SlideShare a Scribd company logo
Internet of Things:
Enabling Tech,
Opportunities &
Challenges
Technical Perspective:
IoT - not so easy to define
Simply put:
All devices that can be connected will be connected.
IEEE, an early definition:
A network of items - each embedded with sensors - which are connected to the
Internet.
▪ Not quite there - this description addresses just the physical aspect of IoT.
IoT = Identification + Sensing + Communication + Computation + Services + Semantics
Can we standardize it?
IEEE P2413
Draft Standard for an Architectural Framework for the Internet ofThings (IoT)
Market and Shareholders
Applications
Networking and Data
Communications
Sensing
Architectural Framework
IoT
Architecture
framework
Media Healthcare
Home &
Building
EnergyManufacturing
Logistics
Retail
Mobility/
Transportation
Consumer Equipment Providers
Consumers
ICT Infrastructure Providers
Regulators
LogisticsCompanies
PublicTransport Companies
CityAuthorities
Manufacturing Industries
Hospitals
Doctors
Insurance Companies
Appliance
Providers
Facility
Management
Retail Stores
Application
Developers
Utilities
Automation Equipment Providers
Why:
To accelerate the growth of the IoT Market by enabling cross- domain interaction
and platform unification through increased system compatibility, interoperability
and functional exchangeability
Working on IoT Standards
Today, one of the prime frontiers of innovation for the IoT is standards.
▪ ETSI - EuropeanTelecommunications Standards Institute
▪ ITU - InternationalTelecommunication Union
▪ IEEE - Institute of Electrical and Electronics Engineers
▪ IETF - Internet EngineeringTask Force
▪ NIST - National Institute of Standards andTechnology
▪ OASIS - Organization forAdvancement of Structured Information Standards
▪ W3C -WorldWide Web Consortium
ITU
International Telecommunication Union
A Network that is
Available anywhere, anytime, by anything and anyone.
Technologies for:
• Tagging things
• Feeling things
• Making things think
• Shrinking things
IETF
Internet Engineering Task Force
IETF’s definition of “things”:
In the vision of IoT, ‘things’ are very various such as
computers, sensors, people, actuators, refrigerators,
TVs, vehicles, mobile phones, clothes, food, medicines,
books, etc.These things are classified as three scopes:
people, machine (for example, sensor, actuator,
etc.) and information (for example, clothes, food,
medicine, books, etc.).
IoT – It’s about us.
It’s not really about things.
It is about “connected person.”
At the center:
the human being,
making use of the
applications and services
that are enabled by the
devices - the things - and
their unprecedented
integration
provided in the IoT.
“Everyone asks me if everyone is going to be like
me in the future. It is important to remember
that everyone is like me NOW.”
Chris Dancy, the “World's Most Connected Man”
The Rise of Softwareization
Drivers:
▪ Commoditization of Hardware
▪ Commoditization of Communications
▪ Open Source
▪ Virtualization
▪ Autonomics and Self-Organization
▪ Availability ofAPI-s
▪ Large amounts of data
Manifestations:
▪ SDN, NFV in the Cloud
▪ Anything as a Service
▪ Pervasive Sensing and Actuating
▪ Augmented Reality
▪ Micro-manufacturing (3D)
▪ Real-Time DataAnalysis
▪ Algorithms
▪ Electronic Money
▪ Machine Learning
Enabling Technologies - Core Tech
CoreTech
▪ Device and Nanotech
▪ Cloud Computing
▪ Networking and Interconnectivity
▪ Programmability
Enabling Technologies, Core Tech:
Device and Nanotech
▪ Open-Source Hardware Platforms
– Arduino, Raspberry Pi, BeagleBone
▪ Open IP
▪ Universal Memory
▪ Sensors andActuators are getting smaller and more complex
– specialized Operating Systems
– on-device APIs
– 3D integrated circuits
▪ Micro-Electro-Mechanical Systems and Micromachines
– evolving into the nanotechnology field
Enabling Technologies, Core Tech:
Cloud Computing
▪ Virtualization
▪ Automatization of resources
▪ Forms:
– Infrastructure as a Service
– Platform as a Service
– Software as a Service
▪ Containers
▪ IEEE and IEEE Computer Society working on standards
– P2301 Cloud Portability
– P2302 Cloud-to-Cloud Interoperability
The real promise of cloud
computing is the way that it
changes the game for software
development.
Enabling Technologies, Core Tech:
Networking and Connectivity
▪ EPC - Electronic Product Code
▪ IP v5, IP v6
▪ RFID, NFC
▪ Bluetooth, Bluetooth LE
(smart)
▪ Zigbee
▪ Wi-Fi
▪ 4G
▪ SDN – Software Defined
Networks
▪ NFV – Network Function
Virtualization
▪ 5G
Building Blocks and Technologies
WIFI/WIMAX Protocols
Bluetooth protocol
TCP/IP
SSH
HTTP/S
HTCPC
Enabling Tech:
Programmability
a programmable device is one that can take on a variety of
behaviors at a user’s command without requiring physical changes
Delay watering your garden
If it’s going to rain tomorrow
Receive an emergency call
If smoke is detected
Web ofThings
incorporate everyday physical objects into theWorldWide Web
by giving them an Application Programming Interface (API)
PhysicalWeb: EddyStone,Web Sockets
Enabling Technologies – Social Tech
▪ Big Data and Analytics
▪ Augmented Reality
▪ Crowdsourcing
▪ Algorithms
▪ Machine Learning
▪ Artificial Intelligence
Enabling Technologies, Social Tech:
Big Data
▪ 7 years ago: number of “things” > number of people
▪ 2016: 25 billion connected devices
▪ 2020: 50 billion connected devices
▪ 2020: 90% of consumer cars with Internet connection
▪ 2016: 3.5 billion sensors already in the marketplace
By 2020, globally (1):
monthly mobile data traffic will exceed
30.6 exabytes
1 exabyte (10^18) = 1 million terabytes
(50,000 years of DVD-quality video)
(1) Cisco
Challenges:
Privacy & Security
▪ Big Brother Watching syndrome
▪ Who owns the data?
▪ Willingness to provide private
information in exchange for a
perceived value: is there a line
that should not, or cannot be
crossed?
▪ US: laws based on vendor –
consumer relationship
▪ Europe: laws based on the
citizen’s rights
Enabling Technologies, Social Tech:
Augmented Reality
information that augments the real-life view
Already in use for a long time now.
Example:
▪ a yellow line that appears on the screen
during a football game
But also:
▪ connected virtual things that mimic or
augment things in real life
Enabling Technologies, Social Tech:
Crowdsourcing
Modern business term, coined in 2006:
the practice of obtaining needed services, ideas, or content by
soliciting contributions from a large group of people and especially
from the online community rather than from traditional
employees or suppliers
online community of connected people using Internet ofThings
Opportunities, Crowdsourcing:
Air Quality
airqualityegg.com
Opportunities, Crowdsourcing:
Social Sensors
biwired.nl
Opportunities:
Data Analysis and Algorithms
1. Collected data allows better insights
2. Data Analysis; human interpretation; manual intervention
3. Pattern and Symptom Recognition
4. Predictions of the system behavior
5. Algorithms; automatic intervention, both corrective and
preventive
Enabling Technologies, Social Tech:
Algorithms
a set of steps that are followed in order to solve a mathematical
problem or to complete a computer process
This is the ‘smart’ part.
Examples:
▪ Driving Route Optimization
▪ Smart Grid
▪ High-Speed StockTrading
Crowdsourcing and Algorithms:
Cooperative Route Planning
waze.com
Opportunities:
Data Analysis and Machine Learning
1. Collected data allows better insights
2. Data Analysis; human interpretation; manual intervention
3. Pattern and Symptom Recognition
4. Predictions of the system behavior
5. Algorithms; automatic intervention, both corrective and preventive
6. Machine Learning, automatic algorithm improvements
Enabling Technologies, Social Tech:
Machine Learning
the ability of a computing system to learn from data
and modify pre-defined algorithms
Examples:
▪ Search Engine Results Ranking
▪ Online Shopping Product Recommendations
▪ Web and In-App Advertising
▪ Google Mail “Smart Reply”
Challenges:
Implications of ‘everything connected’
▪ 2014: remote manipulation of
medical devices, including drug
infusion pumps
– “Healthcare is 10 years behind
other industries in addressing
security” – Scott Erven DefCon
conference,April 2014
▪ 2015: remote car hacking
▪ Despite softwareization,
software cannot secure
hardware:
– Supply chain must be secured
P2413 Quadruple Trust
QuadrupleTrust includes:
▪ Protection
▪ Security
▪ Privacy
▪ Safety
Key principle: “security in depth”
The principle of defense-in-depth
is that layered security
mechanisms increase security of
the system as a whole.
OpenWeb Application Security Project
(OWASP)
Challenges
Technological Challenges
▪ Availability
▪ Reliability
▪ Mobility
▪ Performance
▪ Management
▪ Scalability
▪ Interoperability
▪ Energy
Societal Challenges
▪ Privacy
▪ Ownership
▪ Security
▪ Easiness of Use
▪ Social Cooperation
▪ Trust
▪ Corporate Responsibility
Enabling Technologies, Social Tech:
Artificial Intelligence
Deep LearningTechnique
artificial neural networks mimicking behavior of human brain
• Increased interoperability with external systems
• Capability to communicate in human social networks
• Awareness of the environment
• Interactivity with the surrounding environment
• Pseudo-social behavior with neighbors
• Capability of building their own social network
• Proficiency in building added-value complex services
through collaboration in the social network of things
res sapiens
res agens
res socialis
Opportunities
▪ Logistics
▪ Intelligent Shopping
▪ Product Management
▪ Risk Assessment
▪ Metering
▪ HomeAutomation
▪ Renewable Energy
▪ Grid
▪ Events
▪ Structures Monitoring
▪ Buildings
▪ PublicTransport
▪ Traffic Management
▪ Smart Cities
Opportunities:
Smart Cities
Smart Cities
• Smart Street
Lighting
• Smart UrbanWaste
• Urban Planning
based on
environmental and
crowdsourced data
• SmartSantander
IoT: technology and society mesh
Social Impacts
Business Models
and Ecosystems
Services and
Applications
Software
Architecture
EnablingCoreTech and
System Architecture
Enabling Social
Tech
Security and
Privacy
Management Impact and Acceptance of Users
Change in the societal organization
Democratization and control of infrastructure
New Business Models
New Value Chains
Creation of New Ecosystems
Application Domains
Trials
Specific Services
(Smart Cities, Social IoT, …)
Applications
Operating Systems
Middleware
Cloud Solutions
APIs and Interfaces
Data Management
Sensors
Actuators
Gateways
Microsystems
Protocols
Energy
Management
Networks
O-Touch Management
Autonomics and
Self-organization
New processes and
organizations
Personal Data
Management
Privacy and Security
Framework for IoT
Augmented Reality
Big Data and Analytics
Crowdsourcing
Algorithms
Machine Learning
Artificial Intelligence
What should a CIO watch for?
▪ Big Data: the volume of data generated by the IoT will require IT managers
to rethink how they collect, manage, and store data on multiple fronts.
– Minimize the data you collect and retain
▪ Security: consider implications of having everything connected
– Institutionalize Security by Design
– Conduct a privacy or security risk assessment
– Test security measures before launching products
– Train all employees about good security and ensure security is addressed at the
appropriate organizational level
▪ When risk is identified, implement a defense-in-depth approach
▪ Monitor products through the life-cycle, and patch known vulnerabilities
CIO - What next?
▪ Do think about a problem and a solution; don’t jump to technology to
solve it without thinking about alternative ways to solve it. IoT may
be a solution – or not.
▪ Think freely, out-of-the-box. Imagine something; then find the right
people to execute.Things are moving fast, it does not take a lot of
resources anymore to start.
▪ Get out there, dive in, get your hands dirty.
References and Trademarks
▪ IEEE (standards, reports)
▪ Chris Dancy (quote, page #6)
▪ Cisco (IoT predictions, page #16)
▪ From “Smart Objects” to “Social Objects”:The Next Evolutionary
Step of the Internet ofThings; Luigi Atzori, University of Cagliari;
Antonio Iera, University of Reggio Calabria; Giacomo Morabito,
University of Catania (evolution to “res socialis”, page #28)
▪ SmartSantander Project, www.smartsantander.eu (page #30)
References and Trademarks, continued
▪ IEEE
▪ Arduino LLC
▪ BeagleBoard.org Foundation
▪ Raspberry Pi Foundation
▪ Bluetooth SIG, Inc.
▪ ZigBee Alliance
▪ IFTTT, Inc.
▪ Google Inc.
▪ airqualityegg.com (Joseph
Saavedra)
▪ bwired.nl
▪ Waze Mobile Ltd.
▪ Aerotainment Labs GmbH
It’s a thing: the Aerotain Skye
CeBIT 2016:
Your Friendly Floating Camera Drone
ThankYou for Listening.
• Technology Strategy
• Cloud Services
• Project Management
• IT Security
• Internet ofThings
Davor Dokonal
Chair,
IEEE Computer Society
Long Island
davor@ieee.org

More Related Content

What's hot

Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
MdShahinAlam25
 
The Internet of Everything
The Internet of EverythingThe Internet of Everything
The Internet of Everything
Ahmed Banafa
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to Face
Altoros
 
4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things
W. David Stephenson
 
Networking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersNetworking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile Workers
Eric Wong
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
BlackBerry
 
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
BRNSS Publication Hub
 
How the Internet of Things Leads to Better, Faster Crisis Communication
 How the Internet of Things Leads to Better, Faster Crisis Communication How the Internet of Things Leads to Better, Faster Crisis Communication
How the Internet of Things Leads to Better, Faster Crisis Communication
BlackBerry
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
Ahmed Banafa
 
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Chuck Brooks
 
Enterprise IT and the Internet of Things
Enterprise IT and the Internet of ThingsEnterprise IT and the Internet of Things
Enterprise IT and the Internet of Things
Joint Venture Silicon Valley
 
Sgcp14phillips
Sgcp14phillipsSgcp14phillips
Sgcp14phillips
Justin Hayward
 
Trust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT DevicesTrust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT Devices
ijtsrd
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
Jim Romeo
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
BHAVANA KONERU
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Nicole Black
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Adam Thierer
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Sudha Jamthe
 
How blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingHow blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfunding
Ahmed Banafa
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
BlackBerry
 

What's hot (20)

Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
 
The Internet of Everything
The Internet of EverythingThe Internet of Everything
The Internet of Everything
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to Face
 
4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things
 
Networking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersNetworking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile Workers
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...Hardware/Software Interoperability and Single Point Vulnerability Problems of...
Hardware/Software Interoperability and Single Point Vulnerability Problems of...
 
How the Internet of Things Leads to Better, Faster Crisis Communication
 How the Internet of Things Leads to Better, Faster Crisis Communication How the Internet of Things Leads to Better, Faster Crisis Communication
How the Internet of Things Leads to Better, Faster Crisis Communication
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
 
Enterprise IT and the Internet of Things
Enterprise IT and the Internet of ThingsEnterprise IT and the Internet of Things
Enterprise IT and the Internet of Things
 
Sgcp14phillips
Sgcp14phillipsSgcp14phillips
Sgcp14phillips
 
Trust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT DevicesTrust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT Devices
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
 
How blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingHow blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfunding
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 

Similar to Internet of things enabling tech - challenges - opportunities (2016)

Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015
Nikhil Dikshit
 
Tech trends
Tech trendsTech trends
Tech trends
Raoul Gomes
 
Rich Radka, Internet of Things at WSA-mobile Global Congress 2015
Rich Radka, Internet of Things at WSA-mobile Global Congress 2015Rich Radka, Internet of Things at WSA-mobile Global Congress 2015
Rich Radka, Internet of Things at WSA-mobile Global Congress 2015
wsa-mobile
 
IoT Classroom Trainings
IoT Classroom TrainingsIoT Classroom Trainings
IoT Classroom Trainings
COEPD HR
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks
 
Fog computing and data concurrency
Fog computing and data concurrencyFog computing and data concurrency
Fog computing and data concurrency
Priyanka Goswami
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial Revolution
Abaram Network Solutions
 
IOT_PPT1.pdf
IOT_PPT1.pdfIOT_PPT1.pdf
IOT_PPT1.pdf
laxmikanth45
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
Adrian Wright
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and Trends
Dennis Jacob
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
nadoje
 
IOT
IOTIOT
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
Vanya Vladeva
 
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxThe-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
HadHic
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)
Saurabh Yadav
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
Shamima Akther
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
Chuck Brooks
 
Io t white-paper-final-fr-1
Io t white-paper-final-fr-1Io t white-paper-final-fr-1
Io t white-paper-final-fr-1
Martina Uhrinová
 
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Lounge47
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptx
ugushe
 

Similar to Internet of things enabling tech - challenges - opportunities (2016) (20)

Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015
 
Tech trends
Tech trendsTech trends
Tech trends
 
Rich Radka, Internet of Things at WSA-mobile Global Congress 2015
Rich Radka, Internet of Things at WSA-mobile Global Congress 2015Rich Radka, Internet of Things at WSA-mobile Global Congress 2015
Rich Radka, Internet of Things at WSA-mobile Global Congress 2015
 
IoT Classroom Trainings
IoT Classroom TrainingsIoT Classroom Trainings
IoT Classroom Trainings
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
Fog computing and data concurrency
Fog computing and data concurrencyFog computing and data concurrency
Fog computing and data concurrency
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial Revolution
 
IOT_PPT1.pdf
IOT_PPT1.pdfIOT_PPT1.pdf
IOT_PPT1.pdf
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and Trends
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
IOT
IOTIOT
IOT
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
 
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxThe-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
Io t white-paper-final-fr-1
Io t white-paper-final-fr-1Io t white-paper-final-fr-1
Io t white-paper-final-fr-1
 
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptx
 

Recently uploaded

“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 

Recently uploaded (20)

“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 

Internet of things enabling tech - challenges - opportunities (2016)

  • 1. Internet of Things: Enabling Tech, Opportunities & Challenges
  • 2. Technical Perspective: IoT - not so easy to define Simply put: All devices that can be connected will be connected. IEEE, an early definition: A network of items - each embedded with sensors - which are connected to the Internet. ▪ Not quite there - this description addresses just the physical aspect of IoT. IoT = Identification + Sensing + Communication + Computation + Services + Semantics
  • 4. IEEE P2413 Draft Standard for an Architectural Framework for the Internet ofThings (IoT) Market and Shareholders Applications Networking and Data Communications Sensing Architectural Framework IoT Architecture framework Media Healthcare Home & Building EnergyManufacturing Logistics Retail Mobility/ Transportation Consumer Equipment Providers Consumers ICT Infrastructure Providers Regulators LogisticsCompanies PublicTransport Companies CityAuthorities Manufacturing Industries Hospitals Doctors Insurance Companies Appliance Providers Facility Management Retail Stores Application Developers Utilities Automation Equipment Providers Why: To accelerate the growth of the IoT Market by enabling cross- domain interaction and platform unification through increased system compatibility, interoperability and functional exchangeability
  • 5. Working on IoT Standards Today, one of the prime frontiers of innovation for the IoT is standards. ▪ ETSI - EuropeanTelecommunications Standards Institute ▪ ITU - InternationalTelecommunication Union ▪ IEEE - Institute of Electrical and Electronics Engineers ▪ IETF - Internet EngineeringTask Force ▪ NIST - National Institute of Standards andTechnology ▪ OASIS - Organization forAdvancement of Structured Information Standards ▪ W3C -WorldWide Web Consortium
  • 6. ITU International Telecommunication Union A Network that is Available anywhere, anytime, by anything and anyone. Technologies for: • Tagging things • Feeling things • Making things think • Shrinking things
  • 7. IETF Internet Engineering Task Force IETF’s definition of “things”: In the vision of IoT, ‘things’ are very various such as computers, sensors, people, actuators, refrigerators, TVs, vehicles, mobile phones, clothes, food, medicines, books, etc.These things are classified as three scopes: people, machine (for example, sensor, actuator, etc.) and information (for example, clothes, food, medicine, books, etc.).
  • 8. IoT – It’s about us. It’s not really about things. It is about “connected person.” At the center: the human being, making use of the applications and services that are enabled by the devices - the things - and their unprecedented integration provided in the IoT. “Everyone asks me if everyone is going to be like me in the future. It is important to remember that everyone is like me NOW.” Chris Dancy, the “World's Most Connected Man”
  • 9. The Rise of Softwareization Drivers: ▪ Commoditization of Hardware ▪ Commoditization of Communications ▪ Open Source ▪ Virtualization ▪ Autonomics and Self-Organization ▪ Availability ofAPI-s ▪ Large amounts of data Manifestations: ▪ SDN, NFV in the Cloud ▪ Anything as a Service ▪ Pervasive Sensing and Actuating ▪ Augmented Reality ▪ Micro-manufacturing (3D) ▪ Real-Time DataAnalysis ▪ Algorithms ▪ Electronic Money ▪ Machine Learning
  • 10. Enabling Technologies - Core Tech CoreTech ▪ Device and Nanotech ▪ Cloud Computing ▪ Networking and Interconnectivity ▪ Programmability
  • 11. Enabling Technologies, Core Tech: Device and Nanotech ▪ Open-Source Hardware Platforms – Arduino, Raspberry Pi, BeagleBone ▪ Open IP ▪ Universal Memory ▪ Sensors andActuators are getting smaller and more complex – specialized Operating Systems – on-device APIs – 3D integrated circuits ▪ Micro-Electro-Mechanical Systems and Micromachines – evolving into the nanotechnology field
  • 12. Enabling Technologies, Core Tech: Cloud Computing ▪ Virtualization ▪ Automatization of resources ▪ Forms: – Infrastructure as a Service – Platform as a Service – Software as a Service ▪ Containers ▪ IEEE and IEEE Computer Society working on standards – P2301 Cloud Portability – P2302 Cloud-to-Cloud Interoperability The real promise of cloud computing is the way that it changes the game for software development.
  • 13. Enabling Technologies, Core Tech: Networking and Connectivity ▪ EPC - Electronic Product Code ▪ IP v5, IP v6 ▪ RFID, NFC ▪ Bluetooth, Bluetooth LE (smart) ▪ Zigbee ▪ Wi-Fi ▪ 4G ▪ SDN – Software Defined Networks ▪ NFV – Network Function Virtualization ▪ 5G
  • 14. Building Blocks and Technologies WIFI/WIMAX Protocols Bluetooth protocol TCP/IP SSH HTTP/S HTCPC
  • 15. Enabling Tech: Programmability a programmable device is one that can take on a variety of behaviors at a user’s command without requiring physical changes Delay watering your garden If it’s going to rain tomorrow Receive an emergency call If smoke is detected Web ofThings incorporate everyday physical objects into theWorldWide Web by giving them an Application Programming Interface (API) PhysicalWeb: EddyStone,Web Sockets
  • 16. Enabling Technologies – Social Tech ▪ Big Data and Analytics ▪ Augmented Reality ▪ Crowdsourcing ▪ Algorithms ▪ Machine Learning ▪ Artificial Intelligence
  • 17. Enabling Technologies, Social Tech: Big Data ▪ 7 years ago: number of “things” > number of people ▪ 2016: 25 billion connected devices ▪ 2020: 50 billion connected devices ▪ 2020: 90% of consumer cars with Internet connection ▪ 2016: 3.5 billion sensors already in the marketplace By 2020, globally (1): monthly mobile data traffic will exceed 30.6 exabytes 1 exabyte (10^18) = 1 million terabytes (50,000 years of DVD-quality video) (1) Cisco
  • 18. Challenges: Privacy & Security ▪ Big Brother Watching syndrome ▪ Who owns the data? ▪ Willingness to provide private information in exchange for a perceived value: is there a line that should not, or cannot be crossed? ▪ US: laws based on vendor – consumer relationship ▪ Europe: laws based on the citizen’s rights
  • 19. Enabling Technologies, Social Tech: Augmented Reality information that augments the real-life view Already in use for a long time now. Example: ▪ a yellow line that appears on the screen during a football game But also: ▪ connected virtual things that mimic or augment things in real life
  • 20. Enabling Technologies, Social Tech: Crowdsourcing Modern business term, coined in 2006: the practice of obtaining needed services, ideas, or content by soliciting contributions from a large group of people and especially from the online community rather than from traditional employees or suppliers online community of connected people using Internet ofThings
  • 23. Opportunities: Data Analysis and Algorithms 1. Collected data allows better insights 2. Data Analysis; human interpretation; manual intervention 3. Pattern and Symptom Recognition 4. Predictions of the system behavior 5. Algorithms; automatic intervention, both corrective and preventive
  • 24. Enabling Technologies, Social Tech: Algorithms a set of steps that are followed in order to solve a mathematical problem or to complete a computer process This is the ‘smart’ part. Examples: ▪ Driving Route Optimization ▪ Smart Grid ▪ High-Speed StockTrading
  • 25. Crowdsourcing and Algorithms: Cooperative Route Planning waze.com
  • 26. Opportunities: Data Analysis and Machine Learning 1. Collected data allows better insights 2. Data Analysis; human interpretation; manual intervention 3. Pattern and Symptom Recognition 4. Predictions of the system behavior 5. Algorithms; automatic intervention, both corrective and preventive 6. Machine Learning, automatic algorithm improvements
  • 27. Enabling Technologies, Social Tech: Machine Learning the ability of a computing system to learn from data and modify pre-defined algorithms Examples: ▪ Search Engine Results Ranking ▪ Online Shopping Product Recommendations ▪ Web and In-App Advertising ▪ Google Mail “Smart Reply”
  • 28. Challenges: Implications of ‘everything connected’ ▪ 2014: remote manipulation of medical devices, including drug infusion pumps – “Healthcare is 10 years behind other industries in addressing security” – Scott Erven DefCon conference,April 2014 ▪ 2015: remote car hacking ▪ Despite softwareization, software cannot secure hardware: – Supply chain must be secured
  • 29. P2413 Quadruple Trust QuadrupleTrust includes: ▪ Protection ▪ Security ▪ Privacy ▪ Safety Key principle: “security in depth” The principle of defense-in-depth is that layered security mechanisms increase security of the system as a whole. OpenWeb Application Security Project (OWASP)
  • 30. Challenges Technological Challenges ▪ Availability ▪ Reliability ▪ Mobility ▪ Performance ▪ Management ▪ Scalability ▪ Interoperability ▪ Energy Societal Challenges ▪ Privacy ▪ Ownership ▪ Security ▪ Easiness of Use ▪ Social Cooperation ▪ Trust ▪ Corporate Responsibility
  • 31. Enabling Technologies, Social Tech: Artificial Intelligence Deep LearningTechnique artificial neural networks mimicking behavior of human brain • Increased interoperability with external systems • Capability to communicate in human social networks • Awareness of the environment • Interactivity with the surrounding environment • Pseudo-social behavior with neighbors • Capability of building their own social network • Proficiency in building added-value complex services through collaboration in the social network of things res sapiens res agens res socialis
  • 32. Opportunities ▪ Logistics ▪ Intelligent Shopping ▪ Product Management ▪ Risk Assessment ▪ Metering ▪ HomeAutomation ▪ Renewable Energy ▪ Grid ▪ Events ▪ Structures Monitoring ▪ Buildings ▪ PublicTransport ▪ Traffic Management ▪ Smart Cities
  • 33. Opportunities: Smart Cities Smart Cities • Smart Street Lighting • Smart UrbanWaste • Urban Planning based on environmental and crowdsourced data • SmartSantander
  • 34. IoT: technology and society mesh Social Impacts Business Models and Ecosystems Services and Applications Software Architecture EnablingCoreTech and System Architecture Enabling Social Tech Security and Privacy Management Impact and Acceptance of Users Change in the societal organization Democratization and control of infrastructure New Business Models New Value Chains Creation of New Ecosystems Application Domains Trials Specific Services (Smart Cities, Social IoT, …) Applications Operating Systems Middleware Cloud Solutions APIs and Interfaces Data Management Sensors Actuators Gateways Microsystems Protocols Energy Management Networks O-Touch Management Autonomics and Self-organization New processes and organizations Personal Data Management Privacy and Security Framework for IoT Augmented Reality Big Data and Analytics Crowdsourcing Algorithms Machine Learning Artificial Intelligence
  • 35. What should a CIO watch for? ▪ Big Data: the volume of data generated by the IoT will require IT managers to rethink how they collect, manage, and store data on multiple fronts. – Minimize the data you collect and retain ▪ Security: consider implications of having everything connected – Institutionalize Security by Design – Conduct a privacy or security risk assessment – Test security measures before launching products – Train all employees about good security and ensure security is addressed at the appropriate organizational level ▪ When risk is identified, implement a defense-in-depth approach ▪ Monitor products through the life-cycle, and patch known vulnerabilities
  • 36. CIO - What next? ▪ Do think about a problem and a solution; don’t jump to technology to solve it without thinking about alternative ways to solve it. IoT may be a solution – or not. ▪ Think freely, out-of-the-box. Imagine something; then find the right people to execute.Things are moving fast, it does not take a lot of resources anymore to start. ▪ Get out there, dive in, get your hands dirty.
  • 37. References and Trademarks ▪ IEEE (standards, reports) ▪ Chris Dancy (quote, page #6) ▪ Cisco (IoT predictions, page #16) ▪ From “Smart Objects” to “Social Objects”:The Next Evolutionary Step of the Internet ofThings; Luigi Atzori, University of Cagliari; Antonio Iera, University of Reggio Calabria; Giacomo Morabito, University of Catania (evolution to “res socialis”, page #28) ▪ SmartSantander Project, www.smartsantander.eu (page #30)
  • 38. References and Trademarks, continued ▪ IEEE ▪ Arduino LLC ▪ BeagleBoard.org Foundation ▪ Raspberry Pi Foundation ▪ Bluetooth SIG, Inc. ▪ ZigBee Alliance ▪ IFTTT, Inc. ▪ Google Inc. ▪ airqualityegg.com (Joseph Saavedra) ▪ bwired.nl ▪ Waze Mobile Ltd. ▪ Aerotainment Labs GmbH
  • 39. It’s a thing: the Aerotain Skye CeBIT 2016: Your Friendly Floating Camera Drone ThankYou for Listening.
  • 40. • Technology Strategy • Cloud Services • Project Management • IT Security • Internet ofThings Davor Dokonal Chair, IEEE Computer Society Long Island davor@ieee.org