Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Internet of things

No description

Emma Fitzgerald

on 21 October 2016

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Internet of things

Internet of Things
Group 5
Internet of things
The Internet of Things (IoT) is the inter-connectivity of physical devices, buildings, and other inanimate objects which allows these items to collect and share data
History of Development
Cloud Computing
Near Field Communication (NFC)
Challenge 1: Ensure Seamless Communication
Implementation Recommendations
These objects are embedded with sensors, electronics, and software that permit communication between these 'machines'
Examples include 'smart refrigerators', advanced pet feeders, and wireless controlled doorbells/security systems
“If you think that the internet has changed your life, think again. The IoT is about to change it all over again!” —
- Brendan O’Brien, Chief Architect & Co-Founder, Aria Systems

-Kevin Ashton, 1999
-What are things?
-Man to Machine
-Machine to Machine
-Machine to Man
-Identity Management

-Information Flow Control

1. Develop and use standardized protocols and RFIDs
-Service Oriented Architecture
-Activity Systems 2.0 (AF2)

IoT Technologies
Organizational Usage
Radio Frequency Identification (RFID)
Wireless Sensor Networks (WSNs)


Health Sector
Energy Sector
Supply Chain Management/Transport
Environmental Sector
Challenge 2: Ensure governance for data ownership, data Integrity and information sharing

Challenge 3: Ensure Security of Information
-Cloud Computing
-Authorized Sharing
-Data Ownership
2. Use an ID based communication network to ensure security
-Secured connectivity
-Seamless mobility
Implementation (continued)
3. Governance at global level
-Cooperation between public/private sector
-Reduce complexity / improve overall potential
Implementation (continued)
Full transcript