SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Downloaden Sie, um offline zu lesen
Totem International Ltd   20-06-2011   2
    Provide corporate security consultancy in risk
    assessment, Intellectual Property, physical
    security, financial, forensics, accounting, cyber
    security, identity theft, corporate fraud,
    and brand protection.

   Facilitate global manufacturers / service providers
    to supply to police, army, and air force.

   Distribute Indian high technology security products/
    gadgets globally.

   Collect / collate database of security professionals.

                                    Totem International Ltd   20-06-2011   3
    Consulting services: Police & Fire services in
    areas of identification product / source.

   Training of staff for awareness sensitization on
    security issues.

   Cyber Security Training

   Integrated security solution for large infrastructure project
    including implementation with help of Totem
    Infrastructure Ltd


                                     Totem International Ltd   20-06-2011   4
   Police Equipment

   Physical Security Equipment

   Products for Traffic Police

   Protective police Gear

   Fire Uniforms and Equipment

   Uniform, Shoes & VHF HF Sets for SWAT/ERT

   Police Team.



                                    Totem International Ltd   20-06-2011   5
Totem International Ltd   20-06-2011   6
Totem International Ltd   20-06-2011   7
   “Cloud Computing is an emerging computing technology that uses the
    internet and central remote servers to maintain data and applications”.

   Cloud computing fundamentally allows for a functional separation
    between the resources used and the user's computer, usually residing
    outside the local network.

   The idea of Cloud Computing is that you can send and access the data
    from anywhere




                                            Totem International Ltd   20-06-2011   8
Totem International Ltd   20-06-2011   9
   Data & Software Availability

   Usage of multiple CPU’s can be eliminated

   Reduces the cost of software distribution

   Any computer connected to the network will have access to
    all the files.

   Use Software, Databases and store files even without
    knowing the physical location


                                     Totem International Ltd   20-06-2011   10
   Potential Cost Saving
   Business Agility
   Reduces Energy Consumption
   Reduces the IT staff
   Data is less likely to be lost
   Owners need not reproduce the Software and ship it out
   Holds more Storage than a personal computer
   Users need not update always
   Work can be carried as long as there is internet access
   On demand Self Service, Broad network access


                                  Totem International Ltd   20-06-2011   11
Back End
    Front End




     User, connecting device,           Servers, data storage devices ,
      minimum software                   Computers.




                                 Totem International Ltd   20-06-2011      12
   Aberdeen group in 2009 studied that cloud computing
    would result is 18% reduction in the IT budget
   16% Reduction in the data center Power Cost
   Since 2007 the trade mark fillings of cloud computing
    are increasing at an exponential rate
   2008-2009 cloud computing trade mark fillings have
    increased by 483%
   Approximately 500 such marks are filled during 2010




                                  Totem International Ltd   20-06-2011   13
   Companies like Yahoo ,Google, Microsoft are using
    Cloud Computing today.
   Amazon web Services revenue break ups through
    Cloud Computing according to the USB analyst is
   $ 500million in 2010
   Estimating a rise to $ 750 million in 2011
   Massive $ 2.5 billion in 2014
   Rack Space’s revenue generation through cloud
    computing is 2010.


                                 Totem International Ltd   20-06-2011   14
 By 2020 most people will acess data & software online.
 Will dominate desktop in the next12 decades.
 When a research was conducted On this 71% agreed
   to this and 27% disagreed.




                                  Totem International Ltd   20-06-2011   15
Totem International Ltd   20-06-2011   16
Wearable computers which give access to
any information without scarcity of mobility.
Features:
Hand’s free operation
In built GPS tracking

Range of communication capabilities
Include bluetooth
Long battery life
Radio Frequency
Identification(RFID)


           Totem International Ltd   20-06-2011   18
   RFID is an ADC technology that uses radio-frequency
    waves to transfer data between a reader and a movable
    item to identify, categorize, track...
   RFID is fast, reliable, and does not require physical
    sight or contact between reader/scanner and the tagged
    item

   Radio Frequency Identification (RFID) is an automatic
    identification method that stores and remotely retrieves
    data via an RFID tag or transponder.

                                   Totem International Ltd   20-06-2011   19
   One or more RF tags
   Two or more antennas
   One or more interrogators
   One or more host computers
   Appropriate software

                       Totem International Ltd   20-06-2011   20
RFID System Components
(block diagram)
                                  Antenna                         Reader

     Asset/Tag

           Asset
                                                                   Firmware

            Tag
             Insert


                                                 TCP/IP

                           Host
                                                                                    ~
                                                                                Power

                      Application
    Customer’s
                      Software               API
    MIS

                                        Totem International Ltd    20-06-2011           22
Sequence of Communication
• Host Manages Reader(s) and Issues Commands
• Reader and tag communicate via RF signal
• Carrier signal generated by the reader (upon request from the host
  application)
• Carrier signal sent out through the antennas
• Carrier signal hits tag(s)
• Tag receives and modifies carrier signal
    – “sends back” modulated signals.
• Antennas receive the modulated signal and send them to the
  Reader
• Reader decodes the data
    – Results returned to the host application


                                            Totem International Ltd   20-06-2011   23
Totem International Ltd   20-06-2011   24
Tags can be attached to almost anything




                        Totem International Ltd   20-06-2011   25
Cloud computing + RFID



            Totem International Ltd   20-06-2011   26
   Cloud computing utilizes the network as a means to
    connect the user to resources by using the data
    collected with Rfid which provides a cost effective
    technology and information solution.




                                   Totem International Ltd   20-06-2011   27
Rfid Tags
                     Computers
Readers
                     Data storage Systems
Computers For RFID
                     Services & Servers
data storage and
processing.
                     {Data filteration}
Applications which
                     Infrastructure
provide access to
cloud computing
                     Middleware
                     Cloud Computing




                       Totem International Ltd   20-06-2011   28
Thank you
       Email : firoze@totemint.com

+919618621234




                         Totem International Ltd   20-06-2011   29

Weitere ähnliche Inhalte

Was ist angesagt?

ATTOBahn NETWORK(part2)_Internet Protocals are the problem
ATTOBahn NETWORK(part2)_Internet Protocals are the problemATTOBahn NETWORK(part2)_Internet Protocals are the problem
ATTOBahn NETWORK(part2)_Internet Protocals are the problem
Darryl Gray
 
NTSC ISDN to IP Video Conferencing Transition Recommendations
NTSC ISDN to IP Video Conferencing Transition RecommendationsNTSC ISDN to IP Video Conferencing Transition Recommendations
NTSC ISDN to IP Video Conferencing Transition Recommendations
Videoguy
 
7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech
Hemant Nagwekar
 

Was ist angesagt? (18)

IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & Ecosystem
 
Gtt Overview
Gtt OverviewGtt Overview
Gtt Overview
 
Customer pres 3 technical overviews_at&t mobility
Customer pres 3 technical overviews_at&t  mobilityCustomer pres 3 technical overviews_at&t  mobility
Customer pres 3 technical overviews_at&t mobility
 
ATTOBahn NETWORK(part2)_Internet Protocals are the problem
ATTOBahn NETWORK(part2)_Internet Protocals are the problemATTOBahn NETWORK(part2)_Internet Protocals are the problem
ATTOBahn NETWORK(part2)_Internet Protocals are the problem
 
Iot
IotIot
Iot
 
Managed Data Centre
Managed Data CentreManaged Data Centre
Managed Data Centre
 
Ptcl Data Centre
Ptcl Data CentrePtcl Data Centre
Ptcl Data Centre
 
Data enrichment
Data enrichmentData enrichment
Data enrichment
 
NTSC ISDN to IP Video Conferencing Transition Recommendations
NTSC ISDN to IP Video Conferencing Transition RecommendationsNTSC ISDN to IP Video Conferencing Transition Recommendations
NTSC ISDN to IP Video Conferencing Transition Recommendations
 
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the RescueIndustrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
 
KazooCon 2014 - A Primer on Telecom Law
KazooCon 2014 - A Primer on Telecom LawKazooCon 2014 - A Primer on Telecom Law
KazooCon 2014 - A Primer on Telecom Law
 
MWC 2010 DPI
MWC 2010 DPIMWC 2010 DPI
MWC 2010 DPI
 
Introduction IOT/M2M
Introduction IOT/M2MIntroduction IOT/M2M
Introduction IOT/M2M
 
12 vo ip-t-hutchinson-11feb2011
12 vo ip-t-hutchinson-11feb201112 vo ip-t-hutchinson-11feb2011
12 vo ip-t-hutchinson-11feb2011
 
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
 
Byte lab Presentation
Byte lab Presentation Byte lab Presentation
Byte lab Presentation
 
7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech
 
Wireless Wan Customer Presentation (AT&T)
Wireless Wan Customer Presentation (AT&T)Wireless Wan Customer Presentation (AT&T)
Wireless Wan Customer Presentation (AT&T)
 

Andere mochten auch (7)

Cyberscout Corporate Security
Cyberscout   Corporate SecurityCyberscout   Corporate Security
Cyberscout Corporate Security
 
Fire Brigade Productsv General[1]
Fire Brigade Productsv   General[1]Fire Brigade Productsv   General[1]
Fire Brigade Productsv General[1]
 
Cyberscout Presentation
Cyberscout PresentationCyberscout Presentation
Cyberscout Presentation
 
24 6 2011 Port Security
24 6 2011 Port Security24 6 2011 Port Security
24 6 2011 Port Security
 
Totem Cloud Rfid Solutions (3)
Totem Cloud Rfid Solutions (3)Totem Cloud Rfid Solutions (3)
Totem Cloud Rfid Solutions (3)
 
PPE & Welding Accessories 2011
PPE & Welding Accessories 2011PPE & Welding Accessories 2011
PPE & Welding Accessories 2011
 
Introduction To Delma Tracking
Introduction To Delma TrackingIntroduction To Delma Tracking
Introduction To Delma Tracking
 

Ähnlich wie Totem cloud rfid solutions (3)

NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
ssuser57b3e5
 

Ähnlich wie Totem cloud rfid solutions (3) (20)

Supelec m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.1)
Supelec   m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.1)Supelec   m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.1)
Supelec m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.1)
 
Effective IoT System on Openstack
Effective IoT System on OpenstackEffective IoT System on Openstack
Effective IoT System on Openstack
 
Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) Wave
 
Edge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalersEdge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalers
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
IoT digest. March 2018
IoT digest. March 2018IoT digest. March 2018
IoT digest. March 2018
 
The network and on premise edge
The network and on premise edgeThe network and on premise edge
The network and on premise edge
 
Fin fest 2014 - Internet of Things and APIs
Fin fest 2014 - Internet of Things and APIsFin fest 2014 - Internet of Things and APIs
Fin fest 2014 - Internet of Things and APIs
 
IxorTalk IoT Convention 2018
IxorTalk IoT Convention 2018IxorTalk IoT Convention 2018
IxorTalk IoT Convention 2018
 
Meetup 4/2/2016 - Functionele en technische architectuur IoT
Meetup  4/2/2016 - Functionele en technische architectuur IoTMeetup  4/2/2016 - Functionele en technische architectuur IoT
Meetup 4/2/2016 - Functionele en technische architectuur IoT
 
IT automation and application of IT systems in port infrastructure
IT automation and application of IT systems in port infrastructureIT automation and application of IT systems in port infrastructure
IT automation and application of IT systems in port infrastructure
 
Ibm iot overview
Ibm   iot overviewIbm   iot overview
Ibm iot overview
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
 
How to bootstrap your IoT project
How to bootstrap  your IoT projectHow to bootstrap  your IoT project
How to bootstrap your IoT project
 
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
 
Introduction to IoT by Vectolabs
Introduction to IoT by VectolabsIntroduction to IoT by Vectolabs
Introduction to IoT by Vectolabs
 
IoT Platform Meetup - HP Enterprise
IoT Platform Meetup - HP EnterpriseIoT Platform Meetup - HP Enterprise
IoT Platform Meetup - HP Enterprise
 
Industrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M OverviewIndustrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M Overview
 
IoT Solutions - Dashboarding Real-Time Data | Internet of Things | IoT Techno...
IoT Solutions - Dashboarding Real-Time Data | Internet of Things | IoT Techno...IoT Solutions - Dashboarding Real-Time Data | Internet of Things | IoT Techno...
IoT Solutions - Dashboarding Real-Time Data | Internet of Things | IoT Techno...
 

Mehr von Firoze Hussain

Mehr von Firoze Hussain (20)

Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013
 
Catalogue march 2013
Catalogue march 2013Catalogue march 2013
Catalogue march 2013
 
Homsec 2013
Homsec 2013Homsec 2013
Homsec 2013
 
totem Catalogue Sept 2012
totem Catalogue Sept 2012totem Catalogue Sept 2012
totem Catalogue Sept 2012
 
totem Catalogue Sept 2012 safety security
totem Catalogue Sept 2012 safety securitytotem Catalogue Sept 2012 safety security
totem Catalogue Sept 2012 safety security
 
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...
Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...
 
Catalogue 2012 safety security and power quality management
Catalogue 2012 safety security and power quality managementCatalogue 2012 safety security and power quality management
Catalogue 2012 safety security and power quality management
 
3rd Annual Cloud Computing Summit 2011
3rd Annual Cloud Computing Summit 20113rd Annual Cloud Computing Summit 2011
3rd Annual Cloud Computing Summit 2011
 
Catalogue 19 sept11
Catalogue 19 sept11Catalogue 19 sept11
Catalogue 19 sept11
 
totem int Online Catalogue Sept11
totem int Online Catalogue Sept11totem int Online Catalogue Sept11
totem int Online Catalogue Sept11
 
Online Catalogue 9 July2011
Online Catalogue 9 July2011Online Catalogue 9 July2011
Online Catalogue 9 July2011
 
Africa 24 6 2011 Port Security Pdf
Africa 24 6 2011 Port Security PdfAfrica 24 6 2011 Port Security Pdf
Africa 24 6 2011 Port Security Pdf
 
16 Page Catalogue 7 June11
16 Page Catalogue 7 June1116 Page Catalogue 7 June11
16 Page Catalogue 7 June11
 
Kerala Ti C 9.3.11
Kerala  Ti C 9.3.11Kerala  Ti C 9.3.11
Kerala Ti C 9.3.11
 
16 Catalogue 24 Mar11
16 Catalogue  24 Mar1116 Catalogue  24 Mar11
16 Catalogue 24 Mar11
 
Ecil totem coal ash moisture content monitor
Ecil totem coal ash moisture content monitorEcil totem coal ash moisture content monitor
Ecil totem coal ash moisture content monitor
 
Prps Presentation Ficci
Prps Presentation FicciPrps Presentation Ficci
Prps Presentation Ficci
 
totem security
totem securitytotem security
totem security
 
Abloy Company Profile 4pg
Abloy Company Profile 4pgAbloy Company Profile 4pg
Abloy Company Profile 4pg
 
Brochure
BrochureBrochure
Brochure
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Totem cloud rfid solutions (3)

  • 1.
  • 2. Totem International Ltd 20-06-2011 2
  • 3. Provide corporate security consultancy in risk assessment, Intellectual Property, physical security, financial, forensics, accounting, cyber security, identity theft, corporate fraud, and brand protection.  Facilitate global manufacturers / service providers to supply to police, army, and air force.  Distribute Indian high technology security products/ gadgets globally.  Collect / collate database of security professionals. Totem International Ltd 20-06-2011 3
  • 4. Consulting services: Police & Fire services in areas of identification product / source.  Training of staff for awareness sensitization on security issues.  Cyber Security Training  Integrated security solution for large infrastructure project including implementation with help of Totem Infrastructure Ltd Totem International Ltd 20-06-2011 4
  • 5. Police Equipment  Physical Security Equipment  Products for Traffic Police  Protective police Gear  Fire Uniforms and Equipment  Uniform, Shoes & VHF HF Sets for SWAT/ERT  Police Team. Totem International Ltd 20-06-2011 5
  • 6. Totem International Ltd 20-06-2011 6
  • 7. Totem International Ltd 20-06-2011 7
  • 8. “Cloud Computing is an emerging computing technology that uses the internet and central remote servers to maintain data and applications”.  Cloud computing fundamentally allows for a functional separation between the resources used and the user's computer, usually residing outside the local network.  The idea of Cloud Computing is that you can send and access the data from anywhere Totem International Ltd 20-06-2011 8
  • 9. Totem International Ltd 20-06-2011 9
  • 10. Data & Software Availability  Usage of multiple CPU’s can be eliminated  Reduces the cost of software distribution  Any computer connected to the network will have access to all the files.  Use Software, Databases and store files even without knowing the physical location Totem International Ltd 20-06-2011 10
  • 11. Potential Cost Saving  Business Agility  Reduces Energy Consumption  Reduces the IT staff  Data is less likely to be lost  Owners need not reproduce the Software and ship it out  Holds more Storage than a personal computer  Users need not update always  Work can be carried as long as there is internet access  On demand Self Service, Broad network access Totem International Ltd 20-06-2011 11
  • 12. Back End Front End  User, connecting device, Servers, data storage devices , minimum software Computers. Totem International Ltd 20-06-2011 12
  • 13. Aberdeen group in 2009 studied that cloud computing would result is 18% reduction in the IT budget  16% Reduction in the data center Power Cost  Since 2007 the trade mark fillings of cloud computing are increasing at an exponential rate  2008-2009 cloud computing trade mark fillings have increased by 483%  Approximately 500 such marks are filled during 2010 Totem International Ltd 20-06-2011 13
  • 14. Companies like Yahoo ,Google, Microsoft are using Cloud Computing today.  Amazon web Services revenue break ups through Cloud Computing according to the USB analyst is  $ 500million in 2010  Estimating a rise to $ 750 million in 2011  Massive $ 2.5 billion in 2014  Rack Space’s revenue generation through cloud computing is 2010. Totem International Ltd 20-06-2011 14
  • 15.  By 2020 most people will acess data & software online.  Will dominate desktop in the next12 decades.  When a research was conducted On this 71% agreed to this and 27% disagreed. Totem International Ltd 20-06-2011 15
  • 16. Totem International Ltd 20-06-2011 16
  • 17. Wearable computers which give access to any information without scarcity of mobility. Features: Hand’s free operation In built GPS tracking Range of communication capabilities Include bluetooth Long battery life
  • 18. Radio Frequency Identification(RFID) Totem International Ltd 20-06-2011 18
  • 19. RFID is an ADC technology that uses radio-frequency waves to transfer data between a reader and a movable item to identify, categorize, track...  RFID is fast, reliable, and does not require physical sight or contact between reader/scanner and the tagged item  Radio Frequency Identification (RFID) is an automatic identification method that stores and remotely retrieves data via an RFID tag or transponder. Totem International Ltd 20-06-2011 19
  • 20. One or more RF tags  Two or more antennas  One or more interrogators  One or more host computers  Appropriate software Totem International Ltd 20-06-2011 20
  • 21. RFID System Components (block diagram) Antenna Reader Asset/Tag Asset Firmware Tag Insert TCP/IP Host ~ Power Application Customer’s Software API MIS Totem International Ltd 20-06-2011 22
  • 22. Sequence of Communication • Host Manages Reader(s) and Issues Commands • Reader and tag communicate via RF signal • Carrier signal generated by the reader (upon request from the host application) • Carrier signal sent out through the antennas • Carrier signal hits tag(s) • Tag receives and modifies carrier signal – “sends back” modulated signals. • Antennas receive the modulated signal and send them to the Reader • Reader decodes the data – Results returned to the host application Totem International Ltd 20-06-2011 23
  • 23. Totem International Ltd 20-06-2011 24
  • 24. Tags can be attached to almost anything Totem International Ltd 20-06-2011 25
  • 25. Cloud computing + RFID Totem International Ltd 20-06-2011 26
  • 26. Cloud computing utilizes the network as a means to connect the user to resources by using the data collected with Rfid which provides a cost effective technology and information solution. Totem International Ltd 20-06-2011 27
  • 27. Rfid Tags Computers Readers Data storage Systems Computers For RFID Services & Servers data storage and processing. {Data filteration} Applications which Infrastructure provide access to cloud computing Middleware Cloud Computing Totem International Ltd 20-06-2011 28
  • 28. Thank you Email : firoze@totemint.com +919618621234 Totem International Ltd 20-06-2011 29