The document discusses definitions of the Internet of Things (IoT). It provides several definitions from various organizations that describe the IoT as connecting physical objects through standard internet protocols and allowing them to generate, exchange and consume data. The document also discusses the evolution of the IoT through different waves, starting with connecting PCs, then people through mobile/cloud, and the current wave of connecting everything through ubiquitous embedded systems like sensors. Finally, the document outlines some of the key enabling technologies and standards that help make the IoT possible, such as 6LoWPAN, CoAP and IEEE protocols.
The Web of Things: Enabling the Physical World to the WebAndreas Kamilaris
A presentation about the practice of Web-enabling the physical world, by means of principles inspired from the Web of Things. This is an invited presentation of Prof. Andreas Pitsillides and Andreas Kamilaris at the University of Johannesburg, South Africa in April, 2012. In this presentation, the motivation, practice, historical background, exemplary applications, dangers and future challenges of the Web of Things are discussed.
The Web of Things: Enabling the Physical World to the WebAndreas Kamilaris
A presentation about the practice of Web-enabling the physical world, by means of principles inspired from the Web of Things. This is an invited presentation of Prof. Andreas Pitsillides and Andreas Kamilaris at the University of Johannesburg, South Africa in April, 2012. In this presentation, the motivation, practice, historical background, exemplary applications, dangers and future challenges of the Web of Things are discussed.
The tutorial on the Web of Things discusses possible solutions to build the entire vertical system by identifying the relevant components, illustrating their functionality and integration, and showing the examples of existing tools and
systems. First, the tutorial covers architectural aspects and discusses the levels of abstraction for integrating the “things” into the Web. Next, the tutorial focuses on semantic technologies and analytic methods for leveraging services and applications on top of the “things”. State of the art technology and tools are showed through live demos. The tutorial concludes with a brief review of existing projects and an outline of research directions and challenges.
This a IOT base ppt slide. It's more describe IOT system history and IOt devices . And also given most valuable and relevant information about IOT and devices.
First off, I describe how we can divide IoT (Internet of Things) in two versions: The Enterprise and for Consumers. After that, I describe what the IoT can really be in the future (read http://sommerfeldt.co/2014/05/01/internet-of-things-or-should-we-call-it-the-emperors-new-wearables/), using Illustrations that my 7 yo. daughter made for me. I then talk about the necessary enablers for this. I also show what the different vendors are offering in the space, and the most prominent protocols and standards. In the second part, I show how you can make your own home automation system using MQTT and node.red - two interesting IoT-related offerings. This is partly described here: http://blogg.bouvet.no/2014/03/10/an-internet-of-things-demo-using-raspberry-pi-arduino-minecraft-and-mqtt/
For the IoT industry to thrive, there are three categories of challenges to overcome: technology, business, and society. The upcoming webinar will shed some on what issues to expect soon.
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
"Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Driven Innovation." A presentation by Adam Thierer (Mercatus Center at George Mason University) made on September 11, 2014 at AEI-FCC Conference on "Regulating the Evolving Broadband Ecosystem."
IEEE CS Keynote at 20th Annual Conference on Advanced Computing and Communications (ADCOM 2014), Bangaluru, India, September 19, 2014 by Prof. Raj Jain. The talk covers What are Things?, Internet of Things, Sample IoT Applications, What’s Smart?, 4 Levels of Smartness, Internet of Brains, Why IoT Now?, Funding, Google Trends, Research Funding for IoT, Business Opportunities, Venture Activities in IoT, Recent IoT Products, IoT Research Challenges, Internet of Harmful Things, Beacons, Power per MB, Datalink Issues, Ant-Sized IoT Passive Radios, Networking Issues, Last 100m Protocols, Recent Protocols for IoT, Legacy IoT Protocols, Standardization, Fog Computing, Micro-Clouds on Cell-Towers, The Problem Statement, Services in a Cloud of Clouds.
Internet of Things (IoT) is becoming an emerging trend superseding other technologies and researchers considered it as the future of internet. As now the connectivity to the World Wide Web is becoming highly available cost is drastically decreasing so everyone can afford the technology. As Internet of Things provides a great opportunity to develop an important industrial systems and applications with the help of various kind of sensors that can sense out the environment using number of devices that is connected to the internet, usage of IoT is drastically increasing and becoming a common thing. With this sky-rocketed usage and the demand, Communication and storing of the information faces serious security issues as the security of IoT devices become just an afterthought when manufacturing most of the devices. This study tries to summarize this IoT security issues in terms of primary information security concepts confidentiality, integrity and availability with regards to its architecture.
Wireless has evolved from Marconi's station-to-station telegraphy, to audio and video broadcasting, to today’s person-to-person mobile digital communications. Each transition has surprised even the revolutionaries who brought it about, and each transformed civilization. We expect similar disruptions from the next phase of interconnectivity, in which a trillion objects join the conversation. Tech pundits have long talked about an Internet of Things, a vision most often dominated by machine-to-machine communications in industrial settings. Lee will make the case for the Internet of Everything in which humans will be involved in the most compelling applications yet to emerge. He will describe some possible futures, and how Stanford engineers are working to overcome significant challenges to realize those futures.
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
Much of our technology today is connected to the Internet and communicating information about us, our homes and businesses, back to manufacturers in order to give us something of value in return. It is estimated that by 2025, there may be as many as 80 billion Internet of Things (IoT) devices connected to the Internet. As IoT becomes a normal part of our everyday lives, at home, on the road, and at the office, privacy, security and safety become paramount.
This presentation will set the stage: What is IoT? How is it used today? How will it be used in the future? IoT provides both opportunities and risk to society, and IoT devices need to be secured as this world of connected devices become critical to how society functions.
The Web, similar to other successful man made systems is continuously evolving. With the miniaturization and increased performance of computing devices which are also being embedded in common physical objects, it is natural that the Web evolved to also include these – therefore the Web of Things. This tutorial provides an overview of the system vertical structure by identifying the relevant components, illustrating their functionality and showing existing tools and systems. The aim is to show how small devices can be connected to the Web at various levels of abstraction and transform them into "first-class" Web residents.
Research and development related to the Internet of Things, Web of Things and Smart Objects is carried out by SensorLab an interdepartmental laboratory within Jozef Stefan Institute. Most solutions are prototyped and tested, and based on obtained results and experience we continuously improve our hardware and software platforms.
The Web of Things was presented by Carolina Fortuna and Marko Grobelnik (Jozef Stefan Institute) at the 20th International World Wide Web Conference 2011 - Hyderabad, India on March 28, 2011.
Mobile technology has made the Internet of Things (IoT) possible. With wifi powered light bulbs, thermostats we can control from our phone and devices that tell us how much energy we’re using in our homes/businesses the sky’s the limit. In this session Nicole Engard will walk you through what technologies are out there for your home and library. She will cover how to keep yourself secure and discuss future design ideas for the Internet of Things’ usefulness in our libraries.
Why use a Network Simulator for research ?
Introduction to NetSim
Introduction to IoT
IoT Technologies – 802.15.4, 6LowPAN
Designing IoT scenario using NetSim
Analyzing Metrics
Protocol Code editing
Areas of R & D in IoT
Q & A Session
The tutorial on the Web of Things discusses possible solutions to build the entire vertical system by identifying the relevant components, illustrating their functionality and integration, and showing the examples of existing tools and
systems. First, the tutorial covers architectural aspects and discusses the levels of abstraction for integrating the “things” into the Web. Next, the tutorial focuses on semantic technologies and analytic methods for leveraging services and applications on top of the “things”. State of the art technology and tools are showed through live demos. The tutorial concludes with a brief review of existing projects and an outline of research directions and challenges.
This a IOT base ppt slide. It's more describe IOT system history and IOt devices . And also given most valuable and relevant information about IOT and devices.
First off, I describe how we can divide IoT (Internet of Things) in two versions: The Enterprise and for Consumers. After that, I describe what the IoT can really be in the future (read http://sommerfeldt.co/2014/05/01/internet-of-things-or-should-we-call-it-the-emperors-new-wearables/), using Illustrations that my 7 yo. daughter made for me. I then talk about the necessary enablers for this. I also show what the different vendors are offering in the space, and the most prominent protocols and standards. In the second part, I show how you can make your own home automation system using MQTT and node.red - two interesting IoT-related offerings. This is partly described here: http://blogg.bouvet.no/2014/03/10/an-internet-of-things-demo-using-raspberry-pi-arduino-minecraft-and-mqtt/
For the IoT industry to thrive, there are three categories of challenges to overcome: technology, business, and society. The upcoming webinar will shed some on what issues to expect soon.
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
"Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Driven Innovation." A presentation by Adam Thierer (Mercatus Center at George Mason University) made on September 11, 2014 at AEI-FCC Conference on "Regulating the Evolving Broadband Ecosystem."
IEEE CS Keynote at 20th Annual Conference on Advanced Computing and Communications (ADCOM 2014), Bangaluru, India, September 19, 2014 by Prof. Raj Jain. The talk covers What are Things?, Internet of Things, Sample IoT Applications, What’s Smart?, 4 Levels of Smartness, Internet of Brains, Why IoT Now?, Funding, Google Trends, Research Funding for IoT, Business Opportunities, Venture Activities in IoT, Recent IoT Products, IoT Research Challenges, Internet of Harmful Things, Beacons, Power per MB, Datalink Issues, Ant-Sized IoT Passive Radios, Networking Issues, Last 100m Protocols, Recent Protocols for IoT, Legacy IoT Protocols, Standardization, Fog Computing, Micro-Clouds on Cell-Towers, The Problem Statement, Services in a Cloud of Clouds.
Internet of Things (IoT) is becoming an emerging trend superseding other technologies and researchers considered it as the future of internet. As now the connectivity to the World Wide Web is becoming highly available cost is drastically decreasing so everyone can afford the technology. As Internet of Things provides a great opportunity to develop an important industrial systems and applications with the help of various kind of sensors that can sense out the environment using number of devices that is connected to the internet, usage of IoT is drastically increasing and becoming a common thing. With this sky-rocketed usage and the demand, Communication and storing of the information faces serious security issues as the security of IoT devices become just an afterthought when manufacturing most of the devices. This study tries to summarize this IoT security issues in terms of primary information security concepts confidentiality, integrity and availability with regards to its architecture.
Wireless has evolved from Marconi's station-to-station telegraphy, to audio and video broadcasting, to today’s person-to-person mobile digital communications. Each transition has surprised even the revolutionaries who brought it about, and each transformed civilization. We expect similar disruptions from the next phase of interconnectivity, in which a trillion objects join the conversation. Tech pundits have long talked about an Internet of Things, a vision most often dominated by machine-to-machine communications in industrial settings. Lee will make the case for the Internet of Everything in which humans will be involved in the most compelling applications yet to emerge. He will describe some possible futures, and how Stanford engineers are working to overcome significant challenges to realize those futures.
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
Much of our technology today is connected to the Internet and communicating information about us, our homes and businesses, back to manufacturers in order to give us something of value in return. It is estimated that by 2025, there may be as many as 80 billion Internet of Things (IoT) devices connected to the Internet. As IoT becomes a normal part of our everyday lives, at home, on the road, and at the office, privacy, security and safety become paramount.
This presentation will set the stage: What is IoT? How is it used today? How will it be used in the future? IoT provides both opportunities and risk to society, and IoT devices need to be secured as this world of connected devices become critical to how society functions.
The Web, similar to other successful man made systems is continuously evolving. With the miniaturization and increased performance of computing devices which are also being embedded in common physical objects, it is natural that the Web evolved to also include these – therefore the Web of Things. This tutorial provides an overview of the system vertical structure by identifying the relevant components, illustrating their functionality and showing existing tools and systems. The aim is to show how small devices can be connected to the Web at various levels of abstraction and transform them into "first-class" Web residents.
Research and development related to the Internet of Things, Web of Things and Smart Objects is carried out by SensorLab an interdepartmental laboratory within Jozef Stefan Institute. Most solutions are prototyped and tested, and based on obtained results and experience we continuously improve our hardware and software platforms.
The Web of Things was presented by Carolina Fortuna and Marko Grobelnik (Jozef Stefan Institute) at the 20th International World Wide Web Conference 2011 - Hyderabad, India on March 28, 2011.
Mobile technology has made the Internet of Things (IoT) possible. With wifi powered light bulbs, thermostats we can control from our phone and devices that tell us how much energy we’re using in our homes/businesses the sky’s the limit. In this session Nicole Engard will walk you through what technologies are out there for your home and library. She will cover how to keep yourself secure and discuss future design ideas for the Internet of Things’ usefulness in our libraries.
Why use a Network Simulator for research ?
Introduction to NetSim
Introduction to IoT
IoT Technologies – 802.15.4, 6LowPAN
Designing IoT scenario using NetSim
Analyzing Metrics
Protocol Code editing
Areas of R & D in IoT
Q & A Session
Internet of Things, Various Names, One Concept, History of IoT, Applications of IoT, Challenges and Barriers in IoT, Internet Revolution, Future of IoT, Impact of the Internet, Internet Usage and Population Statistics
Latest trends in information technologyAtifa Aqueel
This ppt includes the latest trends in information technology such as big data analytics, cloud computing, virtual reality, 5G wireless technology etc.
Road-map to World Of IoT. IoT devices are devices that are connected over the internet,
and the main purpose of IoT-enabled devices is continuous
exchange of data, and making this data available to other IoT
devices, thus facilitating a continuous learning process. All IoT
enabled devices are Connected Devices, but not necessarily
the other way around.
The presentation gives a broad overview of crowdsourcing and crowdsensing. It motivates the ideas of several types of crowdsourcing and crowdsensing applications using typical examples from business and society.
The presentation gives an overview of the IoT from a non-technical perspective. It focuses on why we see the rise of the IoT today (and not 5, 10 or even 50 years ago). The IoT is also a sign that technology, business and society cannot be seen in isolation anymore - Internet Thinking. It describes a notion of the IoT ecosystem and applications.
GateSense alpha release - GateSense is building the Internet of Things step by step with you the community. Join us!
The alpha release focuses on a basic platform (the data plane of the IoT), a middleware to get some data and the GateSense alphaApp.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Knowledge engineering: from people to machines and back
IoT overview 2014
1. The Internet of Things
September 2014
Mirko Presser @mirkopresser
Chair of the IoT Forum
Head of Research and Innovation
Smart City Lab
Alexandra Instituttet A/S
2. Defining: The Internet of Things
Mirko Presser @mirkopresser
Chair of the IoT Forum
Head of Research and Innovation
Smart City Lab
Alexandra Instituttet A/S
3. What
is
the
Internet
of
Things?
4. !
!
!
!
!
!
!
!
!
!
!
1993: Created by Quentin Stafford-Fraser and Paul Jardetzky the Trojan Room
Coffee Pot was located in the 'Trojan Room' within the Computer Laboratory of
the University of Cambridge and was used to monitor the pot levels with an
image being updated about 3x a minute and sent to the buildings server. It
was later put online for viewing once browsers could display images. !
5. h1p://postscapes.com/internet-‐of-‐things-‐defini;on
lists
almost
50
different
defini;ons.
"The
global
network
connec;ng
any
smart
object.”
-‐
IoT-‐A,
2011
“Internet
of
Things
(IoT)
is
an
integrated
part
of
Future
Internet
and
could
be
defined
as
a
dynamic
global
network
infrastructure
with
self
configuring
capabili;es
based
on
standard
and
interoperable
communica;on
protocols
where
physical
and
virtual
‘things’
have
iden;;es,
physical
a1ributes,
and
virtual
personali;es
and
use
intelligent
interfaces,
and
are
seamlessly
integrated
into
the
informa;on
network.
In
the
IoT,
‘things’
are
expected
to
become
ac;ve
par;cipants
in
business,
informa;on
and
social
processes
where
they
are
enabled
to
interact
and
communicate
among
themselves
and
with
the
environment
by
exchanging
data
and
informa;on
‘sensed’
about
the
environment,
while
reac;ng
autonomously
to
the
‘real/physical
world’
events
and
influencing
it
by
running
processes
that
trigger
ac;ons
and
create
services
with
or
without
direct
human
interven;on.
Interfaces
in
the
form
of
services
facilitate
interac;ons
with
these
‘smart
things’
over
the
Internet,
query
and
change
their
state
and
any
informa;on
associated
with
them,
taking
into
account
security
and
privacy
issues.”
-‐
IERC,
2014
8. Wave
1:
WWW
350M
PC
annually
Wave
2:
Mobile/Cloud
2.32B
annually
Connec;ng
PCs
Connec;ng
People
9. Wave
1:
WWW
350M
PC
annually
Wave
3:
Internet
of
Things
50B
by
2020
Wave
2:
Mobile/Cloud
2.32B
annually
Connec;ng
PCs
Connec;ng
Everything
Connec;ng
People
12. Technology: The Internet of Things
Mirko Presser @mirkopresser
Chair of the IoT Forum
Head of Research and Innovation
Smart City Lab
Alexandra Instituttet A/S
14. v6.12.2009
6LoWPAN:
The
Wireless
Embedded
Internet,
Shelby
&
Bormann
Evolu;on
of
Wireless
Sensor
Networks
ScalabilityPrice
Cabling
Cables
Proprietary
radio + network
20001980s 2006
Vendor
lock-in
Increased
Productivity
ZigBee
Complex
middleware
6lowpan
Internet
Open development
and portability
Z-Wave, prop.
ISM etc.
ZigBee and
WHART
Any vendor
6lowpan
ISA100
2008 ->
18. CoAP:
The
Web
of
Things
Protocol
• Open
IETF
Standard
• Compact
header
• UDP,
SMS,
TCP
support
• Security
support
(DTLS)
• Asynchronous
Subscrip;on
• Built-‐in
Discovery
Slide courtesy: Zach Shelby
19. From
the
Web
to
an
IoT
device
IP
TLS/TCP
HTTP
Web
Object
1000s
of
bytes
Web
Applica;on
Slide courtesy: Zach Shelby
20. From
the
Web
to
an
IoT
device
IP
TLS/TCP
HTTP
Web
Object
1000s
of
bytes
Web
Applica;on
IP
DTLS/UDP
CoAP
Binary
Web
Object
100s
of
bytes
IoT
Backhaul
Proxy
Slide courtesy: Zach Shelby
21. From
the
Web
to
an
IoT
device
IP
TLS/TCP
HTTP
Web
Object
1000s
of
bytes
Web
Applica;on
IP
DTLS/UDP
CoAP
Binary
Web
Object
100s
of
bytes
IoT
Backhaul
Proxy
6LoWPAN
DTLS/UDP
CoAP
Binary
Web
Object
10s
of
bytes
IoT
Node
Network
Router
Slide courtesy: Zach Shelby
23. CoAP:
What
it
is
and,
what
it
is
not.
What
it
is:
• A
very
efficient
RESTful
protocol
• Ideal
for
constraint
devices
and
networks
• Specialised
for
IoT
applica;ons
• Easy
to
proxy
to/from
HTTP
What
it
is
NOT:
• A
general
replacement
for
HTTP
• HTTP
compression
• Restricted
to
isolated
“automa;on”
networks
Slide courtesy: Zach Shelby
Learn
more
here:
h1p://youtu.be/4bSr5x5gKvA
24. • CoAP is NOT the IoT – it is an IoT protocol
that makes the IoT a bit more = the
Internet.
• More Technologies are out there and are
IMPORTANT (e.g. MQTT).
• The Internet of Things
Technology Conclusions
25. Business: The Internet of Things
Mirko Presser @mirkopresser
Chair of the IoT Forum
Head of Research and Innovation
Smart City Lab
Alexandra Instituttet A/S
28. Wave
1:
WWW
350M
PC
annually
Wave
3:
Internet
of
Things
50B
by
2020
Wave
2:
Mobile/Cloud
2.32B
annually
Connec;ng
PCs
Connec;ng
Everything
Connec;ng
People
29.
30.
31. There
are
>
1
Billion
lampposts
in
the
world
…
32. There
are
>
1
Billion
lampposts
in
the
world
…
- Digital
signage
SERVICE
- Adver;sing
SERVICE
- Emergency
support
SERVICE
- Health/welfare
SERVICE
- Running
target
SERVICE
- Anger
management
SERVICE
- Communica;ons
SERVICE
- Electricity
as
a
SERVICE
- …
34. Services Beyond the Product
Bringing services to people beyond the product itself
is the interesting aspect of the Internet of Things.
The challenge is to find viable business models.
35.
36.
37.
38. Intelligent
public
waste
baskets
• Ad
hoc
fill
level
measurements;
data
transmission
to
the
collec;on
vehicle
when
it
approaches
• Develop
assisted
applica;on
for
maintenance
and
fill
level
visualisa;on
• Main
Targets:
o Test
fill
level
sensors
and
capillary
network
(integra;on
of
sensor
nodes
with
gateways
and
collec;on
vehicle
communica;on)
o Evaluate
data
gathering
process
of
fill
level
and
assisted
maintenance
(manual
malfunc;on
messages,
automa;c
error
messages)
Fill
level
sensors
39.
40. • Connected
Products
(fitbit,
WiThings,
…)
• Op;mised
Business
(Supply
chain,
FoF,
…)
• Transform
Business
Models
(RR,
GE,
Bosch,
…)
• Interconnec;on
Effect
(Smart
City,
Big
Data,
…)
Market
maturity
41.
42. Reconfigure
Network
rules
for
one
device
Experience
some
type
of
malfunc;on
Juggle
management
of
up
to
24
;mes
per
year
1
out
of
every
100
devices
per
month
5
pricing
op;ons
per
device
line
An
average
M2M
service
company
Slide courtesy: Jasper
44. • Replace
SIM
cards
on
your
assets.
• Replace
ba1eries
on
nodes.
• Find
a
serious
security
flaw
aoer
deployment.
• …
…
on
a
network
of
millions
of
devices
all
over
the
globe.
And
other
issues
45. • Limitless
IoT
Scenarios.
• Manage
a
network
for
an
M2M/IoT
service
provider
• Business
Intelligence
– Dark
Data
– Data
Analy;cs
and
Big
Data
And
other
opportuni;es
46.
47. • Think service, not thing.
• Every Business will change.
• Limitless Scenarios à MVP.
• Use known Business Concepts.
• Maturity:
• Connected
Products
• Op;mised
Business
• Transform
Business
Models
• Interconnec;on
Effect
Business Conclusions
48. Societal: The Internet of Things
Mirko Presser @mirkopresser
Chair of the IoT Forum
Head of Research and Innovation
Smart City Lab
Alexandra Instituttet A/S
52. • Don’t underestimate the Maker Movement.
• IoT gives power to the people.
• IoT makes people slaves.
• Critical Infrastructure safety issues.
Societal Conclusions
53. SmartSantander: The Internet of Things
Mirko Presser @mirkopresser
Chair of the IoT Forum
Head of Research and Innovation
Smart City Lab
Alexandra Instituttet A/S
54.
55.
56.
57. • Company Level: Have a workshop on “How will
IoT grow your business by x10-100?”.
• Individual Level: Buy an Arduino and make an
internet enabled service.
• Subliminal Level: Register for the IoT Forum and
become a driver of the IoT Week in Copenhagen
June 2015.
Do this tomorrow!
58. Mirko
Presser
@mirkopresser
Chair
of
the
IoT
Forum
Head
of
Research
and
Innova;on
Smart
City
Lab
Alexandra
Ins;tu1et
A/S
E:
mirko.presser@alexandra.dk
M:
+45
30
49
09
76
web
en:
www.alexandra.dk/uk