with Java - a protocol for IoT and M2M communication
 
AWS IoT 및 Mobile Hub 서비스 소개 (김일호) :: re:Invent re:Cap Webinar 2015
AWS IoT 및 Mobile Hub 서비스 소개 (김일호) :: re:Invent re:Cap Webinar 2015AWS IoT 및 Mobile Hub 서비스 소개 (김일호) :: re:Invent re:Cap Webinar 2015
AWS IoT 및 Mobile Hub 서비스 소개 (김일호) :: re:Invent re:Cap Webinar 2015
 
Essential Capabilities of an IoT Cloud Platform - AWS Online Tech Talks
Essential Capabilities of an IoT Cloud Platform - AWS Online Tech TalksEssential Capabilities of an IoT Cloud Platform - AWS Online Tech Talks
Essential Capabilities of an IoT Cloud Platform - AWS Online Tech Talks
 
End to end IoT Solution using Mongoose OS.
End to end IoT Solution using Mongoose OS.End to end IoT Solution using Mongoose OS.
End to end IoT Solution using Mongoose OS.
 

Recently uploaded

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 

Recently uploaded (20)

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 

How to build IoT solution using cloud infrastructure?

Editor's Notes

  1. Sensors Accelerometers/Gyroscopes Temp/Humidity/Pressure Level/Range Other (ie. radiation, IR) Sensor channel Wired - I2C, SPI, CAN, Ethernet Wireless - Bluetooth, WiFi, 3G/4G MCU (ARM Cortex-M, AVR) IoT Hubs/Transceivers Mainstream - Raspberry Pi (1, 2 and 3), Arduino Industry ready - TI CC3200, BeagleBone Black (IT AM3358) Custom hardware depending on client requirements IoT Hub channel Ethernet 3G/4G LoRa
  2. R1 - Accountability and Data OwnershipA traditional data center of an organization is under complete control of that organization. The organization logically and physically protects the data it owns. An organization that chooses to use a public cloud for hosting its business service loses control of its data. This poses critical security risks that the organization needs to carefully consider and mitigate. (Pankaj, Vinay) One must ensure about the guarantee of recovering Data: Once the data entrusted to a third operator, what are the guarantees that you will recover your information? What about the backups performed by the operator of Cloud? (Ludovic)R2 - User Identity FederationIt is very important for the enterprises to keep control over user identities as they move services and applications to the different cloud providers. Rather than letting cloud providers create multiple islands of identities that become too complex to manage down the line. Users should be uniquely identifiable with a federated authentication (e.g. SAML) that works across the cloud providers. User experience is enhanced when he/she does not manage multiple userids and credentials. This allows easier back-end data integrations between cloud provides. (Vinay, Pankaj)R3 - Regulatory Compliance- Complex to Demonstrate regulatory compliance. Data that is perceived to be secure in one country may not be perceived secure in another due to different regulatory laws across countries or regions. For eg., European Union has very strict privacy laws and hence data stored in US may not comply with those EU laws. (Shankar, Ove)R4 - Business Continuity and ResiliencyBusiness Continuity is an activity an IT organization performs to ensure that the business can be conducted in a disaster situation. In case of an organization that uses cloud, the responsibility of business continuity gets delegated to the cloud provider. This creates a risk to the organization of not having appropriate business continuity. (Pankaj, Shankar). About Service Continuity and QoS, one have to ensure about the contractual solutions proposed by the Operator of Cloud, and the Service Level Agreement as well. (Ludovic)R5 - User Privacy and Secondary Usage of DataUser's personal data gets stored in the cloud as users start using social web sites. Most of the social sites are vague about how they will handle users personal data. Additionally most of the social sites go with the default share all (least restrictive) setup for the user. E.g. via LinkedIn, Twitter, Facebook it is very easy to deduct personal details of the users (Vinay) - Need to ensure with your cloud providers what data can or cannot be used by them for secondary purposes. It includes data that can be mined directly from user data by providers or indirectly based on user behavior (clicks, incoming outgoing URLs etc.). Many social application providers mine user data for secondary usage e.g. directed advertising. No wonder when many of us use their personal gmail/hotmail or yahoo account to tell a friend your vacation plans and immediately you start seeing advertisements on hotels/flights near your destination. (Vinay, Ove)R6 - Service and Data IntegrationOrganizations must be sure that their proprietary data is adequately protected as it is transferred between the end user and the cloud data center. While interception of data in transit should be of concern to every organization, the risk is much greater for organizations utilizing a cloud computing model, where data is transmitted over the Internet. Unsecured data is susceptible to interception and compromise during transmission. (Shankar, Ove)R7 - Multi Tenancy and Physical SecurityMulti-tenancy in cloud means sharing of resources and services among multiple clients(CPU, networking, storage/databases, application stack). It increases dependence on logical segregation and other controls to ensure that one tenant deliberately or inadvertently can not interfere with the security ( confidentiality, integrity, availability) of the other tenants. (Vinay, Pankaj)R8 - Incidence Analysis and Forensic SupportIn the event of a security incident, applications and services hosted at a cloud provider are difficult to investigate as logging may be distributed across multiple hosts and data centers which could be located in various countries and hence governed by different laws. Also, along with log files, data belonging to multiple customers may be co-located on the same hardware and storage devices and hence a concern for law enforcing agencies for forensic recovery. (Shankar, Ove)R9 - Infrastructure SecurityAll infrastructure must be hardened and configured securely, and the hardening/configuration baselines should be based on Industry Best Practices. Applications, systems and networks must be architected and configured with tiering and security zones, and access must be configured to only allow required network and application protocols. Administrative access must be role-based, and granted on a need-to-know basis. Regular risk assessments must be done, preferably by an independent party. A policy and process must be in place for patching/security updates, and can based on risk/threat assessments of new security issues. (Ove, Shankar)Although the fine details of the items above must be regarded as highly sensitive information, it is reasonable to expect a customer to want to see at least the high-level details. The Provider must be willing to provide this. R10 - Non Production Environment ExposureAn IT organization that develops software applications internally employs a set of non-production environments for design, development, and test activities. The non-production environments are generally not secured to the same extent as the production environment. If an organization uses a cloud provider for such non-production environment, then there is a high risk of unauthorized access, information modification, and information theft. (Pankaj, Ove)
  3. Główne ulepszenia i zalety HTTP/2 Jedno połączenie. Do załadowania strony internetowej używane jest tylko jedno połączenie z serwerem, które jest aktywne tak długo jak długo jest otwarta strona internetowa. To zmniejsza liczbę żądań potrzebnych do utworzenia wielu połączeń TCP. Multipleksowanie (multiplexing). Wielokrotne zapytania mogą być obsługiwane w tym samym czasie i zakresie. W wersji HTTP/1.1, przesył danych jest kolejkowany. Oznacza to, że przeciążona strona strona w HTTP/2 ładuje się normalnie. Push z serwera. Dodatkowe informacje mogą być wysyłane do klienta z poziomu serwera. Priorytetyzacja. Zapytania są priorytetyzowane i szybciej obsługiwane przez serwer. Nadawana jest kolejność w jakiej pobierane są z serwera różne zasoby, na przykład arkusze stylów CSS, kod Java Script lub obrazy. Dzięki temu najważniejsze elementy związane z wyświetleniem się strony są wysyłane wcześniej, aby zmniejszyć opóźnienia i sprawić, że użytkownik komfortowo wyświetla tresci. Binarność. Sprawia, że HTTP/2 jest łatwiej analizowany przez serwer – jest bardziej zwarty i mniej podatne na błędy. Nie jest potrzebny dodatkowy czas na tłumaczenie informacji z tekstu do pliku binarnego, który jest językiem ojczystym komputera. Kompresja nagłówków. HTTP/2 wykorzystuje kompresję HPACK, dzięki czemu zmniejsza obciążenie i ilość danych przesyłanych przez sieć. Według serwisu Can I use, protokół HTTP/2 obsługiwany jest przez 75,63% przeglądarek używanych przez użytkowników w Polsce i 67,89% na całym świecie.
  4. Na tym slajdzie sie zamieniamy : Ty mowisz o desired