SlideShare a Scribd company logo
Finance and IoT-
Successful IoT
Industrial Patterns	
  
John	
  Mathon	
  
Vice	
  President	
  Enterprise	
  
Evangelism	
  
WSO2	
  Inc.	
  
	
  
Agenda
❖  IOT Basics
❖  IoT Standards
❖  Enterprise IoT
❖  Enterprise Patterns
Publish/Subscribe
Joe Mary FrankExchange Clearing
This is what I started TIBCO with
Subject
Filter
Subject Filter Subject Filter Subject Filter Subject Filter
IoT	
  Markets	
  -­‐	
  Truly	
  Enormous	
  
IoT	
  Hardware	
  SegmentaDon	
  
•  Hardware	
  
–  CommunicaDons	
  
–  Hubs	
  
–  Devices	
  
–  ComputaDon	
  	
  
–  Integrated	
  Devices	
  
–  Integrators	
  
•  SoIware	
  
–  Embedded	
  SoIware	
  
–  Hub	
  SoIware	
  
–  CommunicaDons	
  
	
  
	
  
IoT	
  SoIware	
  SegmentaDon	
  
Industrial	
  
Thousands	
  of	
  Companies	
  already	
  providing	
  So6ware	
  and	
  Services	
  
	
  
•  Device	
  Abstrac=on	
  -­‐	
  taxonomy	
  and	
  descripDon	
  of	
  all	
  IoT	
  devices	
  EVRYTHNG	
  
•  Data	
  Storage	
  -­‐	
  means	
  to	
  store	
  data	
  from	
  IoT	
  devices	
  DEVICEHUB	
  
•  Pub	
  Sub	
  pla?orms	
  -­‐	
  M2M	
  or	
  M2C	
  communicaDon	
  PUBNUB	
  
•  Analysis	
  -­‐	
  analysis	
  of	
  device	
  data	
  INFOBRIGHT	
  
•  Visualiza=on	
  -­‐	
  mobile	
  device,	
  applicaDon	
  or	
  web	
  app	
  tools	
  FREEBOARD	
  
•  Integra=on	
  -­‐	
  orchestraDon	
  of	
  real	
  Dme	
  events	
  to	
  perform	
  acDons	
  	
  Pacific	
  
Controls,	
  Trimble,	
  IFTTT	
  
•  Service	
  -­‐	
  services	
  to	
  individuals,	
  corporaDons,	
  government	
  XIVELY	
  
IoT Ecosystem Driving Personas
Enterprise IT - Implementers
Gold Seekers - Entrepreneurs
Explorers - Curious
Hunters - Whatever Works
Guns for Hire - Consultants
Hobbyists - Makers
Moochers - Latchers
Mobile Wannabees – Yearners
Gamers
Product Extenders - Add connectivity
Existing Device /Sensor
Manufacturers
Mobile Device Companies
Digital Hardware Companies
Software Infrastructure
Communications Companies
Data Companies
Existing App Companies
Main Business Drivers IoT
1.  Cost Reductions - Consumer, Building, Operations
2.  Increased Quality - Operations
3.  Convenience - Employee, Consumer
4.  Stickiness - Business Top Line
5.  New Products / Markets - Business Top Line
Almost Every Business will be interested for some reason
IIoT Best Practices for Enterprise
Build a Great Device
❖ Security
❖ Encrypt Data at rest and in
motion
❖ Allow fine grained control of
authorization around controls
and data visibility
❖ Provide automated upgrade
service
❖ Ease of Use
❖ Provide multiple UI
mechanisms for cell phones,
web, apis and visually on the
device itself if it makes sense
❖ Data
❖ Provide Device Management
functionality including ability to
wipe device, upgrade and
configure through Dev
Management APIs
❖ Power Management, Failure
Detection
❖ Must warn well in advance,
Send still alive message and
detect failures, tampering
❖ APIs
❖ Provide APIs to everything as
Enterprises can build integration
IoT	
  Standards	
  Much	
  LeI	
  To	
  Do	
  	
  
•  Hardware	
  /	
  Embedded	
  
–  CommunicaDons	
  -­‐	
  Zigbee,	
  NF,	
  Zwave,	
  BLE,	
  802.11ah,	
  Cellular,	
  IEEE 802.15.4 and …
–  Security,	
  Discovery,	
  ApplicaDon	
  -­‐	
  Allseen Alliance, OIC, IIC, Google Thread, Zigbee,
IEEE P2413, OneM2M
–  Hubs	
  -­‐	
  SmartThings,	
  Vera,	
  Insteon,	
  Ninja,	
  Homey,	
  Apple	
  and	
  ...	
  
•  Data	
  
–  Where	
  is	
  the	
  data?	
  	
  Device,	
  Hub,	
  Local,	
  Cloud,	
  Enterprise,	
  Hybrid	
  
•  Security	
  and	
  Device	
  Mgt	
  
–  Who	
  sees	
  what	
  you	
  have?	
  	
  How	
  do	
  you	
  add?	
  	
  How	
  do	
  you	
  remove?	
  	
  Who	
  can	
  do	
  what?	
  	
  
Who	
  can	
  see	
  what?	
  	
  How	
  do	
  you	
  upgrade?	
  	
  How	
  do	
  you	
  monitor?	
  
–  UMA	
  
•  Orchestra=on	
  Tools	
  
–  ESB,	
  BPM,	
  Rules	
  Engine,	
  IFTTT,	
  other	
  ?	
  
–  Where	
  is	
  the	
  control/OrchestraDon?	
  	
  Cloud,	
  Dedicated	
  Device,	
  Cell	
  Phone?	
  	
  	
  
	
  
	
  
IoT	
  Security	
  Issues	
  
•  AuthenDcaDon	
  -­‐	
  How	
  do	
  you	
  know	
  the	
  device	
  or	
  user	
  is	
  who	
  they	
  say	
  they	
  
are?	
  
•  AuthorizaDon	
  -­‐	
  What	
  can	
  that	
  user	
  /	
  device	
  do?	
  
•  Logging	
  -­‐	
  How	
  do	
  we	
  monitor?	
  
•  Update	
  -­‐	
  How	
  do	
  we	
  upgrade?	
  
•  EncrypDon	
  -­‐	
  Always,	
  someDmes,	
  how?	
  
•  Enforcement	
  Points	
  -­‐	
  Security	
  distributed?	
  
•  Policies	
  -­‐	
  Establishing	
  automaDon	
  (UMA)	
  for	
  groups	
  of	
  people	
  or	
  devices	
  
•  API	
  -­‐	
  API	
  keys?	
  	
  More?	
  
•  Data	
  -­‐	
  Field	
  level	
  security?	
  
•  Privacy	
  -­‐	
  Who	
  can	
  see?	
  
IoT Security State of Affair
❖  Consumer - Terrible, Terrible, Terrible
❖  No Authentication, Frequently no encryption
❖  No automated upgrading
❖  No control over who can see or do what – Fine Grained
Authorization
❖  Enterprise - Somewhat better
❖  Some devices auto upgrade
❖  Some devices have fine grained authorization
❖  Most devices have encryption data in motion, some for data at rest
IoT	
  IntegraDon	
  Issues	
  
•  Different	
  CommunicaDon	
  protocols	
  
•  APIs,	
  SDKs	
  for	
  mobile	
  or	
  servers,	
  Cloud	
  Services,	
  Device	
  level	
  Services,	
  Hub	
  
Services.	
  
•  How	
  to	
  scale?	
  
•  Who	
  owns	
  the	
  device?	
  
•  Privacy	
  
•  AuthorizaDon	
  	
  
•  Which	
  OrchestraDon	
  Tools	
  or	
  Products?	
  
	
  
IoT	
  Reference	
  Architecture	
  -­‐	
  Building	
  /	
  Factory	
  	
  
1.  Devices
a.  Reliable, Secure
b.  Hard Connection
c.  Device Profile Known
2.  Data Caching at local sites
3.  Sophisticated Analysis
4.  Optimization
5.  Diagnosis / Failure Warning
6.  Eventing
7.  Device Management
8.  Integration to Finance,
Accounting, Security
1.  Purposes
a.  Energy - HVAC, Lighting
b.  Automation – Cost reduction
c.  Security
d.  Quality Engineering
Very High Criticality
Sophisticated Integration not a
problem
May be willing to accept non-
standard if superior security,
functionality
IoT	
  Reference	
  Architecture	
  -­‐	
  Employee	
  	
  
1.  Devices
a.  Secure
b.  Device Profile Known
c.  Size / Portability
2.  Diagnosis / Failure Warning
3.  Flexibility to support small variety
of devices
4.  Eventing
5.  Device Management
6.  Integration with Automation
Systems, Sales, Marketing,
Management, Content
Management Systems
1.  Purposes
a.  Productivity of Employees
b.  Convenience
Medium Criticality
Some Integration may be done
IoT	
  Reference	
  Architecture	
  -­‐	
  Customer	
  	
  
1.  Devices Key Functionalities
required
2.  Flexibility to support wide variety
of devices
3.  Eventing
4.  Store Data
5.  Analytics Critical
6.  Discovery
7.  Good UI
8.  Integration with Automation
Systems, Sales, Marketing,
Management, Content
Management Systems
1.  Purposes
a.  Create Stickiness
b.  Create Value for Customer
c.  Inexpensive
Application dependent Criticality
High Integration Expected
IoT	
  Reference	
  Architecture	
  -­‐	
  OEM	
  	
  
1.  Devices
a.  Key Functionalities required
2.  Flexibility to support wide variety of
devices
3.  Eventing
4.  Store Data
5.  Analytics Critical
6.  Discovery
7.  Good UI
8.  Integration with Automation Systems,
Sales, Marketing, Management, Content
Management Systems
1.  Purposes
a.  Create Stickiness
b.  Create Value for Customer
c.  Inexpensive
High Criticality Criticality
High Integration Expected
IoT	
  End	
  to	
  End	
  Needs	
  
Middle ServicesCustomer Device
OS
Application
Security
Communication / Power Mgt
Visualization / APIVisualization
OS
Security / PolicySecurity
OS
Visualization / API
Data Stream / Storage / Mgt
Eventing/Analysis/Optimize
Orchestration / Integration
Eventing/Analysis/Optimize
Interaction Pattern
UI
IOT Reference Architecture
Device
API MgtDev Mgt
Service Bus BPM
BigData
Long Term
Analysis
Activity Mgt
Cloud
CEP
Cloud Orchestration/Integration
Com
m
Prov
ider
OS
Application
ESB, Security
OS
ESB, IM, PEP
Data Infrastructure
Hub
Orchestration
Integration
Rules Engine
Data
Dev Mgt
Rules Engine
User Dashboard
IoT Mgt
Dashboard
Event Driven Computing New Era
Platform 3
“How do you share information between users and applications
in a connected Social IoT Mobile world?”
Social IoT
Mobile
Apps
IoT and
Mobile Mgt
API
Mgt and Reuse
BigData
Mediation / Broker
Micro
Services
Analytics
PaaS/DevOps
Security
Perf Mgt
Scaling
EDA Publish / Subscribe Mesh Network
IoT
IoT
IoT
IoT
IoT
IoT
IoT
IoT
IoT
Router1
Router2
No Single Point of Failure / Like the Internet
Functionality = Combination of all Services
Mesh1
Mesh2 Mesh3
IoT
Cloud Control and Aggregation
Mesh1
The Cloud
Mesh2
Customers
Employees
IoT	
  Use	
  Cases	
  
•  Car	
  Manufacturer	
  
	
  
•  ConstrucDon	
  Company	
  
	
  
The
Connecte
Car - Tes
IoT	
  UseCase	
  –	
  Connected	
  Car	
  -­‐	
  Tesla	
  
•  Tesla
–  60% employees software engineers
–  Integration of hardware key
–  User Experience Important – Tesla redesigned the car from the ground up
–  Even other electric cars basically look like an ICE car. Not fully integrated.
–  Feedback to Tesla
•  Tesla Connected Car PROVES the case 98-99% customer satisfaction 2 years in a row
•  Ability to upgrade truly amazing
•  Smartness of the car astonishes
Tesla did more than build an electric car. They have created disruption in:
–  Car integration
–  Safety – broke previous safety ratings
–  Performance – faster than any production car in the world
–  Service – upgrades over the air, remote service, no maintenance required
–  Smartness – knows where to go, how high to go, what temperature, charges anywhere
–  IOT – connected all the time, data streaming back to the factory
ConnectedCar	
  -­‐	
  FuncDonality	
  
–  All hardware systems of the car integrated with digital platform to control, monitor, automate, monitor
•  Eventually leading to self-driving car
–  Integrated Apps in Car - Calendar, GPS, Energy, Settings, Entertainment, Phone, Climate, Profiles
•  Smart Car - knows when to lift suspension, when to ask me where to go, when to climatize
the car
–  Always Connected - monitor, find, pre-condition, secure
–  Unattended Upgrade - Feature improvement, Service Improvements
–  Feedback to Manufacturer
•  Data used to improve service and design decisions, normal use, crash, ...
•  Data used to optimize function, improve capabilities
•  Easy bug report
–  External Apps - Tesla App iPhone, Android, iWatch...
–  External API - Open API
–  3rd party integration - TeslaApps, Logging and Analysis companies
Connected Car
API Mgt Dev Mgt
Upgrade
Cust Svc Service Bus
Design
BPM
BigData
Long Term
Analysis
Activity Mgt
Service Bus
Polling LoggingEvents
Brakes
Brakes
Brakes
Brakes
Console
Phone
Watch
3rd Party App /
Device3rd Party App /
Device3rd Party App /
Device
Brakes
Hi Priority
Planning
Lo Priority Apps
Cell
Ven Cloud
CEP - Service
The
Car
Car
Com
pany
IOT Use Case – Connected Construction
❖  Management of worksites is difficult. Numerous
tools and people are needed and scheduling the
expensive tools, people and work can be difficult.
Tool breakdowns, changing work plans lead to
wasted time and increased costs
❖  IoT the tools, track their usage and location, help
contractors manage, track their expensive
equipment and plan for their use better
IOT Use Case – Connected Construction
– Tools are instrumented, some with replaceable NFC, some
with active IoT to control, monitor, automate
– Cars, trucks, equipment of all sorts even down to hammers
can be actively tracked with bluetooth and cell phones or
NFC technology
– Integrated Apps on worksite and dedicated devices to
collect information – progress, where things are,
requesting tools or services
– Unattended Upgrade - Feature improvement, Service
Improvements
– External API - Open API to encourage integration by 3rd parties
– Planning tools to help coordinate complex tool needs and
people needs
Connected Construction
API MgtDev Mgt
Cust Svc
Service Bus
Design
BPM
BigData
Long Term
Analysis
Activity Mgt
Phone
Vehicles
Tools
Hi Priority PlanningLo Priority
Cloud
CEP
Building Sites
Vehicles
Vehicles
Phone
Phone
Tools
Tools
Tools
Data Gather
DeviceData Gather
Devices
Wharehouse
Wharehouses
Tools
Data Gather
Device
Contractors
Design Contractor
Planning
Tool
Connected Construction
Connect the World
We help our customers 

become a 

Connected 

Business
Enterprise App Store
API Management 
 SaaS Adoption
Executive Dashboards
PaaS
Mobile Apps
Open Source Adoption
SOA
Cloud Adoption and Automation
Federated Identity
Social Networking
Mobile BYOD
Big Data and Analytics
Systems of Systems Functional Requirements 






Complete Enterprise Middleware




ONLY company to ever build a complete middleware stack
on-premises, in the cloud and on mobile devices.



SINGLE codebase for all products!
✓  Integration
✓  API Mgt
✓  Shadow IT
✓  App and Device Mgt
✓  Identity and Access Mgt
✓  Enterprise Scale and Quality
Thanks4Listening
❖  My twitter: @john_mathon
❖  My blog: CloudRamblings
Thank	
  You!	
  
o  ! Transport Security: provide the appropriate level of identification, privacy, and integrity to networkcommunication.
❖  ! Storage Security: provide the appropriate level of protection to persistent data held on the device or
within the system.
❖  ! Software Platform Security and Implementation: select and implement platforms and supporting
technologies that provide a robust and layered environment upon which to build the solution easily and
quickly.
❖  ! Functionality Security and Implementation: implement functionality using a technology stack and
tools which enable it to be done so in a secure fashion.
❖  ! Logging, Auditability, and Forensics Enablement: concrete sources of logs from low- level and high-
level software components which facilitate investigation of misuse.
❖  ! Sustainability and Upgradeability: features which facilitate the ability to securely upgrade devices
when vulnerabilities are discovered after release.
❖  ! Hardware Platform Security: ensuring the hardware platform provides the required security features.
❖  ! Managing and Monitoring: ensuring that IoT devices can be securely managed and monitored.

More Related Content

What's hot

Realising Society 5.0 and its Relation to Industry 4.0
Realising Society 5.0 and its Relation to Industry 4.0Realising Society 5.0 and its Relation to Industry 4.0
Realising Society 5.0 and its Relation to Industry 4.0
Dr. Mazlan Abbas
 
IOT in the Indian Context CeBIT India 2015 Oct 30
IOT in the Indian Context CeBIT India 2015 Oct 30IOT in the Indian Context CeBIT India 2015 Oct 30
IOT in the Indian Context CeBIT India 2015 Oct 30
Krishna Kumar G
 
Telco Global Connect 6 : MWC 14 Barcelona Summary Edition
Telco Global Connect 6 : MWC 14 Barcelona Summary EditionTelco Global Connect 6 : MWC 14 Barcelona Summary Edition
Telco Global Connect 6 : MWC 14 Barcelona Summary EditionSadiq Malik
 
Sensing-as-a-Service - New Business Models for Internet of Things (IOT)
Sensing-as-a-Service - New Business Models for Internet of Things (IOT)Sensing-as-a-Service - New Business Models for Internet of Things (IOT)
Sensing-as-a-Service - New Business Models for Internet of Things (IOT)
Dr. Mazlan Abbas
 
Internet of Things Corporate Presentation
Internet of Things Corporate PresentationInternet of Things Corporate Presentation
Internet of Things Corporate Presentation
MomentumPR
 
1 project overview
1 project overview1 project overview
1 project overview
rzurina
 
Digital supply chains and the smart factories
Digital supply chains and the smart factoriesDigital supply chains and the smart factories
Digital supply chains and the smart factories
Parasuram Balasubramanian
 
Io t analytics-companypresentationmarch 2021
Io t analytics-companypresentationmarch 2021 Io t analytics-companypresentationmarch 2021
Io t analytics-companypresentationmarch 2021
IoTAnalytics
 
What is BLE mobile payment
What is BLE mobile paymentWhat is BLE mobile payment
What is BLE mobile payment
Mahindra Comviva
 
SDP Global Summit 2009
SDP Global Summit 2009SDP Global Summit 2009
SDP Global Summit 2009Martin Prosek
 
Asia as Part of our Digital Future
Asia as Part of our Digital FutureAsia as Part of our Digital Future
Asia as Part of our Digital Future
Benjamin Joffe
 
Internet of things-RISHALZ Tech
Internet of things-RISHALZ TechInternet of things-RISHALZ Tech
Internet of things-RISHALZ Tech
RishalzTech
 
Tim meeting with investors - july
Tim   meeting with investors - julyTim   meeting with investors - july
Tim meeting with investors - july
TIM RI
 
The indian io t start up landscape and challenges
The indian io t start up landscape and challengesThe indian io t start up landscape and challenges
The indian io t start up landscape and challenges
ContractIQ
 
Sirous Kavehercy Mobile Monday Russia 3G Services
Sirous Kavehercy Mobile Monday Russia 3G ServicesSirous Kavehercy Mobile Monday Russia 3G Services
Sirous Kavehercy Mobile Monday Russia 3G Services
Sirous Kavehercy
 
Internet of Things (IoT) and Crowdsensing in the AFM Industries
Internet of Things (IoT) and Crowdsensing in the AFM IndustriesInternet of Things (IoT) and Crowdsensing in the AFM Industries
Internet of Things (IoT) and Crowdsensing in the AFM Industries
Dr. Mazlan Abbas
 
MIFA Newsletter - November 2021 Edition
MIFA Newsletter  - November 2021 EditionMIFA Newsletter  - November 2021 Edition
MIFA Newsletter - November 2021 Edition
Dr. Mazlan Abbas
 
What are Broadband Solutions
What are Broadband SolutionsWhat are Broadband Solutions
What are Broadband Solutions
Mahindra Comviva
 
Internet of Things & Hardware Industry Report 2016
Internet of Things & Hardware Industry Report 2016Internet of Things & Hardware Industry Report 2016
Internet of Things & Hardware Industry Report 2016
Bernard Moon
 

What's hot (20)

Realising Society 5.0 and its Relation to Industry 4.0
Realising Society 5.0 and its Relation to Industry 4.0Realising Society 5.0 and its Relation to Industry 4.0
Realising Society 5.0 and its Relation to Industry 4.0
 
IOT in the Indian Context CeBIT India 2015 Oct 30
IOT in the Indian Context CeBIT India 2015 Oct 30IOT in the Indian Context CeBIT India 2015 Oct 30
IOT in the Indian Context CeBIT India 2015 Oct 30
 
Telco Global Connect 6 : MWC 14 Barcelona Summary Edition
Telco Global Connect 6 : MWC 14 Barcelona Summary EditionTelco Global Connect 6 : MWC 14 Barcelona Summary Edition
Telco Global Connect 6 : MWC 14 Barcelona Summary Edition
 
Sensing-as-a-Service - New Business Models for Internet of Things (IOT)
Sensing-as-a-Service - New Business Models for Internet of Things (IOT)Sensing-as-a-Service - New Business Models for Internet of Things (IOT)
Sensing-as-a-Service - New Business Models for Internet of Things (IOT)
 
Internet of Things Corporate Presentation
Internet of Things Corporate PresentationInternet of Things Corporate Presentation
Internet of Things Corporate Presentation
 
1 project overview
1 project overview1 project overview
1 project overview
 
Digital supply chains and the smart factories
Digital supply chains and the smart factoriesDigital supply chains and the smart factories
Digital supply chains and the smart factories
 
Io t analytics-companypresentationmarch 2021
Io t analytics-companypresentationmarch 2021 Io t analytics-companypresentationmarch 2021
Io t analytics-companypresentationmarch 2021
 
What is BLE mobile payment
What is BLE mobile paymentWhat is BLE mobile payment
What is BLE mobile payment
 
SDP Global Summit 2009
SDP Global Summit 2009SDP Global Summit 2009
SDP Global Summit 2009
 
Asia as Part of our Digital Future
Asia as Part of our Digital FutureAsia as Part of our Digital Future
Asia as Part of our Digital Future
 
Creative Engineering Breakthroughs
Creative Engineering BreakthroughsCreative Engineering Breakthroughs
Creative Engineering Breakthroughs
 
Internet of things-RISHALZ Tech
Internet of things-RISHALZ TechInternet of things-RISHALZ Tech
Internet of things-RISHALZ Tech
 
Tim meeting with investors - july
Tim   meeting with investors - julyTim   meeting with investors - july
Tim meeting with investors - july
 
The indian io t start up landscape and challenges
The indian io t start up landscape and challengesThe indian io t start up landscape and challenges
The indian io t start up landscape and challenges
 
Sirous Kavehercy Mobile Monday Russia 3G Services
Sirous Kavehercy Mobile Monday Russia 3G ServicesSirous Kavehercy Mobile Monday Russia 3G Services
Sirous Kavehercy Mobile Monday Russia 3G Services
 
Internet of Things (IoT) and Crowdsensing in the AFM Industries
Internet of Things (IoT) and Crowdsensing in the AFM IndustriesInternet of Things (IoT) and Crowdsensing in the AFM Industries
Internet of Things (IoT) and Crowdsensing in the AFM Industries
 
MIFA Newsletter - November 2021 Edition
MIFA Newsletter  - November 2021 EditionMIFA Newsletter  - November 2021 Edition
MIFA Newsletter - November 2021 Edition
 
What are Broadband Solutions
What are Broadband SolutionsWhat are Broadband Solutions
What are Broadband Solutions
 
Internet of Things & Hardware Industry Report 2016
Internet of Things & Hardware Industry Report 2016Internet of Things & Hardware Industry Report 2016
Internet of Things & Hardware Industry Report 2016
 

Similar to WSO2Con EU 2015: IoT in Finance

Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT Patterns
WSO2
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns
John Mathon
 
IOT Success depends on Integration
IOT Success depends on Integration IOT Success depends on Integration
IOT Success depends on Integration
John Mathon
 
Getting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj ShahGetting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj Shah
momoahmedabad
 
IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017
paul young cpa, cga
 
Session 1908 connecting devices to the IBM IoT Cloud
Session 1908   connecting devices to the  IBM IoT CloudSession 1908   connecting devices to the  IBM IoT Cloud
Session 1908 connecting devices to the IBM IoT Cloud
PeterNiblett
 
Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterprise
Gabriella Davis
 
How to maximize profit from IoT by using data platform - Albert Lewandowski, ...
How to maximize profit from IoT by using data platform - Albert Lewandowski, ...How to maximize profit from IoT by using data platform - Albert Lewandowski, ...
How to maximize profit from IoT by using data platform - Albert Lewandowski, ...
GetInData
 
Connecting devices to the internet of things
Connecting devices to the internet of thingsConnecting devices to the internet of things
Connecting devices to the internet of things
Bernard Kufluk
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2
 
Hey IT, Meet OT with Hima Mukkamala
Hey IT, Meet OT with Hima MukkamalaHey IT, Meet OT with Hima Mukkamala
Hey IT, Meet OT with Hima Mukkamala
gogo6
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
Eurotech
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
Kellton Tech Solutions Ltd
 
How to Profit from IoT
How to Profit from IoTHow to Profit from IoT
How to Profit from IoT
Kevin Jones
 
Without App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingWithout App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of Anything
Open Interconnect Consortium
 
Top 5 IoT Use Cases
Top 5 IoT Use CasesTop 5 IoT Use Cases
Top 5 IoT Use Cases
Cloudera, Inc.
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
terrencebarr
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta
 
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
SafetyChain Software
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Innovation
 

Similar to WSO2Con EU 2015: IoT in Finance (20)

Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT Patterns
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns
 
IOT Success depends on Integration
IOT Success depends on Integration IOT Success depends on Integration
IOT Success depends on Integration
 
Getting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj ShahGetting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj Shah
 
IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017
 
Session 1908 connecting devices to the IBM IoT Cloud
Session 1908   connecting devices to the  IBM IoT CloudSession 1908   connecting devices to the  IBM IoT Cloud
Session 1908 connecting devices to the IBM IoT Cloud
 
Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterprise
 
How to maximize profit from IoT by using data platform - Albert Lewandowski, ...
How to maximize profit from IoT by using data platform - Albert Lewandowski, ...How to maximize profit from IoT by using data platform - Albert Lewandowski, ...
How to maximize profit from IoT by using data platform - Albert Lewandowski, ...
 
Connecting devices to the internet of things
Connecting devices to the internet of thingsConnecting devices to the internet of things
Connecting devices to the internet of things
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
 
Hey IT, Meet OT with Hima Mukkamala
Hey IT, Meet OT with Hima MukkamalaHey IT, Meet OT with Hima Mukkamala
Hey IT, Meet OT with Hima Mukkamala
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
 
How to Profit from IoT
How to Profit from IoTHow to Profit from IoT
How to Profit from IoT
 
Without App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingWithout App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of Anything
 
Top 5 IoT Use Cases
Top 5 IoT Use CasesTop 5 IoT Use Cases
Top 5 IoT Use Cases
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 

More from WSO2

Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
architecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdfarchitecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdf
WSO2
 
Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
WSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
WSO2
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
WSO2
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
WSO2
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
WSO2
 
WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the CloudWSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2
 
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
WSO2
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
WSO2
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2
 

More from WSO2 (20)

Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
architecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdfarchitecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdf
 
Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the CloudWSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the Cloud
 
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital Businesses
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

WSO2Con EU 2015: IoT in Finance

  • 1. Finance and IoT- Successful IoT Industrial Patterns   John  Mathon   Vice  President  Enterprise   Evangelism   WSO2  Inc.    
  • 2. Agenda ❖  IOT Basics ❖  IoT Standards ❖  Enterprise IoT ❖  Enterprise Patterns
  • 3. Publish/Subscribe Joe Mary FrankExchange Clearing This is what I started TIBCO with Subject Filter Subject Filter Subject Filter Subject Filter Subject Filter
  • 4. IoT  Markets  -­‐  Truly  Enormous  
  • 5. IoT  Hardware  SegmentaDon   •  Hardware   –  CommunicaDons   –  Hubs   –  Devices   –  ComputaDon     –  Integrated  Devices   –  Integrators   •  SoIware   –  Embedded  SoIware   –  Hub  SoIware   –  CommunicaDons      
  • 6. IoT  SoIware  SegmentaDon   Industrial   Thousands  of  Companies  already  providing  So6ware  and  Services     •  Device  Abstrac=on  -­‐  taxonomy  and  descripDon  of  all  IoT  devices  EVRYTHNG   •  Data  Storage  -­‐  means  to  store  data  from  IoT  devices  DEVICEHUB   •  Pub  Sub  pla?orms  -­‐  M2M  or  M2C  communicaDon  PUBNUB   •  Analysis  -­‐  analysis  of  device  data  INFOBRIGHT   •  Visualiza=on  -­‐  mobile  device,  applicaDon  or  web  app  tools  FREEBOARD   •  Integra=on  -­‐  orchestraDon  of  real  Dme  events  to  perform  acDons    Pacific   Controls,  Trimble,  IFTTT   •  Service  -­‐  services  to  individuals,  corporaDons,  government  XIVELY  
  • 7. IoT Ecosystem Driving Personas Enterprise IT - Implementers Gold Seekers - Entrepreneurs Explorers - Curious Hunters - Whatever Works Guns for Hire - Consultants Hobbyists - Makers Moochers - Latchers Mobile Wannabees – Yearners Gamers Product Extenders - Add connectivity Existing Device /Sensor Manufacturers Mobile Device Companies Digital Hardware Companies Software Infrastructure Communications Companies Data Companies Existing App Companies
  • 8. Main Business Drivers IoT 1.  Cost Reductions - Consumer, Building, Operations 2.  Increased Quality - Operations 3.  Convenience - Employee, Consumer 4.  Stickiness - Business Top Line 5.  New Products / Markets - Business Top Line Almost Every Business will be interested for some reason
  • 9. IIoT Best Practices for Enterprise Build a Great Device ❖ Security ❖ Encrypt Data at rest and in motion ❖ Allow fine grained control of authorization around controls and data visibility ❖ Provide automated upgrade service ❖ Ease of Use ❖ Provide multiple UI mechanisms for cell phones, web, apis and visually on the device itself if it makes sense ❖ Data ❖ Provide Device Management functionality including ability to wipe device, upgrade and configure through Dev Management APIs ❖ Power Management, Failure Detection ❖ Must warn well in advance, Send still alive message and detect failures, tampering ❖ APIs ❖ Provide APIs to everything as Enterprises can build integration
  • 10. IoT  Standards  Much  LeI  To  Do     •  Hardware  /  Embedded   –  CommunicaDons  -­‐  Zigbee,  NF,  Zwave,  BLE,  802.11ah,  Cellular,  IEEE 802.15.4 and … –  Security,  Discovery,  ApplicaDon  -­‐  Allseen Alliance, OIC, IIC, Google Thread, Zigbee, IEEE P2413, OneM2M –  Hubs  -­‐  SmartThings,  Vera,  Insteon,  Ninja,  Homey,  Apple  and  ...   •  Data   –  Where  is  the  data?    Device,  Hub,  Local,  Cloud,  Enterprise,  Hybrid   •  Security  and  Device  Mgt   –  Who  sees  what  you  have?    How  do  you  add?    How  do  you  remove?    Who  can  do  what?     Who  can  see  what?    How  do  you  upgrade?    How  do  you  monitor?   –  UMA   •  Orchestra=on  Tools   –  ESB,  BPM,  Rules  Engine,  IFTTT,  other  ?   –  Where  is  the  control/OrchestraDon?    Cloud,  Dedicated  Device,  Cell  Phone?          
  • 11. IoT  Security  Issues   •  AuthenDcaDon  -­‐  How  do  you  know  the  device  or  user  is  who  they  say  they   are?   •  AuthorizaDon  -­‐  What  can  that  user  /  device  do?   •  Logging  -­‐  How  do  we  monitor?   •  Update  -­‐  How  do  we  upgrade?   •  EncrypDon  -­‐  Always,  someDmes,  how?   •  Enforcement  Points  -­‐  Security  distributed?   •  Policies  -­‐  Establishing  automaDon  (UMA)  for  groups  of  people  or  devices   •  API  -­‐  API  keys?    More?   •  Data  -­‐  Field  level  security?   •  Privacy  -­‐  Who  can  see?  
  • 12. IoT Security State of Affair ❖  Consumer - Terrible, Terrible, Terrible ❖  No Authentication, Frequently no encryption ❖  No automated upgrading ❖  No control over who can see or do what – Fine Grained Authorization ❖  Enterprise - Somewhat better ❖  Some devices auto upgrade ❖  Some devices have fine grained authorization ❖  Most devices have encryption data in motion, some for data at rest
  • 13. IoT  IntegraDon  Issues   •  Different  CommunicaDon  protocols   •  APIs,  SDKs  for  mobile  or  servers,  Cloud  Services,  Device  level  Services,  Hub   Services.   •  How  to  scale?   •  Who  owns  the  device?   •  Privacy   •  AuthorizaDon     •  Which  OrchestraDon  Tools  or  Products?    
  • 14. IoT  Reference  Architecture  -­‐  Building  /  Factory     1.  Devices a.  Reliable, Secure b.  Hard Connection c.  Device Profile Known 2.  Data Caching at local sites 3.  Sophisticated Analysis 4.  Optimization 5.  Diagnosis / Failure Warning 6.  Eventing 7.  Device Management 8.  Integration to Finance, Accounting, Security 1.  Purposes a.  Energy - HVAC, Lighting b.  Automation – Cost reduction c.  Security d.  Quality Engineering Very High Criticality Sophisticated Integration not a problem May be willing to accept non- standard if superior security, functionality
  • 15. IoT  Reference  Architecture  -­‐  Employee     1.  Devices a.  Secure b.  Device Profile Known c.  Size / Portability 2.  Diagnosis / Failure Warning 3.  Flexibility to support small variety of devices 4.  Eventing 5.  Device Management 6.  Integration with Automation Systems, Sales, Marketing, Management, Content Management Systems 1.  Purposes a.  Productivity of Employees b.  Convenience Medium Criticality Some Integration may be done
  • 16. IoT  Reference  Architecture  -­‐  Customer     1.  Devices Key Functionalities required 2.  Flexibility to support wide variety of devices 3.  Eventing 4.  Store Data 5.  Analytics Critical 6.  Discovery 7.  Good UI 8.  Integration with Automation Systems, Sales, Marketing, Management, Content Management Systems 1.  Purposes a.  Create Stickiness b.  Create Value for Customer c.  Inexpensive Application dependent Criticality High Integration Expected
  • 17. IoT  Reference  Architecture  -­‐  OEM     1.  Devices a.  Key Functionalities required 2.  Flexibility to support wide variety of devices 3.  Eventing 4.  Store Data 5.  Analytics Critical 6.  Discovery 7.  Good UI 8.  Integration with Automation Systems, Sales, Marketing, Management, Content Management Systems 1.  Purposes a.  Create Stickiness b.  Create Value for Customer c.  Inexpensive High Criticality Criticality High Integration Expected
  • 18. IoT  End  to  End  Needs   Middle ServicesCustomer Device OS Application Security Communication / Power Mgt Visualization / APIVisualization OS Security / PolicySecurity OS Visualization / API Data Stream / Storage / Mgt Eventing/Analysis/Optimize Orchestration / Integration Eventing/Analysis/Optimize Interaction Pattern
  • 19. UI IOT Reference Architecture Device API MgtDev Mgt Service Bus BPM BigData Long Term Analysis Activity Mgt Cloud CEP Cloud Orchestration/Integration Com m Prov ider OS Application ESB, Security OS ESB, IM, PEP Data Infrastructure Hub Orchestration Integration Rules Engine Data Dev Mgt Rules Engine User Dashboard IoT Mgt Dashboard
  • 20. Event Driven Computing New Era Platform 3 “How do you share information between users and applications in a connected Social IoT Mobile world?” Social IoT Mobile Apps IoT and Mobile Mgt API Mgt and Reuse BigData Mediation / Broker Micro Services Analytics PaaS/DevOps Security Perf Mgt Scaling
  • 21. EDA Publish / Subscribe Mesh Network IoT IoT IoT IoT IoT IoT IoT IoT IoT Router1 Router2 No Single Point of Failure / Like the Internet Functionality = Combination of all Services Mesh1 Mesh2 Mesh3 IoT
  • 22. Cloud Control and Aggregation Mesh1 The Cloud Mesh2 Customers Employees
  • 23. IoT  Use  Cases   •  Car  Manufacturer     •  ConstrucDon  Company    
  • 25. IoT  UseCase  –  Connected  Car  -­‐  Tesla   •  Tesla –  60% employees software engineers –  Integration of hardware key –  User Experience Important – Tesla redesigned the car from the ground up –  Even other electric cars basically look like an ICE car. Not fully integrated. –  Feedback to Tesla •  Tesla Connected Car PROVES the case 98-99% customer satisfaction 2 years in a row •  Ability to upgrade truly amazing •  Smartness of the car astonishes Tesla did more than build an electric car. They have created disruption in: –  Car integration –  Safety – broke previous safety ratings –  Performance – faster than any production car in the world –  Service – upgrades over the air, remote service, no maintenance required –  Smartness – knows where to go, how high to go, what temperature, charges anywhere –  IOT – connected all the time, data streaming back to the factory
  • 26. ConnectedCar  -­‐  FuncDonality   –  All hardware systems of the car integrated with digital platform to control, monitor, automate, monitor •  Eventually leading to self-driving car –  Integrated Apps in Car - Calendar, GPS, Energy, Settings, Entertainment, Phone, Climate, Profiles •  Smart Car - knows when to lift suspension, when to ask me where to go, when to climatize the car –  Always Connected - monitor, find, pre-condition, secure –  Unattended Upgrade - Feature improvement, Service Improvements –  Feedback to Manufacturer •  Data used to improve service and design decisions, normal use, crash, ... •  Data used to optimize function, improve capabilities •  Easy bug report –  External Apps - Tesla App iPhone, Android, iWatch... –  External API - Open API –  3rd party integration - TeslaApps, Logging and Analysis companies
  • 27. Connected Car API Mgt Dev Mgt Upgrade Cust Svc Service Bus Design BPM BigData Long Term Analysis Activity Mgt Service Bus Polling LoggingEvents Brakes Brakes Brakes Brakes Console Phone Watch 3rd Party App / Device3rd Party App / Device3rd Party App / Device Brakes Hi Priority Planning Lo Priority Apps Cell Ven Cloud CEP - Service The Car Car Com pany
  • 28. IOT Use Case – Connected Construction ❖  Management of worksites is difficult. Numerous tools and people are needed and scheduling the expensive tools, people and work can be difficult. Tool breakdowns, changing work plans lead to wasted time and increased costs ❖  IoT the tools, track their usage and location, help contractors manage, track their expensive equipment and plan for their use better
  • 29. IOT Use Case – Connected Construction – Tools are instrumented, some with replaceable NFC, some with active IoT to control, monitor, automate – Cars, trucks, equipment of all sorts even down to hammers can be actively tracked with bluetooth and cell phones or NFC technology – Integrated Apps on worksite and dedicated devices to collect information – progress, where things are, requesting tools or services – Unattended Upgrade - Feature improvement, Service Improvements – External API - Open API to encourage integration by 3rd parties – Planning tools to help coordinate complex tool needs and people needs
  • 30. Connected Construction API MgtDev Mgt Cust Svc Service Bus Design BPM BigData Long Term Analysis Activity Mgt Phone Vehicles Tools Hi Priority PlanningLo Priority Cloud CEP Building Sites Vehicles Vehicles Phone Phone Tools Tools Tools Data Gather DeviceData Gather Devices Wharehouse Wharehouses Tools Data Gather Device Contractors Design Contractor Planning Tool Connected Construction
  • 32. We help our customers 
 become a 
 Connected 
 Business
  • 33. Enterprise App Store API Management SaaS Adoption Executive Dashboards PaaS Mobile Apps Open Source Adoption SOA Cloud Adoption and Automation Federated Identity Social Networking Mobile BYOD Big Data and Analytics
  • 34. Systems of Systems Functional Requirements 

  • 35. 
 
 Complete Enterprise Middleware
 
 ONLY company to ever build a complete middleware stack on-premises, in the cloud and on mobile devices. 
 SINGLE codebase for all products!
  • 36. ✓  Integration ✓  API Mgt ✓  Shadow IT ✓  App and Device Mgt ✓  Identity and Access Mgt ✓  Enterprise Scale and Quality
  • 37. Thanks4Listening ❖  My twitter: @john_mathon ❖  My blog: CloudRamblings
  • 39. o  ! Transport Security: provide the appropriate level of identification, privacy, and integrity to networkcommunication. ❖  ! Storage Security: provide the appropriate level of protection to persistent data held on the device or within the system. ❖  ! Software Platform Security and Implementation: select and implement platforms and supporting technologies that provide a robust and layered environment upon which to build the solution easily and quickly. ❖  ! Functionality Security and Implementation: implement functionality using a technology stack and tools which enable it to be done so in a secure fashion. ❖  ! Logging, Auditability, and Forensics Enablement: concrete sources of logs from low- level and high- level software components which facilitate investigation of misuse. ❖  ! Sustainability and Upgradeability: features which facilitate the ability to securely upgrade devices when vulnerabilities are discovered after release. ❖  ! Hardware Platform Security: ensuring the hardware platform provides the required security features. ❖  ! Managing and Monitoring: ensuring that IoT devices can be securely managed and monitored.