Please enable JavaScript.
Coggle requires JavaScript to display documents.
IoT - Coggle Diagram
IoT
Big Data
Characteristics that indicate that an organization can deal with big data:
A large amount of data that increasingly requires more memory (Volume).
Growing at a rapid pace (Speed).
Created in different formats (Diversity).
Large data sets
Companies do not necessarily have to create their own Big Data.
There are sources of free datasets ready for use and analysis.
Examples of data collected by sensors:
Sensors in a single autonomous car can generate 4000 gigabits (Gb) of data per day.
Sensors in a single smart home can produce up to 1 gigabyte (Gb) of data per week.
What are the challenges of big data?
According to IBM's Big Data, "every day we create 2.5 quintillion bytes of data."
The main problems with storing Big Data:
Security.
Surplus
Analytics
Access
Management
Clouds and Cloud Computing
Cloud services for individuals include:
Store data such as photos, music, movies, and emails.
Access to many applications instead of downloading them to a local device
Access your data and apps anywhere, anytime, from any device
Cloud services for enterprises include:
Access to organizational data anywhere and anytime
Improving the organization's IT operations.
This eliminates or reduces the need for engineering equipment, maintenance, and management.
This reduces the cost of equipment, energy, physical requirements for plants, and staff training needs.
Distributed computing
Distributed data processing takes a large amount of data and breaks it down into smaller parts.
These smaller amounts of data are distributed to many locations to be processed by many computers.
Each computer in a distributed architecture analyzes its own part of Big Data (horizontal scaling).
Hadoop was created to work with volumes of Big Data. It has two main characteristics that have made it an industry standard:
Scalability - Larger cluster sizes increase performance and provide higher data processing capabilities.
Fault tolerance - Hadoop automatically recreates data across clusters.
Supporting business with big data
Data analytics allows businesses to better understand the impact of their products and services, adjust their methods and goals, and provide their customers with better quality products faster.
The benefits come from two main types of data processing, transactional and analytical.
Transactional information is captured and processed when events occur. It is used to analyze daily sales reports and production schedules to determine how much inventory to plan for.
Analytical information supports management process analysis tasks, such as determining whether an organization should build a new production facility or hire additional sales staff.
Sources of information
The data comes from the sensors and everything that has been scanned, entered, and released to the Internet.
The collected data can be classified as structured or unstructured
Structured data is created by programs that use a "fixed" input format, such as spreadsheets. You may need to use formats such as CSV for structured data.
Unstructured data is generated in a "freeform" style, such as audio, video, web pages, and tweets. Examples of tools for preparing unstructured data for processing:
Web scraping tools automatically extract data from HTML pages.
RESTful application programming interfaces (APIs).
Data visualization
Data mining is the process of transforming raw data into meaningful information.
The data obtained should be analyzed and presented to managers and decision makers.
Determining the best visualization tools depends on the following:
Number of variables
The amount of data in each variable
Is there data representing a timeline
Comparisons are needed
Popular charts include
line
column
histograms
pie charts
spread
Analyzing big data for effective business use
Аналіз даних - це процес перевірки, очищення, перетворення та моделювання даних для виявлення корисної інформації.
Having a strategy helps a business determine the type of analysis required and the best tool for analysis.
The tools and programs range from using an Excel spreadsheet or Google Analytics for small to medium-sized data samples to programs designed to manipulate and analyze truly large data sets. For example:
Knime
OpenRefine
Orange
RapidMiner
Intent-based networks
The IT industry is creating a systematic approach to managing business intent management (IBN) infrastructure.
The business network must ensure the seamless and secure integration of IoT devices, cloud services, and remote offices.
The network needs to make these new digital initiatives secure with ever-changing dangers.
The network must be reactive enough to quickly adapt to changes in security policies and procedures, business services and applications, and operational policies.
An intent-based network leverages the power of automation, AI, and ML to control the function of the network to achieve a specific goal or intent.
The network is able to translate intent into policy and then use automation to deploy the appropriate configurations needed across the network.
The set of network models consists of three key elements:
The guarantee is a complete check of online behavior.
Translation is the ability to apply business intent to network configuration.
Activation - occurs after the intentions are set and policies are created.
Artificial Intelligence (AI) and Machine Learning (ML)
Voice recognition - used by digital assistants.
Shopping recommendation - Systems create a customer profile and recommend products or services based on previous patterns.
Shape recognition - There are programs that allow you to convert raw graphs and notes into more formal diagrams and text.
Credit card fraud detection - A profile is built about the customer's buying patterns.
Face recognition
Basic programming concepts
Flowcharts
Diagrams used to visually display workflows.
They illustrate how the process works.
all input data, actions performed on the basis of this data, and the result of the work should be displayed.
Basic structures in programming
IF - THEN allows the computer to make decisions based on the result of an expression.
FOR Loops executes a certain set of instructions a certain number of times based on an expression.
WHILE Loops execute a specific set of instructions as long as the expression is true.
System software, application software and computer languages
There are two types of computer software: system software and application software.
Application software is created to solve a specific task or group of tasks.
System software works between the computer hardware and application programs.
Both system software and application software are created using programming languages.
Python is an example of an interrogative programming language.
What is Blockly
A visual programming tool designed to help beginners understand the concept of programming. Allows the user to create a program without entering any lines of code.
Assigns different programming structures to colored blocks containing slots and spaces to allow programmers to enter values. Programmers can connect structures together by dragging and dropping the appropriate blocks.
Specific blocks represent functions. Select and drag the function blocks onto the workspace and fill in the necessary slots.
Challenges and opportunities in the digital world
Become an informed consumer
Technological advances, together with the latest advances in automation and artificial intelligence, have created a world of abundance.
Digitization today affects every aspect of our daily lives and continues to provide new opportunities for professionals.
IoT provides an immeasurably large amount of information that is easily accessible for consumption.
IoT also frees people from the difficulties of routine and repetitive tasks, such as restocking shelves and fulfilling orders.
Labor market development
These jobs reflect skills spanning multiple disciplines that include computer science, computing, and software development in the following areas:
Artificial intelligence
Application development
IoT application developer
IoT security specialist
Collaboration
Corporate networks
Data centers and virtualization
Traditional jobs are being replaced by robots designed to embrace this new world and all that it offers.
There are broad categories that summarize the work opportunities that exist in the rapidly evolving digital world:
Enablers - these jobs develop and implement core technologies.
Engagers - These jobs design, build, integrate, and deliver IoT services to customers.
Enhancers - These jobs develop their own value-added services, in addition to those provided by Engagers, that are unique to the IoT.
We need entrepreneurs!
A new type of IT specialist is needed! Individuals with the knowledge and skills to develop new IoT-enabled products and process the data collected.
An entrepreneurial workforce specializing in both information technology and software or computer engineering is needed.
People need to collaborate and learn from each other to understand the things, networks, and methodologies that harness the limitless potential of the IoT.
Lifelong learning
With the ever-changing landscape of the digital world, we must stay relevant to realize the full potential of what IoT has to offer.
The labor market will continue to offer more opportunities as new technologies develop.
The skills needed to perform these tasks will evolve simultaneously, creating a need for lifelong learning.
Globally connected through networks
The Network is the Foundation
Fifty billion things generate trillions of gigabytes of data
The network is the backbone of the Internet and the digitized world.
Networks vary from simple networks consisting of two computers to networks connecting millions of devices.
Networks can provide products and services to customers via the Internet.
The Internet is the largest network and provides the "electronic skin" that surrounds the planet.
Types of networks
Local Area Network (LAN) - Networks in a small area, such as a home or small business.
Wide Area Networks (WANs) - A group of local area networks that provides connectivity to a local network and the Internet.
The Internet is a multi-layered global network system that connects hundreds of millions of computers.
Wireless networks - Use electromagnetic waves to transmit signals over a network.
Cloud - Data centers or groups of connected servers are used to store and analyze data, provide access to online applications, and provide backup services.
Edge - The physical "edge" of the corporate network
Fog computing - Data from IoT devices can be pre-processed for immediate use in the fog located at the edge of the network.
Personal Area Network (PAN) - Connecting your smartphone to your car via Bluetooth is an example of a PAN.
Programming in Python
Philosophy of language:
Beautiful is better than ugly
Explicit is better than implicit
Simple is better than complex
Complex is better than confusing
Maximum readability
Variables and basic constructs in Python
The interpreter accepts and executes operations interactively.
It acts as a simple calculator.
The special variable "_" contains the result of the last expression.
Attempts to use an undefined variable will result in an error.
Use the = sign to assign values to variables.
The Print function prints the result of the expression.
The functions allow you to name a block of code and reuse it whenever you need to.
The Print function prints the result of the expression.
use the backslash character () to use control characters. As an example, the string uses double quotes, but must contain double quotes in the middle of the string.
Одинарні лапки або подвійні лапки можуть бути використані для представлення рядків.
Single quotes or double quotes can be used to represent strings.
Useful functions and data types in Python
Range() - Creates a list of numbers that are commonly used for use in a FOR loop.
range(stop) - the number of integers to generate, starting from zero
range(start, stop, step) - The start number of the sequence, the end number in the sequence, and the difference between each number in the sequence.
Tuples are sequences separated by brackets.
Lists - a sequence of variable Python objects created by entering different values separated by commas between square brackets
Sets are unordered collections of unique elements. Typical uses include testing membership, removing duplicates from a sequence, and computing standard mathematical operations on sets such as intersection, union, difference, and mathematical symmetry.
A dictionary is a comma-separated list of items.
Each element of which is a combination of a value and a unique key.
Each key is separated from the value by a colon.
Dictionary items can be accessed, modified, or deleted.
Prototyping your idea
Physical materials
A good place to start is, of course, the Internet. People who have never met in the real world can now work together.
Maker Media is a global platform for makers to collaborate, share projects and ideas.
The Making Society has a good section on plastic and clay modeling.
LEGO Mindstorms has a large community of participants and fans.
Meccano or Erector Set is a model building system consisting of reusable metal parts, strips, plates, beams, wheels, axles, gears, and bolts and nuts. This allows you to create working prototypes and mechanical devices.
3D printing is the process of creating a physical object based on a virtual 3D model.
Electronic tools
Arduino is an open-source computing platform based on a microcontroller and a software development environment that can be downloaded to the microcontroller. You can develop smart things that receive data from various switches and sensors to control lights, motors, or other physical objects.
The Raspberry Pi is a low-cost, credit-card-sized computer that plugs into a computer monitor or TV. You can work on it with a standard keyboard and mouse. It is capable of doing everything a computer can do, from surfing the Internet and watching high-definition videos to processing spreadsheets, word processing, and running games.
The Beaglebone is very similar to the Raspberry Pi in terms of size, power requirements, and applications. The Beaglebone has more processing power than the Raspberry Pi; therefore, it is a better choice for applications with higher data processing requirements.
Programming resources
MIT OpenCourseWare (OCW) is an online publication of almost all MIT course materials. Open and accessible worldwide, OCW is a great place to learn about programming for free.
Khan Academy is a non-profit educational website established in 2006 to provide "free world-class education to anyone, anywhere".
Code Academy is another great resource. It relies on interactivity to help people learn programming.
Security in the digital world
Who wants our data?
"The Good Guys"
Legitimate companies that have an agreement to use the data you collect.
We agree to this in the "General Terms and Conditions" or "Terms of Service and Agreements"
White-hat hackers who perform security checks to protect data.
"Bad Boys"
Other hackers, called black hat hackers, want to access the collected data for many unacceptable reasons:
Access to user IDs and passwords to steal identities.
Access to data for committing a crime.
Sell information to third parties.
Change data or disable device functionality.
Destroy or damage the image of a legitimate company.
Create political unrest or make a political statement.
Data in the wrong hands
Login details and other personal information for more than one million Yahoo and Gmail accounts are reportedly being offered for sale on the dark web.
Cybercriminals infiltrated Equifax (EFX), one of the largest credit bureaus, in July 2017 and stole the personal data of 145 million people
The MyFitnessPal breach affected 150 million users.
Ransomware attackers stole 57 million personal data of Uber drivers and passengers.
Protecting the corporate world
Physical security
External perimeter security - on-site security service, fences, gates, continuous video surveillance and security alarms.
Internal perimeter security - continuous video surveillance, electronic motion detectors, security traps, biometric access and exit sensors.
Challenges in securing IoT devices
Increasing number of devices - The number of interconnected sensors and smart devices is growing exponentially, increasing the opportunity for attacks.
Unconventional device placement - Some connected IoT devices are able to interact with the physical world.
Lack of upgradeability - IoT-enabled devices may be located in remote and/or inaccessible locations where human intervention or configuration is virtually impossible.
Protect your devices
Keep your firewall enabled
Control your operating system and browser
Protect all your devices
Use antivirus and anti-spyware software
Protection of personal data and devices
Smart home
Smart sensors in our homes increase the potential for security issues.
Sensors can provide hackers with the ability to enter our home network and access any PCs and data that are connected to it.
Before purchasing home security systems, it is very important to check the developer, security and encryption protocols used for these products.
Public access points
Safety rules to follow when using a public or unsecured Wi-Fi access point:
Do not access or send sensitive personal information
Check whether your computer is set up for file sharing and whether it requires user authentication and encryption.
Use tunnels and encrypted virtual private network (VPN) services.
Unfortunately, Bluetooth can be used by hackers to tap devices, remotely control access, spread malware, and drain batteries.
Turn off Bluetooth when not in use
Digital business transformation
Can smart devices think?
If programmed accordingly,
smart devices can evaluate
the data they are given and change processes
or settings on the fly.
If they are provided with sufficient
amount of data, they can "learn" and
modify their own code based on
new parameters.
"Smart cities use sensors to manage many of their infrastructure systems, such as traffic flow, parking, water supply, and hydroelectric power.
Self-driving cars are equipped with many ultrasonic sensors, cameras, GPS accuracy
Devices that connect to IoT
How are the Internet devices connected to the network?
The sensor must be connected to a network so that the collected data can be stored and shared.
The controllers are responsible for collecting data from the sensors and providing a network or Internet connection.
Controllers make quick decisions or send data to a more powerful computer for analysis.
Sensors often work together with an actuator.
Actuators receive electric current and convert it into a physical action.