SlideShare a Scribd company logo
1 of 17
Download to read offline
SUBMITTED BY :
• Komal Kumari
• Dhrity Kachhwaha
•Beauty Roy
The term “Internet of Things” refers to all those objects or
devices of everyday life that are connected to the Internet
and that have some kind of intelligence.
HISTORY OF IOT
• The internet isn’t that old, so far as the world wide
web. In 1974, the TCIP/IP structure that we know
today had it’s birth. It was not until ten years later that
the first domain name system or DNS was introduced.
The first website actually came online in 1991. The
internet that he had proposed just a scant two years
earlier came crashing into our mainstream world. In
no time the internet took over. By 1995, multiple
websites and systems came online
• The concept of the internet of Things first became
popular in 1999, through the auto-ID centre at MIT
and related market analysis publications .
• 2008-2009: The Internet of Things was "Born“,
• According to Cisco Internet Business Solutions Group (IBSG), the Internet of Things was born in
between 2008 and 2009 at simply the point in time when more “things or objects” were connected to
the Internet than people.
• Citing the growth of smart phones, tablet PCs, etc the number of devices connected to the Internet
was brought to 12.5 billion in 2010 (Related: see Kevin Kelly's One Machine), while the world’s human
population increased to 6.8 billion, making the number of connected devices per person more than 1
(1.84 to be exact) for the first time in history.
• Devices and objects with built in sensors are connected to an Internet of
Things platform, which integrates data from the different devices and
applies analytics to share the most valuable information with
applications built to address specific needs.
• These powerful IoT platforms can pinpoint exactly what information is
useful and what can safely be ignored. This information can be used to
detect patterns, make recommendations, and detect possible problems
before they occur.
• For example, if I own a car manufacturing business, I might want to
know which optional components (leather seats or alloy wheels, for
example) are the most popular. Using Internet of Things technology, I
can:
• Use sensors to detect which areas in a showroom are the most popular,
and where customers linger longest;
• Drill down into the available sales data to identify which components are
selling fastest;
• Automatically align sales data with supply, so that popular items don’t
go out of stock.
• Now that we all understand the IoT concept, it would be
worthwhile to deep dive in order to get familiar with the
building blocks of IoT:
IOT
SENSORS
DATA
PROCESSING
USER
INTERFACE
CONNEVTIVITY
• Iot platform can help organisations to reduce cost
through improved process efficiency , assets
utilisations and productivity. With improved tracking
of devices/objects using sensors and connectivity,
they can benefit from realtime insights and analytics,
which would help them make smarter decisions. The
growth and convergence of data, processes and
things on the internet would make such connections
more relevant and important, creating more
opportunities for people, businesses and industries.
ECONOMIC ASPECTS OF IOT
IOT SECURITY
• IoT is transforming entire industries, creating
tremendous benefits but also introducing new risks.
• The security risks surrounding IoT software and
applications are snowballing as developers are
pressured to get devices either to the marketplace
or into use within an enterprise as soon as possible.
As billions of devices become connected to IoT,
security solutions enable their safe and reliable
operation.
• With over twenty years as a leader in software
security, we are uniquely positioned to adapt and
apply software Security best practices to your IoT
development initiative, or to help you assess your
risk exposure to IoT products within your business.
SOLUTION
4 steps to a successful IoT security
solution
Our goal is to help you deliver a sustainable IoT
security initiative that provides continuous and
comprehensive security risk identification and
mitigation. We do this by empowering you to:
1. Integrate security into every aspect of your
SDLC.
• 2. Educate your developers.
• 3. Implement penetration testing.
• 4. Perform threat modelling.
CONCLUSION
• Hence, today we learned how
IoT works and an entire IOT
system functions. Also, we
discussed some real-life
examples where we can use
IoT. We will be learning more
about IOT in detail in the
upcoming tutorials. Till stay
tuned to learn more
interesting things.
Furthermore, if you have any
query, feel free to ask in the
comment section.

More Related Content

What's hot

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
IoT
IoTIoT
IoT
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Impact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and ChallengesImpact of Cyber Crime Issues and Challenges
Impact of Cyber Crime Issues and Challenges
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet Of things (IoT) ppt
Internet Of things (IoT) pptInternet Of things (IoT) ppt
Internet Of things (IoT) ppt
 
Html images
Html imagesHtml images
Html images
 
Lab_Ex1.pptx
Lab_Ex1.pptxLab_Ex1.pptx
Lab_Ex1.pptx
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography
SteganographySteganography
Steganography
 
Working with JSON
Working with JSONWorking with JSON
Working with JSON
 
Java script
Java scriptJava script
Java script
 
Internet of Things Ecosystem
Internet of Things Ecosystem Internet of Things Ecosystem
Internet of Things Ecosystem
 
Iot
IotIot
Iot
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
what is Internet of things(iot) & how does it work
what is Internet of things(iot) & how does it workwhat is Internet of things(iot) & how does it work
what is Internet of things(iot) & how does it work
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
Big Data & Privacy
Big Data & PrivacyBig Data & Privacy
Big Data & Privacy
 

Similar to Iot ppt

George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design360mnbsu
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoTAhmed Banafa
 
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)Jackson Shaw
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017Ahmed Banafa
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoTAltoros
 
AI is the Catalyst of IoT
AI is the Catalyst of IoTAI is the Catalyst of IoT
AI is the Catalyst of IoTAhmed Banafa
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptxssuser2cc0d4
 
IT to IOT Evolution
IT to IOT EvolutionIT to IOT Evolution
IT to IOT EvolutionJayakumar PP
 
Iot-Internet-of-Things-how its work.pptx
Iot-Internet-of-Things-how its work.pptxIot-Internet-of-Things-how its work.pptx
Iot-Internet-of-Things-how its work.pptxPrincePatel272012
 
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...huong Tran thu
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaionMdShahinAlam25
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesAhmed Banafa
 
20140514 internet ofthings_feedhenry_opt
20140514 internet ofthings_feedhenry_opt20140514 internet ofthings_feedhenry_opt
20140514 internet ofthings_feedhenry_optMícheál Ó Foghlú
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
INTERNET OF THINGS (TEAM YMCA)
INTERNET OF THINGS (TEAM YMCA)INTERNET OF THINGS (TEAM YMCA)
INTERNET OF THINGS (TEAM YMCA)Abhishek kr. Singh
 

Similar to Iot ppt (20)

Internet of things
Internet of thingsInternet of things
Internet of things
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
 
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017
 
IoT
IoTIoT
IoT
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoT
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoT
 
AI is the Catalyst of IoT
AI is the Catalyst of IoTAI is the Catalyst of IoT
AI is the Catalyst of IoT
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx
 
IT to IOT Evolution
IT to IOT EvolutionIT to IOT Evolution
IT to IOT Evolution
 
Iot-Internet-of-Things-how its work.pptx
Iot-Internet-of-Things-how its work.pptxIot-Internet-of-Things-how its work.pptx
Iot-Internet-of-Things-how its work.pptx
 
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
 
IoT
IoTIoT
IoT
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
20140514 internet ofthings_feedhenry_opt
20140514 internet ofthings_feedhenry_opt20140514 internet ofthings_feedhenry_opt
20140514 internet ofthings_feedhenry_opt
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
INTERNET OF THINGS (TEAM YMCA)
INTERNET OF THINGS (TEAM YMCA)INTERNET OF THINGS (TEAM YMCA)
INTERNET OF THINGS (TEAM YMCA)
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Iot ppt

  • 1. SUBMITTED BY : • Komal Kumari • Dhrity Kachhwaha •Beauty Roy
  • 2.
  • 3. The term “Internet of Things” refers to all those objects or devices of everyday life that are connected to the Internet and that have some kind of intelligence.
  • 4. HISTORY OF IOT • The internet isn’t that old, so far as the world wide web. In 1974, the TCIP/IP structure that we know today had it’s birth. It was not until ten years later that the first domain name system or DNS was introduced. The first website actually came online in 1991. The internet that he had proposed just a scant two years earlier came crashing into our mainstream world. In no time the internet took over. By 1995, multiple websites and systems came online • The concept of the internet of Things first became popular in 1999, through the auto-ID centre at MIT and related market analysis publications . • 2008-2009: The Internet of Things was "Born“, • According to Cisco Internet Business Solutions Group (IBSG), the Internet of Things was born in between 2008 and 2009 at simply the point in time when more “things or objects” were connected to the Internet than people. • Citing the growth of smart phones, tablet PCs, etc the number of devices connected to the Internet was brought to 12.5 billion in 2010 (Related: see Kevin Kelly's One Machine), while the world’s human population increased to 6.8 billion, making the number of connected devices per person more than 1 (1.84 to be exact) for the first time in history.
  • 5. • Devices and objects with built in sensors are connected to an Internet of Things platform, which integrates data from the different devices and applies analytics to share the most valuable information with applications built to address specific needs. • These powerful IoT platforms can pinpoint exactly what information is useful and what can safely be ignored. This information can be used to detect patterns, make recommendations, and detect possible problems before they occur. • For example, if I own a car manufacturing business, I might want to know which optional components (leather seats or alloy wheels, for example) are the most popular. Using Internet of Things technology, I can: • Use sensors to detect which areas in a showroom are the most popular, and where customers linger longest; • Drill down into the available sales data to identify which components are selling fastest;
  • 6. • Automatically align sales data with supply, so that popular items don’t go out of stock. • Now that we all understand the IoT concept, it would be worthwhile to deep dive in order to get familiar with the building blocks of IoT:
  • 8.
  • 9. • Iot platform can help organisations to reduce cost through improved process efficiency , assets utilisations and productivity. With improved tracking of devices/objects using sensors and connectivity, they can benefit from realtime insights and analytics, which would help them make smarter decisions. The growth and convergence of data, processes and things on the internet would make such connections more relevant and important, creating more opportunities for people, businesses and industries.
  • 10.
  • 12.
  • 13.
  • 14. IOT SECURITY • IoT is transforming entire industries, creating tremendous benefits but also introducing new risks. • The security risks surrounding IoT software and applications are snowballing as developers are pressured to get devices either to the marketplace or into use within an enterprise as soon as possible. As billions of devices become connected to IoT, security solutions enable their safe and reliable operation. • With over twenty years as a leader in software security, we are uniquely positioned to adapt and apply software Security best practices to your IoT
  • 15. development initiative, or to help you assess your risk exposure to IoT products within your business. SOLUTION 4 steps to a successful IoT security solution Our goal is to help you deliver a sustainable IoT security initiative that provides continuous and comprehensive security risk identification and mitigation. We do this by empowering you to: 1. Integrate security into every aspect of your SDLC.
  • 16. • 2. Educate your developers. • 3. Implement penetration testing. • 4. Perform threat modelling. CONCLUSION • Hence, today we learned how IoT works and an entire IOT system functions. Also, we discussed some real-life examples where we can use IoT. We will be learning more about IOT in detail in the upcoming tutorials. Till stay tuned to learn more interesting things.
  • 17. Furthermore, if you have any query, feel free to ask in the comment section.