Skip to main content

The Internet of Things is not a concept; it is a network, the true technology-enabled Network of all network . We need to get smarter about hardware and software innovation in order to get the most value from the emerging Internet of Things.

 INTERNET OF THINGS
      Embedded System:-
Definition:-
• An Embedded System is one that has computer hardware with software embedded in it as one of its important components.
• An embedded system is a special-purpose computer system designed to perform one or a few dedicated / Specific functions
• It is a system whose principle function is not computational, but which is controlled by a computer embedded within it
• An embedded system is any device that includes a programmable computer but is not itself a general-purpose computer.
• An application specific electronic sub-system which is completely  encapsulated by the main system it belongs to.
 Components of Embedded System:-
• CPU (Microcontroller)
• Software (Embedded software)
• Memory (RAM , ROM)
• FPGA / ASIC
• Sensors (Temperature , pressure etc)
• Actuators(Relays , Drivers etc)
• ADC and DAC
• User interface
• Backup and Safety
• External Environment
                       Internet oThings:-


Definition:-
1. The Internet of Things, also called The Internet of Objects, refers to a wireless network between objects, usually the network will be wireless and self-configuring, such as household appliances.
2. By embedding short-range mobile transceivers into a wide array of additional gadgets and everyday items , enabling new forms of communication between people and things, and between things themselves.

                                         
              Internet of Things:-
Physical Object + Controller, Sensor, Actuators + Internet=Internet of Things
              Internet of Things:-
  •  The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronicssoftwaresensors, and network connectivity, which enables these objects to collect and exchange data.
  •  IoT allows objects to be sensed and controlled remotely across existing network infrastructure, creating opportunities for more direct integration between the physical world and computer-based systems, and resulting inimproved efficiency, accuracy and economic benefit.
  • "Things," in the IoT sense, can refer to a wide variety of devices such as heart monitoring implantsbiochip transponders on farm animals, electric clams in coastal waters, automobiles with built-in sensorsDNA analysis devices for environmental/food/pathogen monitoring or field operation devices that assist fire-fighters in search and rescue operations.
  • These devices collect useful data with the help of various existing technologies and then autonomously flow the data between other devices.
           Internet of Things:-
Various Name , One Concept
§ M2M (Machine to Machine)
§ “Internet of Everything” (Cisco Systems)
§ “World Size Web” (Bruce Schneier)
§ “Skynet” (Terminator movie)
         Components of IoT:-
Smart Systems and Internet of Things are driven by a combination of :
§ Sensors
§ Connectivity
§ People and Process
                                             
              Internet of Things:-
From any time ,any place connectivity for anyone, we will now have connectivity for anything!
             Application of Internet of Things:-
·         Factory Digitalization.
·         Product flow Monitoring.
·         Inventory Management.
·         Safety and Security.
·         Quality Control.
·         Packaging optimization.
·         Logistics and Supply Chain Optimization.

IoT Applications in different industries:-
Airline – An equipment tracking app provides an airline’s engineers with a live view of the locations of each piece of maintenance equipment. By increasing the efficiency of engineers, this IoT application is not only generating significant cost savings and process improvements, but also impacting the customer experience in the end through more reliable, on-time flights.

Pharmaceutical – A medication temperature monitoring app uses sensors to detect if the medication’s temperature has gone outside of the acceptable range and ensures medical supplies still meet quality standards upon delivery. The handling temperatures are medications, vaccines for examples, is critical to their effectiveness.  IoT based smart applications can be used to not monitor that medications are kept within the proper handling temperature range, but also to remind patients when it is time to take their medication.

Manufacturing – A lighting manufacturer for the horticultural industry built a Smart App that leverages IoT sensors and predictive analytics to perform predictive maintenance and optimize lighting, power consumption and plant photosynthesis. The IoT application transformed their business from a lighting systems manufacturer to a greenhouse optimization as-a-service business.

Business Services – A facility services company uses their multi-device IoT software to enable support personnel to receive alerts about service issues and take immediate action. By aggregating data from thousands of sensors in devices like coffee machines, soap dispensers, paper towel dispensers and mouse traps rather than doing manual checks, the application has significantly cut costs and improved service levels.

Comments

Popular posts from this blog

Difference Between a Penetration Test and Vulnerability Assessment - Part 2

  The Difference Between a Penetration Test and Vulnerability Assessment - Part 2 What is the Difference Between a Penetration Test and Vulnerability Assessment? Part 2 of 2 Comparing Penetration Tests and Vulnerability Assessments In part 1 of this post, we focused on the Vulnerability Scans, Vulnerability Assessments, and  Vulnerability Management  in order to differentiate the 3 prior to digging into Penetration Tests. Now, let’s introduce and define Penetration Tests, explain the test itself and goals, then go through the different types of Penetration Tests. What is a Penetration Test? A  Penetration test , or pen test, is the process an ethical hacker conducts on a target and the IT environment to uncover vulnerabilities by exploiting them. The goal is to gain unauthorized access through exploitation which can be used to emulate the intent of a malicious hacker. Penetration test reports may also assess potential impacts on the organization and suggest countermeasures to reduce ri

Top 10 In-Demand programming languages to learn in 2022.

This blog will focus on some of the most in-demand programming languages which will be dominant this year, 2022. For almost every subject's like Web Development, Artificial Intelligence, Machine Learning, Data Science, or any other, the most important prerequisite is the ability to program in programming languages. Before choosing a programming language, beginners should carefully consider many factors, including popularity, demand, career opportunities, and applications. JavaScript JavaScript is one the most well-known programming languages, with strong demand and a strong following. JavaScript is used by many well-known IT companies such as Uber, Google, Microsoft, Uber, and Microsoft. Although the language is best known for its ability to add responsive elements to web pages, there are many other uses. The language can be used for both front-end as well as back-end development. Developers find it attractive because of its interoperability with well-known frameworks like Vu

Difference Between a Penetration Test and Vulnerability Assessment - Part 1

  The Difference Between a Penetration Test and Vulnerability Assessment - Part 1 What is the Difference Between a Penetration Test and Vulnerability Assessment? Part 1 of 2 Comparing Penetration Tests and Vulnerability Assessments The staff here at SecureOps is consistently asked the purpose and the differences between vulnerability scans, vulnerability assessments and penetration tests – including all the variations of both such as red teaming, capture the flag exercises, bug bounty programs and more. Our goal in this blog post is to work from a high level and explain the general differences between identifying vulnerabilities to a more detailed level and ultimately walk through what the services are from an execution perspective and what benefits they offer an organization in terms of improving security. Let’s start with answering the broad question first and dig deeper from the explanation that we use here at SecureOps. Vulnerability scans search systems for known vulnerabilities u