IOT CATEGORIES
MOST POPULAR TAGS

Videos


In the data science of IoT there’s no one size fits all data model. Each situation needs to be analysed separately by your data scientist. Then the output too, needs to be custom tailored to your customer - internal or external. This output, often in the form of a dashboard, is critical in aiding the identification of value with your data. Therefore, iterate on its design as often as you do on the design of the IoT product.
Watch this video (or read the transcript) to see Christian Mastrodonato discuss standing up an Internet of Things Pilot from a Data Scientist’s perspective ...


If implementing IoT within your organization it makes sense to target improving operational efficiency; it’s easier for the bean counters to sign off on than some esoteric new IoT business opportunity. This, as I’ve discussed before, is the thin edge of the IoT wedge for getting a pilot started. Next - what OPEX should you go after? Find a metric that everyone in the company or business unit or department, understands and lives by and then apply IoT there first. If people have a stake in it they will be more willing to change, readjust processes and help make the project successful. Rather than making it a top-down edict, power the IoT project from the bottom-up.
Watch this video (or read the transcript) to see Nauman Sheikh share his strategic and hands-on experience on the steps and best way to introduce IoT analytics in any organization ...


Visualizing IoT big data is as much an art as it is a science. The palette is underlying algorithms and the exterior is color and texture mapping. Images aren’t static – they are interacted with in 3D or animated as a movie. The result is a science-based art form designed to convey information or present a story where the human mind can discover hidden value invisible to the algorithm. As a subset of descriptive analytics, it is another tool for the data scientist, subject matter expert or executive to extract value form the numbers coming from IoT sensors and data services.
Watch this video (or read the transcript) to see Barend Botha paint a picture of how to use data visualization to uncover hidden value in big Internet of Things data sets ...


Creating the local intelligence for an Internet of Things product requires special programming skills and knowhow to work within constrained environments. Environments possibly constrained by computing, networking, memory, power or all of the above. The effort to reduce manufacturing costs produces these constraints but sometimes the biggest costs are the ones you didn’t plan for.
Watch this video (or read the transcript) to see Peter Hoddie share his deep experience in programming constrained devices and the (business) issues to consider when planning development ...


The digital twin, as GE refers to it, or the software-defined product (SDP) as I teach it, is the critical component of incremental value generation in the Internet of Things. It’s always overlooked at the expense of the shiny things… and that’s a mistake. The digital twin or SDP is central to the IoT product/system/environment – interrogated by the product app and worked on and improved by analytics – it is the place to start when defining your IoT product requirements.
Watch this video (or read the transcript) to see Hima Mukkamala explain the importance of the digital twin and to put it into the perspective of the IoT platform ...


Is it in the billons or trillions? I can’t remember how many sensors there are supposed to be in 10 or is it 20 years. We get so many different predictions of the number of things in IoT it’s mind-numbing. Mind-numbing in that it’s hard to comprehend the size of the numbers being tossed around and mind-numbing because in trying to outdo each other, pundits count things differently.
Watch this video (or read the transcript) to see Dean Freeman go up and down and across the IoT food chain sizing the food chain along the way ...


Basic IT security principles may be old school but they are still relevant in the new realm of IoT security. Case in point, Paul’s top 3 of top 5 IoT security issues: Lack of security by design Web security Basic cryptography principles Management support Customer demand
Watch this video (or read the transcript) to see Paul Dant give an ethical hacker’s perspective on the top five issues in Internet of things security and what is easy and not so easy to improve ...


There’s a lot to developing wearables that doesn’t meet the eye. To build a wearable and the business that supports it you must recreate its creator. As with any IoT product, the skill sets needed, namely software development and data science, are more often than not, not part of the organization’s gene pool or culture. To become an IoT company each company must go through a deep tech metamorphosis to get there.
Watch this video (or read the transcript with Scott Amyx about wearables and the corporate transformation required to build, sell and support them ...


Because of where we are in the evolution of Internet of Things systems it’s not possible to simply bolt on a firewall or Intrusion Detection System. Unlike in IT, in IoT, security must be considered from the beginning as part of the product/system design. But it doesn’t mean we can’t apply some of the same techniques used by our IT brethren. Take for example network traffic analysis. It’s a hot IoT security trend that I’ve written about before but now it’s not just start-ups that are getting into the act - large companies like Symantec are planning to bring all their experience in security analytics to bear on the foes of IoT.
Watch this video (or read the transcript with Brian Witten about intrinsic security, security analytics and his four cornerstones of Internet of Things security ...


Most of what we read about IoT security and privacy is doom and gloom. I get it, playing on people’s fears is a proven way to get a click. Well there’s some good news too. Losing the typical UI for authentication and authorization can improve security. For example, machines don’t care if they must use 128-bit passwords. And since IoT devices are relatively simple, their traffic patterns are more predictable and therefore easier to examine for security breaches.
Watch this video (or read the transcript) to see May Wang describe the current state of security and how her start-up analyzes traffic patterns to make IoT safer ...