SlideShare uma empresa Scribd logo
1 de 62
The Evolution of
Digital Transformation
Tell the truth …. how many of you could actually
make it through a day without your smartphone?
In our world today, there are more smart devices
than there are people. A growing number of
people are connected to the Internet.
The Impact of Digital Transformation
How is it possible for so many devices to
be connected?
“Network”
Networking is the Foundation
 Networks form the foundation of the digitized
world. Networks come in all sizes.
 They can range from simple networks
consisting of two computers to networks
connecting millions of devices.
Can Smart Device Think ?
All digital Devices work
based on computer
programs and supplied
data. Artificial Intelligence
implies that these devices
are able to think on their
own .
If Programmed
appropriately , smart
devices are able to
evaluate data that are
provide to them and
modify processes or
settings . If they are
provide with sufficient
Network Types
Personal Area Network (PAN)
Personal area networks are small networks where connected wireless
devices are within personal reach
Local Area Network (LAN)
LANs are typically networks in a small or local geographic area, such
as a home, small business or department within a large corporation
Wide Area Networks (WANs)
The term WAN typically refers to a collection of LANs that provides
inter-LAN and Internet connectivity for businesses and governments.
Internet (network of network)
The Internet is a multi-layer global network system that
connects hundreds of millions of computers.
 It allows for the exchange of data between more than a
hundred Internet-linked countries worldwide.
Wireless Networks
Wireless networks are those computer networks that use
electromagnetic waves instead of wires
The Cloud
It is a collection of data centers or groups of connected servers
that are used to store and analyze data, provide access to on-
line applications, and provide backup services for personal and
corporate use.
Fog Computing
The fog is located at the edge of a business or corporate
network. Servers and computer programs allow the data to
be pre-processed for immediate use. Then the pre-
processed data can be sent to the cloud for more in-depth
computing if required.
Fog Computing
The fog is located at the edge of a business or corporate network.
Servers and computer programs allow the data to be pre-
processed for immediate use. Then the pre-processed data can
be sent to the cloud for more in-depth computing if required.
Fog
Computin
g
What is the IoT?
The Internet of Things (IoT) is the connection of
millions of smart devices and sensors to the
Internet, with the ability to collect and exchange
data from users or environment with no human
intervention.
These connected devices and sensors collect and share data
for use and evaluation by many organizations. These
Why IOT ?
 We want to Automate everything.
 We want to control everything remotely.
 We want to see data in real-time.
 Dynamic control of industry and daily life.
 Improve the resource utilization ratio.
 Integrating human society and physical
system.
 Flexible configuration.
Fog Computing
The fog is located at the edge of a business or corporate
network. Servers and computer programs allow the data to
be pre-processed for immediate use. Then the pre-
processed data can be sent to the cloud for more in-depth
computing if required.
Researchers estimate
 That over 3 million new devices are connected to the
Internet each month.
 And also estimate that in the next four years, there are
going to be over 30 billion connected devices worldwide.
What is Big Data?
Data is information that comes from a variety of sources, such
as people, pictures, text, sensors, and web sites.
Most recently, there has been a spike in the volume of data
generated by sensors. Sensors are now installed in an ever
growing number of locations and objects.
“Big Data“ is a lot of data, but what is a lot?
The data collect from devices is quite large and complex that
becomes difficult to analyse them, we called it “Big data”.
Here are three characteristics that indicate an organization may be
dealing with Big Data:
 A large amount of data that requires more storage space (Volume).
 An amount of data that is growing exponentially fast (Velocity).
 Different Types of data (Variety).
How much data do sensors collect? Here are some estimated
examples:
•Sensors in one autonomous car can generate 4,000 gigabits (Gb) of
data per day.
•An Airbus A380 Engine generates 1 petabyte (PB) of data on a flight
from London to Singapore.
•Sensors in one smart connected home can produce as much as 1
gigabyte (GB) of information a week.
What Are the Challenges of Big Data?
IBM’s Big Data estimates conclude that “each day
we create 2.5 quintillion bytes of data”. To put this
into context, every minute of every day:
•We upload over 300 hours of YouTube video.
•We send over 3.5 million text messages.
•We stream over 86 thousand hours of Netflix video.
•We like over 4 million Facebook posts.
•We request over 14 million forecasts from The
Weather Channel.
The security of stored data becomes a
big problem.
Big Data solutions must be secure ,and to ensure
data does not get lost. Big Data storage is not only
about storing data, it is also about managing and
securing it.
Challenges of Big Data?
There are five major data storage problems with Big Data
as represented in the figure
Management Security Redundancy
Access
Analytics
Where Can We Store Big Data?
Big data is typically stored on multiple servers,
usually housed within data centers.
For security, accessibility, and redundancy, the data
is usually distributed on many different servers in
many different data centers.
The cloud storage facilities that are available from
companies like Amazon, Google, Microsoft, and
many others.
Fog Computing
Fog computing is an architecture that utilizes end-user clients or “edge”
devices to do a substantial amount of the pre-processing and storage
required by an organization. Fog computing was designed to keep the
data closer to the source for pre-processing.
Application of IOT
Smart Home
Automation
Smart Building
Industrial IOT
and Smart Factories
Smart Car Technology
Medical Diagnosis and Surgery
Aircraft Auto-Pilot
Smart City
Example
Every Things Needs to be Secure
Data generated by computers and digital devices is still groups
of
1s and 0s. That has not changed. What has changed is the
quantity, volume, variety of the generated data.
Because we are gathering and storing exponential
quantities of data, it has increased the need for extra
security to protect this information from natural disasters,
hackers, and misuse.
The Good Guys The Bad Guys
Challenges of Securing IoT devices
Sensing a complex environment – Innovative ways to sense and
deliver information from physical world to the cloud.
Connectivity - Variety of wired and wireless standards are required to
enabled different application needs.
Power – Many IoT application needs to run for years over battery and
reduce the overall energy consumption.
Security – Protection user’s privacy, manufacturer’s IP
& Blocking malicious activity.
Complexity – IoT application development needs to be
easy for all developers not just to expert.
Cloud – IoT application require end to end solution
including cloud services
Protecting Devices
The Good Guys
Update Your Operating System
& Browser
Keep The Firewall On
Prevent Unauthorized access
Use Antivirus
& Antispyware
 Since the IoT is a transformational
technology, we are now faced with an ever
expanding collection of new technology that
we must master. The IoT is changing every
aspect of our lives.
 IoT can help innovate new process and
initiatives that could transform business
lives and the world.
Conclusion
The Evolving Job Market
The IoT is changing the job market. Traditional jobs are being
replaced with jobs that are designed to embrace this new world and all
it offers
In IT areas,
•Artificial Intelligence
•Application Development
•IoT Program Developer
•IoT Security Specialist
•Collaboration
•Enterprise Networks
•Data Center and Virtualization
Knowledge of IoT
Knowledge of IoT
Knowledge of IoT
Knowledge of IoT
Knowledge of IoT
Knowledge of IoT
Knowledge of IoT
Knowledge of IoT
Knowledge of IoT
Knowledge of IoT
Knowledge of IoT
Knowledge of IoT
Knowledge of IoT

Mais conteúdo relacionado

Mais procurados

The future of big data analytics
The future of big data analyticsThe future of big data analytics
The future of big data analyticsAhmed Banafa
 
Short introduction to Big Data Analytics, the Internet of Things, and their s...
Short introduction to Big Data Analytics, the Internet of Things, and their s...Short introduction to Big Data Analytics, the Internet of Things, and their s...
Short introduction to Big Data Analytics, the Internet of Things, and their s...Andrei Khurshudov
 
re:Invent re:Cap - Big Data & IoT at Any Scale
re:Invent re:Cap - Big Data & IoT at Any Scalere:Invent re:Cap - Big Data & IoT at Any Scale
re:Invent re:Cap - Big Data & IoT at Any ScaleAdrian Hornsby
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principlesardexateam
 
The Impact of IoT on Cloud Computing, Big Data & Analytics
The Impact of IoT on Cloud Computing, Big Data & AnalyticsThe Impact of IoT on Cloud Computing, Big Data & Analytics
The Impact of IoT on Cloud Computing, Big Data & AnalyticsSyam Madanapalli
 
IoT and AI Services in Healthcare | AWS Public Sector Summit 2017
 IoT and AI Services in Healthcare | AWS Public Sector Summit 2017 IoT and AI Services in Healthcare | AWS Public Sector Summit 2017
IoT and AI Services in Healthcare | AWS Public Sector Summit 2017Amazon Web Services
 
Hyper-Converged Infrastructure: Big Data and IoT opportunities and challenges...
Hyper-Converged Infrastructure: Big Data and IoT opportunities and challenges...Hyper-Converged Infrastructure: Big Data and IoT opportunities and challenges...
Hyper-Converged Infrastructure: Big Data and IoT opportunities and challenges...Andrei Khurshudov
 
Issues on Big Data & Cloud Computing
Issues on Big Data & Cloud Computing Issues on Big Data & Cloud Computing
Issues on Big Data & Cloud Computing Seungyun Lee
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?Sameer Ahmed
 
Artificial Intelligence in Computer Networks
Artificial Intelligence in Computer NetworksArtificial Intelligence in Computer Networks
Artificial Intelligence in Computer NetworksAbdullah Khosa
 
Fog Computing An Empirical Study
Fog Computing An Empirical StudyFog Computing An Empirical Study
Fog Computing An Empirical Studyijtsrd
 
01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-thingsJohn Soldatos
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)FabianM11
 
Big data overview external
Big data overview externalBig data overview external
Big data overview externalBrett Colbert
 

Mais procurados (20)

The future of big data analytics
The future of big data analyticsThe future of big data analytics
The future of big data analytics
 
Short introduction to Big Data Analytics, the Internet of Things, and their s...
Short introduction to Big Data Analytics, the Internet of Things, and their s...Short introduction to Big Data Analytics, the Internet of Things, and their s...
Short introduction to Big Data Analytics, the Internet of Things, and their s...
 
re:Invent re:Cap - Big Data & IoT at Any Scale
re:Invent re:Cap - Big Data & IoT at Any Scalere:Invent re:Cap - Big Data & IoT at Any Scale
re:Invent re:Cap - Big Data & IoT at Any Scale
 
IoT and BigData
IoT and BigDataIoT and BigData
IoT and BigData
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
The Impact of IoT on Cloud Computing, Big Data & Analytics
The Impact of IoT on Cloud Computing, Big Data & AnalyticsThe Impact of IoT on Cloud Computing, Big Data & Analytics
The Impact of IoT on Cloud Computing, Big Data & Analytics
 
Big data
Big dataBig data
Big data
 
IoT and AI Services in Healthcare | AWS Public Sector Summit 2017
 IoT and AI Services in Healthcare | AWS Public Sector Summit 2017 IoT and AI Services in Healthcare | AWS Public Sector Summit 2017
IoT and AI Services in Healthcare | AWS Public Sector Summit 2017
 
Hyper-Converged Infrastructure: Big Data and IoT opportunities and challenges...
Hyper-Converged Infrastructure: Big Data and IoT opportunities and challenges...Hyper-Converged Infrastructure: Big Data and IoT opportunities and challenges...
Hyper-Converged Infrastructure: Big Data and IoT opportunities and challenges...
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
 
Issues on Big Data & Cloud Computing
Issues on Big Data & Cloud Computing Issues on Big Data & Cloud Computing
Issues on Big Data & Cloud Computing
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
 
Artificial Intelligence in Computer Networks
Artificial Intelligence in Computer NetworksArtificial Intelligence in Computer Networks
Artificial Intelligence in Computer Networks
 
Fog Computing An Empirical Study
Fog Computing An Empirical StudyFog Computing An Empirical Study
Fog Computing An Empirical Study
 
Data Analytics for IoT
Data Analytics for IoT Data Analytics for IoT
Data Analytics for IoT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Big data overview external
Big data overview externalBig data overview external
Big data overview external
 

Semelhante a Knowledge of IoT

Future of iot and big data
Future of iot and big dataFuture of iot and big data
Future of iot and big datakashif kashif
 
Internet of Things, Examples and Issues
Internet of Things, Examples and IssuesInternet of Things, Examples and Issues
Internet of Things, Examples and IssuesIRJET Journal
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy AnkitThakkar46
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)shashankvaidyar2
 
Consumidores Digitais: The Executive's Guide to the Internet of Things (ZD Net)
Consumidores Digitais: The Executive's Guide to the Internet of Things (ZD Net)Consumidores Digitais: The Executive's Guide to the Internet of Things (ZD Net)
Consumidores Digitais: The Executive's Guide to the Internet of Things (ZD Net)Consumidores Digitais
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfShubhamYadav73126
 
Web and software development
Web and software developmentWeb and software development
Web and software developmentpriyanka sharma
 
AGI Part 4.pdf
AGI Part 4.pdfAGI Part 4.pdf
AGI Part 4.pdfBob Marcus
 
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...Anil
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computingeteshagarwal1
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
 
Fog computing and data concurrency
Fog computing and data concurrencyFog computing and data concurrency
Fog computing and data concurrencyPriyanka Goswami
 
IRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future InternetIRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future InternetIRJET Journal
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionAbaram Network Solutions
 
top 10 Digital transformation Technologies in 2022.docx
top 10 Digital transformation Technologies in 2022.docxtop 10 Digital transformation Technologies in 2022.docx
top 10 Digital transformation Technologies in 2022.docxAdvance Tech
 

Semelhante a Knowledge of IoT (20)

Future of iot and big data
Future of iot and big dataFuture of iot and big data
Future of iot and big data
 
Internet of Things, Examples and Issues
Internet of Things, Examples and IssuesInternet of Things, Examples and Issues
Internet of Things, Examples and Issues
 
IOT_PPT1.pdf
IOT_PPT1.pdfIOT_PPT1.pdf
IOT_PPT1.pdf
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)
 
Topic 7
Topic 7Topic 7
Topic 7
 
Consumidores Digitais: The Executive's Guide to the Internet of Things (ZD Net)
Consumidores Digitais: The Executive's Guide to the Internet of Things (ZD Net)Consumidores Digitais: The Executive's Guide to the Internet of Things (ZD Net)
Consumidores Digitais: The Executive's Guide to the Internet of Things (ZD Net)
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
 
Web and software development
Web and software developmentWeb and software development
Web and software development
 
AGI Part 4.pdf
AGI Part 4.pdfAGI Part 4.pdf
AGI Part 4.pdf
 
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
Fog computing and data concurrency
Fog computing and data concurrencyFog computing and data concurrency
Fog computing and data concurrency
 
IRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future InternetIRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future Internet
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial Revolution
 
top 10 Digital transformation Technologies in 2022.docx
top 10 Digital transformation Technologies in 2022.docxtop 10 Digital transformation Technologies in 2022.docx
top 10 Digital transformation Technologies in 2022.docx
 

Último

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Último (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Knowledge of IoT

  • 1.
  • 2. The Evolution of Digital Transformation Tell the truth …. how many of you could actually make it through a day without your smartphone? In our world today, there are more smart devices than there are people. A growing number of people are connected to the Internet.
  • 3.
  • 4. The Impact of Digital Transformation
  • 5. How is it possible for so many devices to be connected?
  • 7. Networking is the Foundation  Networks form the foundation of the digitized world. Networks come in all sizes.  They can range from simple networks consisting of two computers to networks connecting millions of devices.
  • 8. Can Smart Device Think ? All digital Devices work based on computer programs and supplied data. Artificial Intelligence implies that these devices are able to think on their own . If Programmed appropriately , smart devices are able to evaluate data that are provide to them and modify processes or settings . If they are provide with sufficient
  • 9. Network Types Personal Area Network (PAN) Personal area networks are small networks where connected wireless devices are within personal reach Local Area Network (LAN) LANs are typically networks in a small or local geographic area, such as a home, small business or department within a large corporation Wide Area Networks (WANs) The term WAN typically refers to a collection of LANs that provides inter-LAN and Internet connectivity for businesses and governments.
  • 10.
  • 11. Internet (network of network) The Internet is a multi-layer global network system that connects hundreds of millions of computers.  It allows for the exchange of data between more than a hundred Internet-linked countries worldwide. Wireless Networks Wireless networks are those computer networks that use electromagnetic waves instead of wires
  • 12. The Cloud It is a collection of data centers or groups of connected servers that are used to store and analyze data, provide access to on- line applications, and provide backup services for personal and corporate use.
  • 13. Fog Computing The fog is located at the edge of a business or corporate network. Servers and computer programs allow the data to be pre-processed for immediate use. Then the pre- processed data can be sent to the cloud for more in-depth computing if required. Fog Computing The fog is located at the edge of a business or corporate network. Servers and computer programs allow the data to be pre- processed for immediate use. Then the pre-processed data can be sent to the cloud for more in-depth computing if required. Fog Computin g
  • 14.
  • 15.
  • 16. What is the IoT? The Internet of Things (IoT) is the connection of millions of smart devices and sensors to the Internet, with the ability to collect and exchange data from users or environment with no human intervention. These connected devices and sensors collect and share data for use and evaluation by many organizations. These
  • 17. Why IOT ?  We want to Automate everything.  We want to control everything remotely.  We want to see data in real-time.  Dynamic control of industry and daily life.  Improve the resource utilization ratio.  Integrating human society and physical system.  Flexible configuration.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Fog Computing The fog is located at the edge of a business or corporate network. Servers and computer programs allow the data to be pre-processed for immediate use. Then the pre- processed data can be sent to the cloud for more in-depth computing if required. Researchers estimate  That over 3 million new devices are connected to the Internet each month.  And also estimate that in the next four years, there are going to be over 30 billion connected devices worldwide.
  • 25. What is Big Data? Data is information that comes from a variety of sources, such as people, pictures, text, sensors, and web sites. Most recently, there has been a spike in the volume of data generated by sensors. Sensors are now installed in an ever growing number of locations and objects.
  • 26. “Big Data“ is a lot of data, but what is a lot? The data collect from devices is quite large and complex that becomes difficult to analyse them, we called it “Big data”. Here are three characteristics that indicate an organization may be dealing with Big Data:  A large amount of data that requires more storage space (Volume).  An amount of data that is growing exponentially fast (Velocity).  Different Types of data (Variety).
  • 27. How much data do sensors collect? Here are some estimated examples: •Sensors in one autonomous car can generate 4,000 gigabits (Gb) of data per day. •An Airbus A380 Engine generates 1 petabyte (PB) of data on a flight from London to Singapore. •Sensors in one smart connected home can produce as much as 1 gigabyte (GB) of information a week.
  • 28. What Are the Challenges of Big Data? IBM’s Big Data estimates conclude that “each day we create 2.5 quintillion bytes of data”. To put this into context, every minute of every day: •We upload over 300 hours of YouTube video. •We send over 3.5 million text messages. •We stream over 86 thousand hours of Netflix video. •We like over 4 million Facebook posts. •We request over 14 million forecasts from The Weather Channel.
  • 29. The security of stored data becomes a big problem. Big Data solutions must be secure ,and to ensure data does not get lost. Big Data storage is not only about storing data, it is also about managing and securing it. Challenges of Big Data?
  • 30.
  • 31. There are five major data storage problems with Big Data as represented in the figure Management Security Redundancy Access Analytics
  • 32. Where Can We Store Big Data? Big data is typically stored on multiple servers, usually housed within data centers. For security, accessibility, and redundancy, the data is usually distributed on many different servers in many different data centers. The cloud storage facilities that are available from companies like Amazon, Google, Microsoft, and many others.
  • 33. Fog Computing Fog computing is an architecture that utilizes end-user clients or “edge” devices to do a substantial amount of the pre-processing and storage required by an organization. Fog computing was designed to keep the data closer to the source for pre-processing.
  • 34. Application of IOT Smart Home Automation Smart Building
  • 35. Industrial IOT and Smart Factories Smart Car Technology
  • 36. Medical Diagnosis and Surgery Aircraft Auto-Pilot
  • 39.
  • 40.
  • 41. Every Things Needs to be Secure Data generated by computers and digital devices is still groups of 1s and 0s. That has not changed. What has changed is the quantity, volume, variety of the generated data. Because we are gathering and storing exponential quantities of data, it has increased the need for extra security to protect this information from natural disasters, hackers, and misuse.
  • 42. The Good Guys The Bad Guys
  • 43. Challenges of Securing IoT devices Sensing a complex environment – Innovative ways to sense and deliver information from physical world to the cloud. Connectivity - Variety of wired and wireless standards are required to enabled different application needs. Power – Many IoT application needs to run for years over battery and reduce the overall energy consumption.
  • 44. Security – Protection user’s privacy, manufacturer’s IP & Blocking malicious activity. Complexity – IoT application development needs to be easy for all developers not just to expert. Cloud – IoT application require end to end solution including cloud services
  • 45. Protecting Devices The Good Guys Update Your Operating System & Browser Keep The Firewall On Prevent Unauthorized access Use Antivirus & Antispyware
  • 46.  Since the IoT is a transformational technology, we are now faced with an ever expanding collection of new technology that we must master. The IoT is changing every aspect of our lives.  IoT can help innovate new process and initiatives that could transform business lives and the world. Conclusion
  • 47.
  • 48.
  • 49. The Evolving Job Market The IoT is changing the job market. Traditional jobs are being replaced with jobs that are designed to embrace this new world and all it offers In IT areas, •Artificial Intelligence •Application Development •IoT Program Developer •IoT Security Specialist •Collaboration •Enterprise Networks •Data Center and Virtualization