SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Downloaden Sie, um offline zu lesen
Top trends in IoT in 2017
Dr Ganesh Neelakanta Iyer
Technical Support Manager, Core
Products – Asia Pacific
Progress Software, India
© 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.2
 Tech Support Manager at Progress, Hyderabad, India
 Masters & Ph.D. from National University of Singapore
 Interests: Kathakali, Traveling, Photography, Cooking
 http://ganeshniyer.com
GANESHNIYER
About Me
© 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.3
Agenda
 Introduction
 Top trends
• Blockchain
• DDOS attacks
• Security
• Cognitive Computing
• Containers and Microservices
 Summary
© 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.4
What is IoT?
a
• The Internet of Things (IoT) is the
network of physical objects that contain
embedded technology to communicate
and sense or interact with their internal
states or the external environment
a
• As objects become embedded with
sensors and gain the ability to
communicate, the new information
networks promise to create new business
models, improve business processes,
and reduce costs and risks.
© 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.5
The evolution
 People to people
 People to things
 Things to things
http://www.wchsmn.org/wp-content/uploads/2014/08/1024px-S.V.Helander.Emigrants.png
https://theinvisibleagent.files.wordpress.com/2009/05/mailman.jpg
Trends in IoT 2017
http://images.indianexpress.com/2016/09/internet.jpg
Samsung’s
$5,000 IoT
Connected
Smart Fridge
Orders
Groceries,
Takes Selfies
http://www.cepro.com/photo/samsungs_5000_iot_connected_smart_fridge_orders_groceries_takes_selfies c
http://www.cepro.com/photo/samsungs_5000_iot_connected_smart_fridge_orders_groceries_takes_selfies
Source: https://www.i-scoop.eu/internet-of-things-guide/
Source: https://www.i-scoop.eu/internet-of-things-guide/
1. IoT and Blockchain will
converge
https://datafloq.com/read/what-is-the-blockchain-and-why-is-it-so-important/2270?utm=internal
© 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.16
What is Blockchain?
 Blockchain is a shared single version of the truth of anything digital
 It is a database technology, a distributed ledger that maintains and ever
growing list of data records, which are decentralised and impossible to
tamper with
 The data records, which can be a Bitcoin transaction or a smart contract
or anything else for that matter, are combined in so-called blocks
 In order to add these blocks to the distributed ledger, the data needs to
be validated by 51% of all the computers within the network that have
access to the Blockchain
https://datafloq.com/read/what-is-the-blockchain-and-why-is-it-so-important/2270?utm=internal
https://datafloq.com/read/what-is-the-blockchain-and-why-is-it-so-important/2270?utm=internal
https://datafloq.com/read/what-is-the-blockchain-and-why-is-it-so-important/2270?utm=internal
© 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.19
Blockchain and IoT will converge
 Blockchain technology is considered by many experts as the missing link
to settle scalability, privacy, and reliability concerns in the Internet of
Things
 Blockchain technology can be used in tracking billions of connected
devices, enable the processing of transactions and coordination between
devices; allow for significant savings to IoT industry manufacturers
 This decentralized approach would eliminate single points of failure,
creating a more resilient ecosystem for devices to run on
 The cryptographic algorithms used by Blockchain would make consumer
data more private
 In 2017 IoT will converge with Blockchain for better security and privacy
opening the door for a new category in applications, hardware, and
talents.
https://datafloq.com/read/7-trends-of-internet-of-things-in-2017/2530
© 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.20
Leveraging Blockchain in three key ways
Build Trust
Reduce Cost
Accelerate
Transactions
https://cdn1.iconfinder.com/data/icons/basic-ui-rounded/512/ui-41-256.png
https://cdn3.iconfinder.com/data/icons/basic-mobile-part-2/512/payment-512.png
https://cdn1.iconfinder.com/data/icons/finance-solid-icons-vol-1/48/039-512.png
© 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.21
Leveraging Blockchain in three key ways
• Blockchain can help build trust between the people and parties that transact together.
While Person A may not know device B and may not trust it implicitly, the indelible
record of transactions and data from devices stored on the blockchain provide proof
and command the necessary trust for businesses and people to cooperate.
Build Trust
• IoT and blockchain can enable participants to reduce monetary and time commitment
costs by ultimately removing the “middle man” from the process. Transactions and
device data are now exhibited on a peer to peer basis, removing most legal or
contractual costs.
Reduced Cost
• IoT and blockchain enables more transactions overall because the “middle man” is
removed from the process. Smart contracts allow for organizations to reduce time
needed for completing legal or contractual commitments.
Accelerated transactions
https://www.ibm.com/blogs/internet-of-things/iot-2017-trends/ c
2. IoT Devices and More DDoS
Attacks
https://www.scudlayer.com/images/web/en/ddosattackwork.jpg
© 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.24
DDOS attacks
 Forrester thinks that the 2016 DDoS attack that hit a whopping 1600 websites in the
United States was just the tip of the iceberg when it comes to the threat that the
connected device poses to the world
 That attack confirmed the fear of vulnerability of IoT devices with a massive distributed
denial of service attack that crippled the servers of services like Twitter, NetFlix ,
NYTimes, and PayPal across the U.S. on October 21st , 2016
 It’s the result of an immense assault that involved millions of Internet addresses and
malicious software, according to #Dyn, the prime victim of that attack. "One source of
the traffic for the attacks was devices infected by the Mirai botnet".
 All indications suggest that countless Internet of Things (IoT) devices that power
everyday technology like closed-circuit cameras and smart-home devices were hijacked
by the malware, and used against the servers.
https://datafloq.com/read/what-is-the-blockchain-and-why-is-it-so-important/2270?utm=internal
3. IoT Security
© 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.26
Security
 As we rely on connected devices to make our lives better and easier,
security must be considered from every aspect
 All participants in the IoT ecosystem have a responsibility for the security
of the devices, data and solutions
 This means that device manufacturers, application developers,
consumers, operators, integrators and enterprise businesses all have
their part to play to follow best practices
 IoT security requires a multi-layered approach
• From a device point of view it should be considered at the blueprint level that starts
with design and development and keeps hardware, firmware/software, and data
secure through their entire life
• The same approach applies if you are a security analyst or operations personnel
responsible for IoT solutions.
https://www.ibm.com/blogs/internet-of-things/iot-2017-trends/ c
4. Cognitive Computing
https://goo.gl/YCfdmJ
© 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.29
Cognitive IoT
 Beyond traditional IoT implementations, cognitive
computing is increasing the amount of data to
improve the learning environment and increase the
possibilities of what can be done with edge analytics
 Making sensors capable of diagnosing and adapting
to their environment without the need for human
intervention
 Another huge advantage of cognitive IoT is the ability
to combine multiple data streams that can identify
patterns and give much more context than would be
otherwise available
https://www.ibm.com/blogs/internet-of-things/iot-2017-trends/
https://static.wixstatic.com/media/983155_e05dc2f69b9b42b5ade0c8158de8d712~mv2.jpg
© 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.30
Cognitive computing
 Cognitive IoT, AI and machine learning are further enabling enterprises to unlock IoT
value
 An exploding amount of IoT data requires a new approach to gather, analyze and
makes sense out of all that data
 Such a massive amount of information from sensors and devices can be used to
enhance existing data and knowledge, uncovering insights capable of transforming
industries
 But although making sense out of dark data and edge data is paving our way to
revolutionary ideas and technologies, it requires a cognitive approach that can
effectively handle increasingly large inputs while generating meaningful output
 Cognitive systems learn from interactions with people and from experiences with their
environment
 In doing so, they become able to keep pace with the complexity of the Internet of things,
identifying data correlations that would otherwise go unnoticed
https://www.ibm.com/blogs/internet-of-things/iot-2017-trends/
© 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.31
 DataRPM delivers industry's only Cognitive Predictive Maintenance (CPdM)
Platform for Industrial IoT
 DataRPM uses patent pending Meta-Learning technology, integral
component of Artificial Intelligence to automate predictions of asset failures
 CPdM is a full stack platform available on cloud or on premises that connects
to the data lake and then automatically runs multiple Machine Learning
experiments, finds patterns & anomalies in data, identifies influencing factors
& predictors, and builds an ensemble of predictive models to automate
Predictive Maintenance
 Not only does CPdM platform delivers descriptive, predictive, prescriptive
analytics through Natural Language Discovery module but also provides a
closed loop system by integrating these actionable insights through APIs to
ERP, CRM, and CMS systems.
Trends in IoT 2017
5. IoT, Containers and
Microservices
https://imgur.com/BRG3aKB
http://blog.algorithmia.com/wp-content/uploads/2016/02/AAmS_Overview.png
© 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.36
IoT and Microservices
1. Low Cost - The beauty of going with the simpler hardware is that you
can rely on microservices to add value and fill functional gaps. You can
also gradually roll out the network and continue to upgrade and maintain
it in a cost-effective manner as individual components get replaced.
2. Faster Innovation - A microservices development approach allows
you to unlock innovation (and thus value) faster by making it easy to test
new combinations of “things” and “services.” No need to build an entire
technology stack or invest in big infrastructure over many months. With
microservices, you can tinker and test to your heart’s content and
quickly reap the benefits of innovative solutions to your problems.
http://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/Five-things-to-know-about-the-future-of-microservices-and-IoT
© 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.37
IoT and Microservices
3. Isolated Risk - Assembling your solution via microservices allows you to
adjust and iterate quickly, thus avoiding the danger of missing the mark.
4. Flexibility and Agility - Assembling your solution via microservices allows
you to adjust and iterate quickly, thus avoiding the danger of missing the
mark.
5. Unlimited value-add - The device you deploy is never going to transcend
its physical capabilities until you upgrade or replace its physical
components. The digital upgrades you can provide via constantly evolving
microservices, however, are unlimited both in their scope and their
frequency. A camera may be designed to only capture 2D images, but
depending on the third-party service it’s linked to, it might provide you with
statistical traffic information, queue sizes or weather information.
http://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/Five-things-to-know-about-the-future-of-microservices-and-IoT
© 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.38
Summary
Blockchain
DDOS
Attacks
Security
Cognitive
Computing
Containers
and
Microservices
gaiyer@progress.com GANESHNIYER

Weitere ähnliche Inhalte

Was ist angesagt?

Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...
Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...
Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...Alex G. Lee, Ph.D. Esq. CLP
 
Internet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointInternet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointDr. Mazlan Abbas
 
Internet of Things & Hardware Industry Report 2016
Internet of Things & Hardware Industry Report 2016Internet of Things & Hardware Industry Report 2016
Internet of Things & Hardware Industry Report 2016Bernard Moon
 
Implementing IOT - A Road Map
Implementing IOT - A Road MapImplementing IOT - A Road Map
Implementing IOT - A Road MapBryan K. O'Rourke
 
IOT (Internet Of Things)
IOT (Internet Of Things)IOT (Internet Of Things)
IOT (Internet Of Things)Rhitik Kumar
 
Iot visualise-the-impact-aralık2016
Iot visualise-the-impact-aralık2016Iot visualise-the-impact-aralık2016
Iot visualise-the-impact-aralık2016Mustafa Kuğu
 
IoT World 2017 Sales Prospectus
IoT World 2017 Sales ProspectusIoT World 2017 Sales Prospectus
IoT World 2017 Sales ProspectusAdam Sillitoe
 
IoT : Research, Development, Challenges
IoT: Research, Development, ChallengesIoT: Research, Development, Challenges
IoT : Research, Development, Challengesbaddi youssef
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoTAhmed Banafa
 
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...sandhibhide
 
Internet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsInternet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsKate Carruthers
 
Why the Internet of Things needs AI & interoperability to succeed
Why the Internet of Things needs AI & interoperability to succeedWhy the Internet of Things needs AI & interoperability to succeed
Why the Internet of Things needs AI & interoperability to succeedNuance Communications
 
Internet of Things B2B market study 2016
Internet of Things B2B market study 2016Internet of Things B2B market study 2016
Internet of Things B2B market study 2016Yoann Kolnik
 
Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017Ian Beckett
 
Fin fest 2014 - Internet of Things and APIs
Fin fest 2014 - Internet of Things and APIsFin fest 2014 - Internet of Things and APIs
Fin fest 2014 - Internet of Things and APIsRobert Greiner
 
Evolution of Internet of Things (IoT) Ecosystem - Potential in India
Evolution of Internet of Things (IoT) Ecosystem - Potential in IndiaEvolution of Internet of Things (IoT) Ecosystem - Potential in India
Evolution of Internet of Things (IoT) Ecosystem - Potential in IndiaJayanth Kolla
 
IoT Masterclass ESGT Santarem - Connecting The Dots
IoT Masterclass ESGT Santarem -  Connecting The DotsIoT Masterclass ESGT Santarem -  Connecting The Dots
IoT Masterclass ESGT Santarem - Connecting The DotsMarco Silva
 
IOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsIOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsNagarro
 

Was ist angesagt? (20)

Meet&Greet #3 - IoT Vietnam
Meet&Greet #3 - IoT VietnamMeet&Greet #3 - IoT Vietnam
Meet&Greet #3 - IoT Vietnam
 
Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...
Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...
Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...
 
Internet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointInternet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping Point
 
Internet of Things & Hardware Industry Report 2016
Internet of Things & Hardware Industry Report 2016Internet of Things & Hardware Industry Report 2016
Internet of Things & Hardware Industry Report 2016
 
Implementing IOT - A Road Map
Implementing IOT - A Road MapImplementing IOT - A Road Map
Implementing IOT - A Road Map
 
IOT (Internet Of Things)
IOT (Internet Of Things)IOT (Internet Of Things)
IOT (Internet Of Things)
 
Iot visualise-the-impact-aralık2016
Iot visualise-the-impact-aralık2016Iot visualise-the-impact-aralık2016
Iot visualise-the-impact-aralık2016
 
FUTURE OF IOT
FUTURE OF IOTFUTURE OF IOT
FUTURE OF IOT
 
IoT World 2017 Sales Prospectus
IoT World 2017 Sales ProspectusIoT World 2017 Sales Prospectus
IoT World 2017 Sales Prospectus
 
IoT : Research, Development, Challenges
IoT: Research, Development, ChallengesIoT: Research, Development, Challenges
IoT : Research, Development, Challenges
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoT
 
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
 
Internet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsInternet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business Models
 
Why the Internet of Things needs AI & interoperability to succeed
Why the Internet of Things needs AI & interoperability to succeedWhy the Internet of Things needs AI & interoperability to succeed
Why the Internet of Things needs AI & interoperability to succeed
 
Internet of Things B2B market study 2016
Internet of Things B2B market study 2016Internet of Things B2B market study 2016
Internet of Things B2B market study 2016
 
Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017
 
Fin fest 2014 - Internet of Things and APIs
Fin fest 2014 - Internet of Things and APIsFin fest 2014 - Internet of Things and APIs
Fin fest 2014 - Internet of Things and APIs
 
Evolution of Internet of Things (IoT) Ecosystem - Potential in India
Evolution of Internet of Things (IoT) Ecosystem - Potential in IndiaEvolution of Internet of Things (IoT) Ecosystem - Potential in India
Evolution of Internet of Things (IoT) Ecosystem - Potential in India
 
IoT Masterclass ESGT Santarem - Connecting The Dots
IoT Masterclass ESGT Santarem -  Connecting The DotsIoT Masterclass ESGT Santarem -  Connecting The Dots
IoT Masterclass ESGT Santarem - Connecting The Dots
 
IOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsIOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of Things
 

Andere mochten auch

Design Thinking in a Nutshell
Design Thinking in a NutshellDesign Thinking in a Nutshell
Design Thinking in a NutshellTobias Schimmer
 
Design Thinking 2017: New to Design Thinking
Design Thinking 2017: New to Design ThinkingDesign Thinking 2017: New to Design Thinking
Design Thinking 2017: New to Design Thinkingbrightspot
 
Design Thinking Workshop NLA November 2017
Design Thinking Workshop NLA November 2017Design Thinking Workshop NLA November 2017
Design Thinking Workshop NLA November 2017MichalGromek
 
Zinnov Zones for IoT Services 2017
Zinnov Zones for IoT Services 2017Zinnov Zones for IoT Services 2017
Zinnov Zones for IoT Services 2017Zinnov
 
The many faces of IoT (Internet of Things) in Healthcare
The many faces of IoT (Internet of Things) in HealthcareThe many faces of IoT (Internet of Things) in Healthcare
The many faces of IoT (Internet of Things) in HealthcareStocker Partnership
 
5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things) 5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things) Deloitte United States
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart CityDr. Mazlan Abbas
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
 

Andere mochten auch (8)

Design Thinking in a Nutshell
Design Thinking in a NutshellDesign Thinking in a Nutshell
Design Thinking in a Nutshell
 
Design Thinking 2017: New to Design Thinking
Design Thinking 2017: New to Design ThinkingDesign Thinking 2017: New to Design Thinking
Design Thinking 2017: New to Design Thinking
 
Design Thinking Workshop NLA November 2017
Design Thinking Workshop NLA November 2017Design Thinking Workshop NLA November 2017
Design Thinking Workshop NLA November 2017
 
Zinnov Zones for IoT Services 2017
Zinnov Zones for IoT Services 2017Zinnov Zones for IoT Services 2017
Zinnov Zones for IoT Services 2017
 
The many faces of IoT (Internet of Things) in Healthcare
The many faces of IoT (Internet of Things) in HealthcareThe many faces of IoT (Internet of Things) in Healthcare
The many faces of IoT (Internet of Things) in Healthcare
 
5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things) 5 questions about the IoT (Internet of Things)
5 questions about the IoT (Internet of Things)
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 

Ähnlich wie Trends in IoT 2017

How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iotHitesh Malviya
 
The Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve ThemThe Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve ThemCognizant
 
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...rahulmonikasharma
 
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...rahulmonikasharma
 
A comprehensive guide on Data Engineering for IoT-1.pdf
A comprehensive guide on Data Engineering for IoT-1.pdfA comprehensive guide on Data Engineering for IoT-1.pdf
A comprehensive guide on Data Engineering for IoT-1.pdftv2064526
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
IOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of ThingsIOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of ThingsKuldeep Singh
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018Ahmed Banafa
 
Internet of Things (IoT) Outlook Survey
Internet of Things (IoT) Outlook SurveyInternet of Things (IoT) Outlook Survey
Internet of Things (IoT) Outlook SurveyJohn Clark
 
What happens in the Innovation of Things?
What happens in the Innovation of Things?What happens in the Innovation of Things?
What happens in the Innovation of Things?Kim Escherich
 
Augmate connect_Deck
Augmate connect_DeckAugmate connect_Deck
Augmate connect_DeckEtheralabs
 
11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things 11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things WGroup
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
Inventory of my IoT slide sets
Inventory of my IoT slide setsInventory of my IoT slide sets
Inventory of my IoT slide setsBob Marcus
 
Augmate connect deck
Augmate connect deckAugmate connect deck
Augmate connect deckEtheralabs
 

Ähnlich wie Trends in IoT 2017 (20)

How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iot
 
The Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve ThemThe Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve Them
 
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
 
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
 
A comprehensive guide on Data Engineering for IoT-1.pdf
A comprehensive guide on Data Engineering for IoT-1.pdfA comprehensive guide on Data Engineering for IoT-1.pdf
A comprehensive guide on Data Engineering for IoT-1.pdf
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
IOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of ThingsIOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of Things
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
IoT in industry
IoT in industryIoT in industry
IoT in industry
 
Internet of Things (IoT) Outlook Survey
Internet of Things (IoT) Outlook SurveyInternet of Things (IoT) Outlook Survey
Internet of Things (IoT) Outlook Survey
 
What happens in the Innovation of Things?
What happens in the Innovation of Things?What happens in the Innovation of Things?
What happens in the Innovation of Things?
 
VMware pulse IoT center, an IoT management suite
VMware pulse IoT center, an IoT management suiteVMware pulse IoT center, an IoT management suite
VMware pulse IoT center, an IoT management suite
 
Augmate connect_Deck
Augmate connect_DeckAugmate connect_Deck
Augmate connect_Deck
 
11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things 11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
Inventory of my IoT slide sets
Inventory of my IoT slide setsInventory of my IoT slide sets
Inventory of my IoT slide sets
 
Augmate connect deck
Augmate connect deckAugmate connect deck
Augmate connect deck
 

Mehr von Dr Ganesh Iyer

SRE Demystified - 16 - NALSD - Non-Abstract Large System Design
SRE Demystified - 16 - NALSD - Non-Abstract Large System DesignSRE Demystified - 16 - NALSD - Non-Abstract Large System Design
SRE Demystified - 16 - NALSD - Non-Abstract Large System DesignDr Ganesh Iyer
 
SRE Demystified - 14 - SRE Practices overview
SRE Demystified - 14 - SRE Practices overviewSRE Demystified - 14 - SRE Practices overview
SRE Demystified - 14 - SRE Practices overviewDr Ganesh Iyer
 
SRE Demystified - 13 - Docs that matter -2
SRE Demystified - 13 - Docs that matter -2SRE Demystified - 13 - Docs that matter -2
SRE Demystified - 13 - Docs that matter -2Dr Ganesh Iyer
 
SRE Demystified - 12 - Docs that matter -1
SRE Demystified - 12 - Docs that matter -1 SRE Demystified - 12 - Docs that matter -1
SRE Demystified - 12 - Docs that matter -1 Dr Ganesh Iyer
 
SRE Demystified - 01 - SLO SLI and SLA
SRE Demystified - 01 - SLO SLI and SLASRE Demystified - 01 - SLO SLI and SLA
SRE Demystified - 01 - SLO SLI and SLADr Ganesh Iyer
 
SRE Demystified - 11 - Release management-2
SRE Demystified - 11 - Release management-2SRE Demystified - 11 - Release management-2
SRE Demystified - 11 - Release management-2Dr Ganesh Iyer
 
SRE Demystified - 10 - Release management-1
SRE Demystified - 10 - Release management-1SRE Demystified - 10 - Release management-1
SRE Demystified - 10 - Release management-1Dr Ganesh Iyer
 
SRE Demystified - 09 - Simplicity
SRE Demystified - 09 - SimplicitySRE Demystified - 09 - Simplicity
SRE Demystified - 09 - SimplicityDr Ganesh Iyer
 
SRE Demystified - 07 - Practical Alerting
SRE Demystified - 07 - Practical AlertingSRE Demystified - 07 - Practical Alerting
SRE Demystified - 07 - Practical AlertingDr Ganesh Iyer
 
SRE Demystified - 06 - Distributed Monitoring
SRE Demystified - 06 - Distributed MonitoringSRE Demystified - 06 - Distributed Monitoring
SRE Demystified - 06 - Distributed MonitoringDr Ganesh Iyer
 
SRE Demystified - 05 - Toil Elimination
SRE Demystified - 05 - Toil EliminationSRE Demystified - 05 - Toil Elimination
SRE Demystified - 05 - Toil EliminationDr Ganesh Iyer
 
SRE Demystified - 04 - Engagement Model
SRE Demystified - 04 - Engagement ModelSRE Demystified - 04 - Engagement Model
SRE Demystified - 04 - Engagement ModelDr Ganesh Iyer
 
SRE Demystified - 03 - Choosing SLIs and SLOs
SRE Demystified - 03 - Choosing SLIs and SLOsSRE Demystified - 03 - Choosing SLIs and SLOs
SRE Demystified - 03 - Choosing SLIs and SLOsDr Ganesh Iyer
 
Machine Learning for Statisticians - Introduction
Machine Learning for Statisticians - IntroductionMachine Learning for Statisticians - Introduction
Machine Learning for Statisticians - IntroductionDr Ganesh Iyer
 
Making Decisions - A Game Theoretic approach
Making Decisions - A Game Theoretic approachMaking Decisions - A Game Theoretic approach
Making Decisions - A Game Theoretic approachDr Ganesh Iyer
 
Game Theory and Engineering Applications
Game Theory and Engineering ApplicationsGame Theory and Engineering Applications
Game Theory and Engineering ApplicationsDr Ganesh Iyer
 
Machine Learning and its Applications
Machine Learning and its ApplicationsMachine Learning and its Applications
Machine Learning and its ApplicationsDr Ganesh Iyer
 
How to become a successful entrepreneur
How to become a successful entrepreneurHow to become a successful entrepreneur
How to become a successful entrepreneurDr Ganesh Iyer
 
Dockers and kubernetes
Dockers and kubernetesDockers and kubernetes
Dockers and kubernetesDr Ganesh Iyer
 

Mehr von Dr Ganesh Iyer (20)

SRE Demystified - 16 - NALSD - Non-Abstract Large System Design
SRE Demystified - 16 - NALSD - Non-Abstract Large System DesignSRE Demystified - 16 - NALSD - Non-Abstract Large System Design
SRE Demystified - 16 - NALSD - Non-Abstract Large System Design
 
SRE Demystified - 14 - SRE Practices overview
SRE Demystified - 14 - SRE Practices overviewSRE Demystified - 14 - SRE Practices overview
SRE Demystified - 14 - SRE Practices overview
 
SRE Demystified - 13 - Docs that matter -2
SRE Demystified - 13 - Docs that matter -2SRE Demystified - 13 - Docs that matter -2
SRE Demystified - 13 - Docs that matter -2
 
SRE Demystified - 12 - Docs that matter -1
SRE Demystified - 12 - Docs that matter -1 SRE Demystified - 12 - Docs that matter -1
SRE Demystified - 12 - Docs that matter -1
 
SRE Demystified - 01 - SLO SLI and SLA
SRE Demystified - 01 - SLO SLI and SLASRE Demystified - 01 - SLO SLI and SLA
SRE Demystified - 01 - SLO SLI and SLA
 
SRE Demystified - 11 - Release management-2
SRE Demystified - 11 - Release management-2SRE Demystified - 11 - Release management-2
SRE Demystified - 11 - Release management-2
 
SRE Demystified - 10 - Release management-1
SRE Demystified - 10 - Release management-1SRE Demystified - 10 - Release management-1
SRE Demystified - 10 - Release management-1
 
SRE Demystified - 09 - Simplicity
SRE Demystified - 09 - SimplicitySRE Demystified - 09 - Simplicity
SRE Demystified - 09 - Simplicity
 
SRE Demystified - 07 - Practical Alerting
SRE Demystified - 07 - Practical AlertingSRE Demystified - 07 - Practical Alerting
SRE Demystified - 07 - Practical Alerting
 
SRE Demystified - 06 - Distributed Monitoring
SRE Demystified - 06 - Distributed MonitoringSRE Demystified - 06 - Distributed Monitoring
SRE Demystified - 06 - Distributed Monitoring
 
SRE Demystified - 05 - Toil Elimination
SRE Demystified - 05 - Toil EliminationSRE Demystified - 05 - Toil Elimination
SRE Demystified - 05 - Toil Elimination
 
SRE Demystified - 04 - Engagement Model
SRE Demystified - 04 - Engagement ModelSRE Demystified - 04 - Engagement Model
SRE Demystified - 04 - Engagement Model
 
SRE Demystified - 03 - Choosing SLIs and SLOs
SRE Demystified - 03 - Choosing SLIs and SLOsSRE Demystified - 03 - Choosing SLIs and SLOs
SRE Demystified - 03 - Choosing SLIs and SLOs
 
Machine Learning for Statisticians - Introduction
Machine Learning for Statisticians - IntroductionMachine Learning for Statisticians - Introduction
Machine Learning for Statisticians - Introduction
 
Making Decisions - A Game Theoretic approach
Making Decisions - A Game Theoretic approachMaking Decisions - A Game Theoretic approach
Making Decisions - A Game Theoretic approach
 
Cloud and Industry4.0
Cloud and Industry4.0Cloud and Industry4.0
Cloud and Industry4.0
 
Game Theory and Engineering Applications
Game Theory and Engineering ApplicationsGame Theory and Engineering Applications
Game Theory and Engineering Applications
 
Machine Learning and its Applications
Machine Learning and its ApplicationsMachine Learning and its Applications
Machine Learning and its Applications
 
How to become a successful entrepreneur
How to become a successful entrepreneurHow to become a successful entrepreneur
How to become a successful entrepreneur
 
Dockers and kubernetes
Dockers and kubernetesDockers and kubernetes
Dockers and kubernetes
 

Kürzlich hochgeladen

Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 

Kürzlich hochgeladen (20)

Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 

Trends in IoT 2017

  • 1. Top trends in IoT in 2017 Dr Ganesh Neelakanta Iyer Technical Support Manager, Core Products – Asia Pacific Progress Software, India
  • 2. © 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.2  Tech Support Manager at Progress, Hyderabad, India  Masters & Ph.D. from National University of Singapore  Interests: Kathakali, Traveling, Photography, Cooking  http://ganeshniyer.com GANESHNIYER About Me
  • 3. © 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.3 Agenda  Introduction  Top trends • Blockchain • DDOS attacks • Security • Cognitive Computing • Containers and Microservices  Summary
  • 4. © 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.4 What is IoT? a • The Internet of Things (IoT) is the network of physical objects that contain embedded technology to communicate and sense or interact with their internal states or the external environment a • As objects become embedded with sensors and gain the ability to communicate, the new information networks promise to create new business models, improve business processes, and reduce costs and risks.
  • 5. © 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.5 The evolution  People to people  People to things  Things to things
  • 10. Samsung’s $5,000 IoT Connected Smart Fridge Orders Groceries, Takes Selfies http://www.cepro.com/photo/samsungs_5000_iot_connected_smart_fridge_orders_groceries_takes_selfies c
  • 14. 1. IoT and Blockchain will converge
  • 16. © 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.16 What is Blockchain?  Blockchain is a shared single version of the truth of anything digital  It is a database technology, a distributed ledger that maintains and ever growing list of data records, which are decentralised and impossible to tamper with  The data records, which can be a Bitcoin transaction or a smart contract or anything else for that matter, are combined in so-called blocks  In order to add these blocks to the distributed ledger, the data needs to be validated by 51% of all the computers within the network that have access to the Blockchain https://datafloq.com/read/what-is-the-blockchain-and-why-is-it-so-important/2270?utm=internal
  • 19. © 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.19 Blockchain and IoT will converge  Blockchain technology is considered by many experts as the missing link to settle scalability, privacy, and reliability concerns in the Internet of Things  Blockchain technology can be used in tracking billions of connected devices, enable the processing of transactions and coordination between devices; allow for significant savings to IoT industry manufacturers  This decentralized approach would eliminate single points of failure, creating a more resilient ecosystem for devices to run on  The cryptographic algorithms used by Blockchain would make consumer data more private  In 2017 IoT will converge with Blockchain for better security and privacy opening the door for a new category in applications, hardware, and talents. https://datafloq.com/read/7-trends-of-internet-of-things-in-2017/2530
  • 20. © 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.20 Leveraging Blockchain in three key ways Build Trust Reduce Cost Accelerate Transactions https://cdn1.iconfinder.com/data/icons/basic-ui-rounded/512/ui-41-256.png https://cdn3.iconfinder.com/data/icons/basic-mobile-part-2/512/payment-512.png https://cdn1.iconfinder.com/data/icons/finance-solid-icons-vol-1/48/039-512.png
  • 21. © 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.21 Leveraging Blockchain in three key ways • Blockchain can help build trust between the people and parties that transact together. While Person A may not know device B and may not trust it implicitly, the indelible record of transactions and data from devices stored on the blockchain provide proof and command the necessary trust for businesses and people to cooperate. Build Trust • IoT and blockchain can enable participants to reduce monetary and time commitment costs by ultimately removing the “middle man” from the process. Transactions and device data are now exhibited on a peer to peer basis, removing most legal or contractual costs. Reduced Cost • IoT and blockchain enables more transactions overall because the “middle man” is removed from the process. Smart contracts allow for organizations to reduce time needed for completing legal or contractual commitments. Accelerated transactions https://www.ibm.com/blogs/internet-of-things/iot-2017-trends/ c
  • 22. 2. IoT Devices and More DDoS Attacks
  • 24. © 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.24 DDOS attacks  Forrester thinks that the 2016 DDoS attack that hit a whopping 1600 websites in the United States was just the tip of the iceberg when it comes to the threat that the connected device poses to the world  That attack confirmed the fear of vulnerability of IoT devices with a massive distributed denial of service attack that crippled the servers of services like Twitter, NetFlix , NYTimes, and PayPal across the U.S. on October 21st , 2016  It’s the result of an immense assault that involved millions of Internet addresses and malicious software, according to #Dyn, the prime victim of that attack. "One source of the traffic for the attacks was devices infected by the Mirai botnet".  All indications suggest that countless Internet of Things (IoT) devices that power everyday technology like closed-circuit cameras and smart-home devices were hijacked by the malware, and used against the servers. https://datafloq.com/read/what-is-the-blockchain-and-why-is-it-so-important/2270?utm=internal
  • 26. © 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.26 Security  As we rely on connected devices to make our lives better and easier, security must be considered from every aspect  All participants in the IoT ecosystem have a responsibility for the security of the devices, data and solutions  This means that device manufacturers, application developers, consumers, operators, integrators and enterprise businesses all have their part to play to follow best practices  IoT security requires a multi-layered approach • From a device point of view it should be considered at the blueprint level that starts with design and development and keeps hardware, firmware/software, and data secure through their entire life • The same approach applies if you are a security analyst or operations personnel responsible for IoT solutions. https://www.ibm.com/blogs/internet-of-things/iot-2017-trends/ c
  • 29. © 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.29 Cognitive IoT  Beyond traditional IoT implementations, cognitive computing is increasing the amount of data to improve the learning environment and increase the possibilities of what can be done with edge analytics  Making sensors capable of diagnosing and adapting to their environment without the need for human intervention  Another huge advantage of cognitive IoT is the ability to combine multiple data streams that can identify patterns and give much more context than would be otherwise available https://www.ibm.com/blogs/internet-of-things/iot-2017-trends/ https://static.wixstatic.com/media/983155_e05dc2f69b9b42b5ade0c8158de8d712~mv2.jpg
  • 30. © 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.30 Cognitive computing  Cognitive IoT, AI and machine learning are further enabling enterprises to unlock IoT value  An exploding amount of IoT data requires a new approach to gather, analyze and makes sense out of all that data  Such a massive amount of information from sensors and devices can be used to enhance existing data and knowledge, uncovering insights capable of transforming industries  But although making sense out of dark data and edge data is paving our way to revolutionary ideas and technologies, it requires a cognitive approach that can effectively handle increasingly large inputs while generating meaningful output  Cognitive systems learn from interactions with people and from experiences with their environment  In doing so, they become able to keep pace with the complexity of the Internet of things, identifying data correlations that would otherwise go unnoticed https://www.ibm.com/blogs/internet-of-things/iot-2017-trends/
  • 31. © 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.31  DataRPM delivers industry's only Cognitive Predictive Maintenance (CPdM) Platform for Industrial IoT  DataRPM uses patent pending Meta-Learning technology, integral component of Artificial Intelligence to automate predictions of asset failures  CPdM is a full stack platform available on cloud or on premises that connects to the data lake and then automatically runs multiple Machine Learning experiments, finds patterns & anomalies in data, identifies influencing factors & predictors, and builds an ensemble of predictive models to automate Predictive Maintenance  Not only does CPdM platform delivers descriptive, predictive, prescriptive analytics through Natural Language Discovery module but also provides a closed loop system by integrating these actionable insights through APIs to ERP, CRM, and CMS systems.
  • 33. 5. IoT, Containers and Microservices
  • 36. © 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.36 IoT and Microservices 1. Low Cost - The beauty of going with the simpler hardware is that you can rely on microservices to add value and fill functional gaps. You can also gradually roll out the network and continue to upgrade and maintain it in a cost-effective manner as individual components get replaced. 2. Faster Innovation - A microservices development approach allows you to unlock innovation (and thus value) faster by making it easy to test new combinations of “things” and “services.” No need to build an entire technology stack or invest in big infrastructure over many months. With microservices, you can tinker and test to your heart’s content and quickly reap the benefits of innovative solutions to your problems. http://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/Five-things-to-know-about-the-future-of-microservices-and-IoT
  • 37. © 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.37 IoT and Microservices 3. Isolated Risk - Assembling your solution via microservices allows you to adjust and iterate quickly, thus avoiding the danger of missing the mark. 4. Flexibility and Agility - Assembling your solution via microservices allows you to adjust and iterate quickly, thus avoiding the danger of missing the mark. 5. Unlimited value-add - The device you deploy is never going to transcend its physical capabilities until you upgrade or replace its physical components. The digital upgrades you can provide via constantly evolving microservices, however, are unlimited both in their scope and their frequency. A camera may be designed to only capture 2D images, but depending on the third-party service it’s linked to, it might provide you with statistical traffic information, queue sizes or weather information. http://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/Five-things-to-know-about-the-future-of-microservices-and-IoT
  • 38. © 2016 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved.38 Summary Blockchain DDOS Attacks Security Cognitive Computing Containers and Microservices