SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Downloaden Sie, um offline zu lesen
INTEL CONFIDENTIAL
Vitali Damasevich (OSAM)
Rome, 15th May 2014
Intel® Gateway
Solutions for the
Internet of Things
(IoT) Overview
1
INTEL CONFIDENTIAL
• INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS
DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO
SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER
INTELLECTUAL PROPERTY RIGHT.
• A "Mission Critical Application" is any application in which failure of the Intel® Product could result, directly or indirectly, in personal injury or death. SHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION
CRITICAL APPLICATION, YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES, AND THE DIRECTORS, OFFICERS, AND EMPLOYEES OF EACH, HARMLESS AGAINST ALL CLAIMS COSTS,
DAMAGES, AND EXPENSES AND REASONABLE ATTORNEYS' FEES ARISING OUT OF, DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR DEATH ARISING IN ANY WAY OUT OF SUCH MISSION
CRITICAL APPLICATION, WHETHER OR NOT INTEL OR ITS SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS PARTS.
• Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked “reserved" or "undefined". Intel
reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a
design with this information.
• The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request.
• Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order.
• This document contains information on products in the design phase of development.
• Intel® processor numbers are not a measure of performance. Processor numbers differentiate features within each processor family, not across different processor families: Go to: Learn About Intel® Processor Numbers
• All products, computer systems, dates and figures specified are preliminary based on current expectations, and are subject to change without notice.
• Intel® product plans in this presentation do not constitute Intel plan of record product roadmaps. Please contact your Intel representative to obtain Intel's current plan of record product roadmaps.
• **Code Names are only for use by Intel to identify products, platforms, programs, services, etc. (“products”) in development by Intel that have not been made commercially available to the public, i.e., announced, launched or
shipped. They are never to be used as “commercial” names for products. Also, they are not intended to function as trademarks.
• Intel, the Intel logo, Intel Atom and Intel SpeedStep are trademarks of Intel Corporation in the U.S. and/or other countries.
• Intel® Active Management Technology (Intel® AMT) requires the platform to have an Intel AMT-enabled chipset, network hardware and software, as well as connection with a power source and a corporate network connection.
With regard to notebooks, Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating or powered off. For more
information, see http://www.intel.com/technology/iamt.
• Enhanced Intel SpeedStep® Technology for specified units of this processor available Q2/06. See the Processor Spec Finder at http://processorfinder.intel.com or contact your Intel representative for more information
• 64-bit computing on Intel architecture requires a computer system with a processor, chipset, BIOS, operating system, device drivers and applications enabled for Intel® 64 architecture. Performance will vary depending on your
hardware and software configurations. Consult with your system vendor for more information.
• No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology is a security technology under development by Intel and requires for operation a computer system with Intel®
Virtualization Technology, an Intel Trusted Execution Technology-enabled processor, chipset, BIOS, Authenticated Code Modules, and an Intel or other compatible measured virtual machine monitor. In addition, Intel Trusted
Execution Technology requires the system to contain a TPMv1.2 as defined by the Trusted Computing Group and specific software for some uses. See http://www.intel.com/technology/security/ for more information.
• Intel® Hyper-Threading Technology (Intel® HT Technology) requires a computer system with an Intel® Pentium® 4 Processor supporting Intel HT Technology and an Intel HT Technology-enabled chipset, BIOS, and operating system.
Performance will vary depending on the specific hardware and software you use. See www.intel.com/products/ht/hyperthreading_more.htm for more information including details on which processors support Intel HT Technology.
• Intel® Virtualization Technology requires a computer system with an enabled Intel® processor, BIOS, virtual machine monitor (VMM) and, for some uses, certain platform software enabled for it. Functionality, performance or other
benefits will vary depending on hardware and software configurations and may require a BIOS update. Software applications may not be compatible with all operating systems. Please check with your application vendor.
• Other vendors are listed by Intel as a convenience to Intel's general customer base, but Intel does not make any representations or warranties whatsoever regarding quality, reliability, functionality, or compatibility of these
devices. This list and/or these devices may be subject to change without notice.
• *Other names and brands may be claimed as the property of others.
• Copyright © 2014 Intel Corporation. All rights reserved.
Legal Disclaimer
2
INTEL CONFIDENTIAL
IOT Opportunity
*Other names and brands may be claimed as the property of others.
Industry Alignment
IoT is a Big
Opportunity
3
INTEL CONFIDENTIAL
END TO END
ANALYTICS
INTELLIGENT GATEWAYSINTELLIGENT
DEVICES
Solutions from device to
cloud to deliver end-to-end
customer value
Unlocking and sharing
valuable data in both legacy
and new devices
Deliver Intelligence where
needed to acquire and filter
data securely
Intel’s IoT Vision
4
INTEL CONFIDENTIAL
Assetsto Deliver Value
Integrated, highly optimized platforms
Aligning
Intel’s Approach to IoT Gateways:
McAfee*Assetsto Deliver Value *
*Other names and brands may be claimed as the property of others. 5
INTEL CONFIDENTIAL
Family of scalable gateway platforms: Intel® Quark™ -> Intel® Atom™ SoCs
Business and software licensing model
Integrated, validated solution with McAfee* and Wind River* SW
Enables seamless and secure data flow
Optimized solutions to meet specific vertical markets
Hosts ecosystem apps and services
Introducing Intel® Gateway Solutions for IoT
*Other names and brands may be claimed as the property of others. 6
INTEL CONFIDENTIAL
• Fast Time to Market
• Unmatched Scalability
• Integrated Security
Intel® Gateway Solutions for IoT Value Proposition
7
INTEL CONFIDENTIAL
Intel Gateways Solutions for IoT Platform Technology Pillars
Connectivity Manageability Security
• PAN (Wi-Fi, Bluetooth*,
ZigBee*)
• LAN (Ethernet, Wi-Fi)
• WAN (2G/3G/LTE)
• Connection manager
• Cloud connector
• OMA DM
• TR-069
• OSGi
• Web-interface-based
configuration and
management
• Secure device
• Secure data
• Secure remote
management
• McAfee* Embedded
Control
*Other names and brands may be claimed as the property of others. 8
INTEL CONFIDENTIAL
Connectivity
DevelopmentEnvironment
Intel BSP: Board and Modules (Intel® Quark™ SoC, Intel® Atom™ SoC)
Linux* 5.0.1
Ecosystem
Apps &
Services
SI/ITOs,
Customers
Manageability SecurityCloud Connector
OMA DM
TR-069
Web Config
OpenSSL* TPM Engine
SRM Signing Tool
Certificate Management
Secure Boot
Application Integrity Monitor
Application Resource Control
Remote Attestation
Secure Package Management
Encrypted Storage
FIPS 140-2 OpenSSL Lib
McAfee* Embedded
Control
Intel Gateways Solutions for IoT Software
Third Party
2G/3G/4G
Bluetooth*
Ethernet
Zigbee* Stack
Serial / USB
VPN
WiFi Access Point
MQTT
Prosys OSGi
OpenJdk
Sqlite3
LUA Scripting
McAfee*
Embedded
Control
*Other names and brands may be claimed as the property of others.
Runtime Environment
9
INTEL CONFIDENTIAL
Intel® Gateway Solutions for IoT
Industrial Markets &
Energy Markets
1H’ 14 Solutions:
Codename: DK & PK 100
Series
DK & PK 300
Series
SOC Intel® Quark™ SoC
X1021
Intel® Atom™
Processor E3800
Series
Temp
Range
0° - 55°C -20° - 60°C
Production WW26 - 32 WW26 - 32
10
Transport Markets
1H’ 14 Solutions:
Codename: DK & PK 200
Series
DK & PK 300
Series
SOC Intel® Quark™ SoC
X1021
Intel® Atom™
Processor E3800
Series
Temp
Range
0° - 55° -20° - 60°C
Production WW26 - 32 WW26 - 32
All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.
Target Market:
Developers
1H’ 14 Solutions:
Codename: DK 50 Series
SOC Intel® Quark™ SoC
X1021
Temp Range
N/A
Production N/A
• Development Kit 100, 200, and 300 Series provides customers a commercial SW license as well as
production-ready systems from ODMs
• Development Kit 50 Series provides developers a low cost platform with a non-production, limited
term SW license (6 months) for development, prototyping, and testing.
•
INTEL CONFIDENTIAL
Intel® Gateway Solutions for the Internet of Things Development Kits
DK 50 Series DK 100 Series DK 200 Series DK 300 Series
Intel® Quark™ SoC X1000   
Intel® Atom™ Processor E3826 
Board, radio(s), chassis, power
supply
Board and Power
Supply Only
  
Software Components:
• Wind River* Linux* OS
• Wind River IDP XT 2.1 &
Workbench Tools
• McAfee* Embedded Control
• SW License
   
SW License Non-production, Limited
Term License
Commercial License
Commercial
License
Commercial
License
Target Markets Developers Industrial & Energy Transportation Multi Vertical
All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.
*Other names and brands may be claimed as the property of others. 11
INTEL CONFIDENTIAL
12
DK50 – Galileo based development kit
 Intel® Quark™ SoC X1000
 400 MHz Quark™ Core
 512KB eSRAM, 16KB L1 cache
 256MB DDR3-800
 10/100Mb Ethernet Port
 USB2.0 Device Port
 USB2.0 Host Port (EHCI/OHCI)
 RS-232 UART Port, 3.5mm jack
 PCIe Gen 2 Full Mini-card slot
 Micro SD slot, up to 32GB
 8MB NVRAM SPI NOR flash chip
 SPI programming port
 10 pin JTAG
 Physical Characteristics
 6 Layer Board
 10cm x 7cm
 Arduino Compatible Interface
For Educators, Students, and Makers
 6 channel A-to-D Converter
 1 SPI port (up to 25MHz)
 1 UART
 1 I2C
 14 GPIOs w prog interrupts
 6 PWM
 Open Source Hardware and Software:
 Arduino Software IDE for the
Intel® Quark™ SoC X1000
 Linux* firmware pre-installed with
 Full open source driver
 Full open source tool chain
 Open HW Documentation
 BOM/Schematic/Board File/
 Datasheet
INTEL CONFIDENTIAL
13
Industrial/Energy Form Factor Reference Design (FFRD) - DK100
 Physical System Characteristics
 4 Layer Board
 10cm x 15cm in enclosure
 Intel® Quark™ X1000 Core
 400 MHz Quark™ Core
 ECC Enabled
 Secure Boot
 Wireless Connectivity
 Intel® Centrino® 6205 Wi-Fi
 Telit* HE910 3G with GPS
 Zigbee* (X-bee* & Exigen*)
 Wired Connectivity
 4GB MicroSD
 2 10/100 Ethernet Ports
 1 USB2.0 Device Port
 1 USB2.0 Host Port
 1 RS-232 UART Port
 Industrial /Energy Specific Features
 1 GB DDR3-800
 8 channel ADC for sensing raw inputs
 1 RS-485 port
 Option 3 Energy sensor Modules various
voltages ranges and configurations
 Certifications (CE, FCC, PTCRB ..)
 Development Kit Content:
 Chassis with CRB installed
 Linux image pre-installed
 Power supply, Accessories
 Documentation
 Quark™ X1000 Software Stack to be
downloaded via web site
 Safety & Carrier Certified
 SW Licenses
Comes WITH enclosure
INTEL CONFIDENTIAL
DK100 front and rear view
14
INTEL CONFIDENTIAL
15
Transport Form Factor Reference Design (FFRD) – DK200
 Physical System Characteristics
 Board in Enclosure
 Intel® Quark™ X1000 Core
 400 MHz Quark™ Core
 ECC Enabled, Secure Boot
 512 MB DDR3-800
 Vehicle Interface and Network Connectivity
 1 High Speed CAN (up to 1Mbps)
 1 Fault Tolerant CAN (up to 125 kbps)
 6 Ch 12-bit ADC
 Wireless Connectivity
 PCIe based Wi-Fi
 Bluetooth* 4.0
 Telit* HE910 3G Modem with GPS
 Wired Connectivity
 2 10/100 Ethernet Ports
 1 USB2.0 Device Port
 3 USB2.0 Host Port
 1 RS-232 UART Port
 4GB MicroSD
 Transportation Specific Features
 Collision and Rollover Detection via on board
Accelerometer
 Emergency Call Support with Microphone In and
Line Out
 Driver Call Button
 Driver Alarm Button
 4.5V to 28V with Battery Backup
 Battery Monitor(s)
 Certifications for Transportation use, including
CE, FCC, PTCRB)
 Development Kit Content:
 Chassis with CRB installed
 Linux image pre-installed
 Power supply, Accessories
 Documentation
 Safety & Carrier Certified
 Quark™ X1000 Software Stack
battery
mPCIe
Comes WITH enclosure
INTEL CONFIDENTIAL
Wind River IDP main features
16
INTEL CONFIDENTIAL
Indu/Transport Software Stack
17
Software License Types
BSD License
Branded or Licensed Binary
GPL LicenseDual BSD/GPL License
On Die Silicon based ROM
Wind River
IDP 2.1 Middle
IDP 2.0 XT Adders
Industrial FFRD DriversTransportation FFRD Drivers
Common Kernel
Drivers for all FFRDs
Common Tools/
Support Software
Trusted Boot Trusted Boot ROM
OS Loader
Linux v3.8
SoC BSP
USB Dev
SD/eMMC ECC
Ethernet SPI
USB OHCI
GPIO SC
ThermalUART
UEFI Firmware
UEFI 2.3.1 (UDK 2010 plus Bailey Park update) Based BSP
Clanton Platform Open CodeuCode update
Signing & Flash
Tools
Yocto Linux
Debug
OpenOCD
JTAG
Clanton support in Kernel
GNU GRUB v0.97 Bootloader (GPL v2)
May not include all software required to enable 3rd party devices or OS for FFRD support (e.g. WR, McAfee, IMC components).
USB UHCI Watchdog
GPIO NC
Pre- UART
Telit* HE910 3G LS-ADC
I2S Audio
Intel Wifi 135/6205/7260
Energy ADC ZigBee™
SPI Mux
I2C*
RS485CAN
Wind River
Workbench
Transportation Applications
Diagnostics e-Call
Industrial Applications
M2M AggregationUtility Meter
Accelerometer
Intel® Galileo®
GPIO &
PWM
MuxTPM
Arduino IDE
Shield Libraries
Core Libraries DL Client
Java MQTTLUA SRM Connectivity
McAfee Embedded Control MI Runtime License
INTEL CONFIDENTIAL
Tested drivers for Intel IoT Gateway Platform
18
INTEL CONFIDENTIAL
Intel Gateways Solutions for IoT Development Kits
19
DK50 series DK100 series DK200 series DK300 series
Target Markets Developers Industrial, Energy Transportation
Industrial, Energy, and
Transportation
SoC Intel® Quark™ SoC X1000 Intel® Quark™ SoC X1000 Intel® Quark™ SoC X1000 Intel® Atom™ Processor E3826
Software
Same with Non-production, Limited
Term SW License
Wind River Linux* 5.0.1 (Host), Wind River* Intelligent Device Platform XT 2.1, Wind River Workbench,
McAfee® Embedded Control 6.1
Data Security and Attestation OpenSSL Library, VPN
Certificate Management, Remote Attestation, OpenSSL (HW TPM for DK300), FIPS 140-2 OpenSSL* Library,
SRM Signing Tool, Encrypted Storage, VPN
End Point Security McAfee* Embedded Control
McAfee* Embedded Control, Application Integrity Monitor, Application Resource Control, Secure Package
Management, Secure Boot
Manageability and Provisioning
OMA DM, TR-069, Web-based
configuration interfaces
OMA DM, TR-069, Web-based configuration interfaces
Communications and
Connectivity
Serial, USB, VPN, MQTT
Cellular 2G/3G/4G, Bluetooth*, Serial, USB, VPN, Wi-Fi* Access Point, MQTT, and 802.15.4 (ZigBee* DK100
series only)
Runtime Environments Java, OSGi Lua*, Java*, and OSGi*
I/O
Ethernet* 10/100, USB 2.0 host &
device, RS-232, full PCIe* mini card
slot, UART 5V/3.3V, SPI for Arduino
shield, I2C, 14 digital I/O pins, 12bit
8 channel ADC
2x Ethernet* 10/100, USB 2.0 host
& device, RS-232, RS-485, third
party optional 802.15.4 (ZigBee*),
Wi-Fi*/Bluetooth* mini PCIe Module,
3G (data), SPI (internal), 12bit 8
channel ADC
2x Ethernet* 10/100, USB 2.0 host
& device, RS-232, Audio line in/out,
CAN*, Wi-Fi*/Bluetooth* mini PCIe
Module, 3G (data and voice), 3 axis
accelerometer (internal), 12bit 8
channel ADC
2x Ethernet* 10/100/1000,
2x USB 2.0, 1X USB 3.0, RS-
232/422/485, Line in/out, Wi-
Fi*/Bluetooth* mini PCIe
Module, Cellular WAN mini PCIe
module, optional third party
ZigBee* via USB, HDMI
Memory and Storage
512k SRAM; 256MBytes DDR3,
optional micro SD card
512k SRAM; 1 GB ECC DDR3,
Onboard SD Card
512k SRAM; 512MB ECC DDR3,
Onboard SD Card
Up to 8 GB DDR3, 2.5¨ SSD via
onboard SATA
All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.
*Other names and brands may be claimed as the property of others.
INTEL CONFIDENTIAL
IoT Gateway Development Kit Customer User Experience
20
HW Components
• Board, radio(s), chassis,
power supply
• Intel CPU/SOC
Software Components:
• Wind River* Linux* OS
• Wind River* IDP XT 2.1 &
Workbench Tools
• McAfee* Embedded Control
SW License
Customer
Purchases
Development
Kit
Development Kit Contents:
SW downloaded from Wind
River fulfillment servers
• Installer file included on USB
thumb drive
Customer clicks to accept
Developer and EULA License
Software is registered with
Intel and customer receives
perpetual license key
SW is activated
Customer
Installs SW
Customer builds SW target
image and develops SW and
Services
Host and test ecosystem
applications and services
Connect to sensors and the
cloud
Test and evaluate application
and services
Determine security policies
HW/SW
Development
All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.
*Other names and brands may be claimed as the property of others.
INTEL CONFIDENTIAL
IoT Gateway Development Kit Customer User Experience
21
HW Components
• Intel CPU/SOC
Software Components:
• N/A
SW Entitlement Document
• Obtained “rights” to copy
the runtime SW onto the
production kit and
associated HW
• Customer is reminded that
binaries of system image
are inseparably embedded
to production kit
Customer
Purchases
Gateway
from
ecosystem
Gateway contains
Production Kit from Intel
Production Kit Contents:
Gateway integrated with
applications and services and
provisioned
End to End system integration
Gateway
shipped to
Customer
Gateway is deployed in a
production environment
Services deployed
Gateway is
deployed
All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.
*Other names and brands may be claimed as the property of others.
INTEL CONFIDENTIAL
Ecosystem Engagement
Engagements require selling a solution with ecosystem partners
Scalable and inter-operable ecosystem is needed to accelerate
deployments
ODM
ISV
SI
Telco
SP
OEM
End User
22
INTEL CONFIDENTIAL
DEVICES DEVICES
Addressing Endless Use
Cases
23
INTEL CONFIDENTIAL
Intel Gateways Solutions for IoT Industrial HVAC Use Case
Securely connect to HVAC units
and send data to the cloud
Aggregate, Analyze, Manage
Data
Intel Gateway
Solution for IoT
Accelerating Business Transformation
Cloud Services Creation and Deployment
Performance Management (Owner)
• Energy performance benchmarking
• Utility grade demand response
• Sustainability and regulatory reporting
Asset Management (Service)
• 24/7/365 anywhere access
• Remote diagnostics and monitoring
• Online integrated service and parts locator
24
INTEL CONFIDENTIAL
Summary
Intel is developing scalable gateway solutions for IoT
Integrated with foundational HW, SW, and security building blocks
Securely connects and aggregates data from the edge to the cloud
Simplifies the development process and deployment of IoT gateways
Delivers value by accelerating business transformation
25
INTEL CONFIDENTIAL
Additional Information
http://newsroom.intel.com/community/intel_newsroom/blog/2014/04/01/intel-ceo-outlines-new-computing-opportunities-investments-and-
collaborations-with-burgeoning-china-technology-ecosystem
26
Public-Facing Press Release from BK April IDF Product family launch:
Public-Facing Intel Gateway web site
http://www.intel.com/content/www/us/en/intelligent-systems/gateway-hardware-platforms.html
www.intel.com/iotgateways
Public-Facing Developer Web site + Moon Island Fact Sheet:
Intel Confidential — Do Not Forward
INTEL CONFIDENTIAL
Moon Island Portfolio of Products Decoder Ring
28
Code Name Description Brand Name
Moon Island
Product portfolio name for the Intel Gateways Solutions
for IoT.
Intel® Gateway Solutions for the Internet of Things (IoT)
Shellman Bluff
Intel® Galileo board based development kit with Moon
Island SW stack with a non-production, limited term SW
license (6 months) for development, prototyping, and
testing.
Intel® Gateway Solutions for the Internet of Things Development Kit
DK50 Series
Cross Hill
Intel® Quark™ SoC based gateway solution targeted at
Industrial and Energy market segments.
Intel® Gateway Solutions for the Internet of Things Development Kit
DK100 & Production Kit PK100 Series
Clanton Hill
Intel® Quark™ SoC based gateway solution targeted at
transportation segments.
Intel® Gateway Solutions for the Internet of Things Development Kit
DK200 & Production Kit PK200 Series
Blacks Beach
Intel® Atom SoC based gateway that spans across
multiple verticals such as Industrial, Energy,
Transportation, and Retail.
Intel® Gateway Solutions for the Internet of Things Development Kit
DK300 & Production Kit PK300 Series
INTEL CONFIDENTIAL
Intel® Gateway Solutions for the Internet of Things DK50 Series
29
Intel® Gateway Solutions for Internet of Things (IoT)
Name Development Kit DK50 Series
SoC Intel® Quark™ SoC X1000
Cellular Module N/A
Wi-Fi Module N/A
Temp Range N/A
Software
Wind River Linux* 5.0.1 (Host), Wind River* Intelligent Device Platform XT 2.1,
Wind River* Workbench, McAfee® Embedded Control 6.1
MM# TBD
All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.
*Other names and brands may be claimed as the property of others.
INTEL CONFIDENTIAL
Intel® Gateway Solutions for the Internet of Things DK100 & PK100 Series
Intel® Gateway Solutions for Internet of Things (IoT)
Name Development Kit - DK100 Series Production Kit – PK100 Series
SoC Intel® Quark™ SoC X1000 Intel® Quark™ SoC X1021
Cellular Module Telit* HE-910 N/A
Wi-Fi Module Intel® Dual Band Wireless-AC 7260 N/A
Temp Range 0° - 55°C N/A
Software
Wind River Linux* 5.0.1 (Host),
Wind River* Intelligent Device Platform XT 2.1, Wind River*
Workbench, McAfee® Embedded Control 6.1
N/A (SW entitlement document stating customer can ship
runtime software with the production kit)
MM#
935950 (w/o PRC certification)
935951 (w PRC certification)
TBD
All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.
*Other names and brands may be claimed as the property of others.
30
INTEL CONFIDENTIAL
Intel® Gateway Solutions for the Internet of Things DK200 & PK200 Series
31
Intel® Gateway Solutions for Internet of Things (IoT)
Name Development Kit – DK200 Series Production Kit – PK200 Series
SoC Intel® Quark™ SoC X1000 Intel® Quark™ SoC X1021
Cellular Module Telit* HE-910 N/A
Wi-Fi Module Intel® Dual Band Wireless-AC 7260 N/A
Temp Range 0° - 55°C N/A
Software
Wind River* Linux* 5.0.1 (Host),
Wind River* Intelligent Device Platform XT 2.1, Wind
River* Workbench, McAfee® Embedded Control 6.1
N/A (SW entitlement document stating customer can ship
runtime software with the production kit)
MM# 935953 TBD
All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.
*Other names and brands may be claimed as the property of others.
INTEL CONFIDENTIAL
Intel® Gateway Solutions for the Internet of Things DK300 & PK 300 Series
32
Intel® Gateway Solutions for Internet of Things (IoT)
Code Name Development Kit – DK300 Series Production Kit – PK300 Series
SoC Intel® Atom™ Processor E3826 Intel® Atom™ Processor E3800 Series
Cellular Module Telit* HE-910 N/A
Wi-Fi Module Intel® Dual Band Wireless-AC 7260 N/A
Temp Range -20° - 60°C N/A
Software
Wind River Linux* 5.0.1 (Host),
Wind River* Intelligent Device Platform XT 2.1, Wind
River* Workbench, McAfee® Embedded Control 6.1
N/A (SW entitlement document stating customer can ship
runtime software with the production kit)
MM# 935952 TBD
All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.
*Other names and brands may be claimed as the property of others.
INTEL CONFIDENTIAL
eODM Moon Island Production Kit Process
33
HW Components
• Intel CPU/SOC
Software Components:
• N/A
SW Entitlement Document
• Obtained “rights” to copy
the runtime SW onto the
production kit and
associated HW
• Customer is reminded that
binaries of system image
are inseparably embedded
to production kit
Customer
Purchases
Production
Kits
Production Kit Contents:
Ships to OEMs, End Users,
ISVs, or Integrators
Gateway
Ready to
ship
All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.
*Other names and brands may be claimed as the property of others.

Weitere ähnliche Inhalte

Was ist angesagt?

Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheet
Hai Nguyen
 
Monitoreo y análisis de aplicaciones "Multi-Tier"
Monitoreo y análisis de aplicaciones "Multi-Tier"Monitoreo y análisis de aplicaciones "Multi-Tier"
Monitoreo y análisis de aplicaciones "Multi-Tier"
GeneXus
 
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingCloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
OpSource
 
Faux Disk Encryption....by Drew Suarez & Daniel Mayer
Faux Disk Encryption....by Drew Suarez & Daniel MayerFaux Disk Encryption....by Drew Suarez & Daniel Mayer
Faux Disk Encryption....by Drew Suarez & Daniel Mayer
Shakacon
 

Was ist angesagt? (20)

AET60 product presentation by Advanced Card Systems Ltd.
AET60 product presentation by Advanced Card Systems Ltd.AET60 product presentation by Advanced Card Systems Ltd.
AET60 product presentation by Advanced Card Systems Ltd.
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Atlas brochure
Atlas brochureAtlas brochure
Atlas brochure
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheet
 
Hotel locks-e790-brochure
Hotel locks-e790-brochureHotel locks-e790-brochure
Hotel locks-e790-brochure
 
Monitoreo y análisis de aplicaciones "Multi-Tier"
Monitoreo y análisis de aplicaciones "Multi-Tier"Monitoreo y análisis de aplicaciones "Multi-Tier"
Monitoreo y análisis de aplicaciones "Multi-Tier"
 
Iot forensics
Iot forensicsIot forensics
Iot forensics
 
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingCloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
Access control basics-2
Access control basics-2Access control basics-2
Access control basics-2
 
2FA OTP Hard Token
2FA OTP Hard Token2FA OTP Hard Token
2FA OTP Hard Token
 
System 6000
System 6000System 6000
System 6000
 
Java Card in Banking and NFC
Java Card in Banking and NFCJava Card in Banking and NFC
Java Card in Banking and NFC
 
Faux Disk Encryption....by Drew Suarez & Daniel Mayer
Faux Disk Encryption....by Drew Suarez & Daniel MayerFaux Disk Encryption....by Drew Suarez & Daniel Mayer
Faux Disk Encryption....by Drew Suarez & Daniel Mayer
 
Cloaking is the new perimeter
Cloaking is the new perimeterCloaking is the new perimeter
Cloaking is the new perimeter
 
Embedded System and IoT - ALTEN Calsoft Labs
Embedded System and IoT - ALTEN Calsoft LabsEmbedded System and IoT - ALTEN Calsoft Labs
Embedded System and IoT - ALTEN Calsoft Labs
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 

Andere mochten auch

Strategy frameworks 2013 Asia
Strategy frameworks 2013 AsiaStrategy frameworks 2013 Asia
Strategy frameworks 2013 Asia
Alex Llorens
 

Andere mochten auch (20)

Введение в интернет вещей
Введение в интернет вещейВведение в интернет вещей
Введение в интернет вещей
 
АТС
АТСАТС
АТС
 
Интернет вещей в концепции умных городов
Интернет вещей в концепции умных городовИнтернет вещей в концепции умных городов
Интернет вещей в концепции умных городов
 
Io t open_day_05_2016
Io t open_day_05_2016Io t open_day_05_2016
Io t open_day_05_2016
 
«Центр керування М2М» від Київстар
«Центр керування М2М» від Київстар«Центр керування М2М» від Київстар
«Центр керування М2М» від Київстар
 
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong Authentication
 
Developing Smart Card Web Server Applications
Developing Smart Card Web Server ApplicationsDeveloping Smart Card Web Server Applications
Developing Smart Card Web Server Applications
 
Толока добрих ідей. Інформація для партнерів і благодійників
Толока добрих ідей. Інформація для партнерів і благодійниківТолока добрих ідей. Інформація для партнерів і благодійників
Толока добрих ідей. Інформація для партнерів і благодійників
 
Conociendo el espiritu santo
Conociendo el espiritu santoConociendo el espiritu santo
Conociendo el espiritu santo
 
第二课《英勇的阿南少尉》
第二课《英勇的阿南少尉》第二课《英勇的阿南少尉》
第二课《英勇的阿南少尉》
 
Beyond power point
Beyond power pointBeyond power point
Beyond power point
 
Vishnu CV Pdf
Vishnu CV PdfVishnu CV Pdf
Vishnu CV Pdf
 
Glosario
GlosarioGlosario
Glosario
 
Zaragoza turismo 205
Zaragoza turismo 205Zaragoza turismo 205
Zaragoza turismo 205
 
Actividad colaborativa Maribell Gonzalez y Sandra Vasco
Actividad colaborativa Maribell Gonzalez y Sandra VascoActividad colaborativa Maribell Gonzalez y Sandra Vasco
Actividad colaborativa Maribell Gonzalez y Sandra Vasco
 
Where is CRM headed?
Where is CRM headed?Where is CRM headed?
Where is CRM headed?
 
Integrated Business Planning - Inventory Optimisation Presentation (FREEEE)
Integrated Business Planning - Inventory Optimisation Presentation (FREEEE)Integrated Business Planning - Inventory Optimisation Presentation (FREEEE)
Integrated Business Planning - Inventory Optimisation Presentation (FREEEE)
 
Libro jauja parte 2
Libro jauja parte 2Libro jauja parte 2
Libro jauja parte 2
 
Strategy frameworks 2013 Asia
Strategy frameworks 2013 AsiaStrategy frameworks 2013 Asia
Strategy frameworks 2013 Asia
 
Beneficios y Ventajas de Sistematizar
Beneficios y Ventajas de SistematizarBeneficios y Ventajas de Sistematizar
Beneficios y Ventajas de Sistematizar
 

Ähnlich wie Алексей Слепцов_"Интернет вещей. Что это и для чего"

Intel Public Roadmap for Desktop, Mobile, Data Center
Intel Public Roadmap for Desktop, Mobile, Data CenterIntel Public Roadmap for Desktop, Mobile, Data Center
Intel Public Roadmap for Desktop, Mobile, Data Center
Dr. Wilfred Lin (Ph.D.)
 
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Intel IT Experts Tour   Cyber Security - Matthew Rosenquist 2013Intel IT Experts Tour   Cyber Security - Matthew Rosenquist 2013
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Matthew Rosenquist
 
Lynn Comp - Intel Big Data & Cloud Summit 2013 (2)
Lynn Comp - Intel Big Data & Cloud Summit 2013 (2)Lynn Comp - Intel Big Data & Cloud Summit 2013 (2)
Lynn Comp - Intel Big Data & Cloud Summit 2013 (2)
IntelAPAC
 
Crooke CWF Keynote FINAL final platinum
Crooke CWF Keynote FINAL final platinumCrooke CWF Keynote FINAL final platinum
Crooke CWF Keynote FINAL final platinum
Alan Frost
 

Ähnlich wie Алексей Слепцов_"Интернет вещей. Что это и для чего" (20)

8 intel network builders overview
8 intel network builders overview8 intel network builders overview
8 intel network builders overview
 
Intel Public Roadmap for Desktop, Mobile, Data Center
Intel Public Roadmap for Desktop, Mobile, Data CenterIntel Public Roadmap for Desktop, Mobile, Data Center
Intel Public Roadmap for Desktop, Mobile, Data Center
 
2 new hw_features_cat_cod_etc
2 new hw_features_cat_cod_etc2 new hw_features_cat_cod_etc
2 new hw_features_cat_cod_etc
 
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel ArchitectureDPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
 
1 intro to_dpdk_and_hw
1 intro to_dpdk_and_hw1 intro to_dpdk_and_hw
1 intro to_dpdk_and_hw
 
Austin Cherian: Big data and HPC technologies - intel
Austin Cherian: Big data and HPC technologies - intelAustin Cherian: Big data and HPC technologies - intel
Austin Cherian: Big data and HPC technologies - intel
 
3 additional dpdk_theory(1)
3 additional dpdk_theory(1)3 additional dpdk_theory(1)
3 additional dpdk_theory(1)
 
Intel_IoT_gateway.pdf
Intel_IoT_gateway.pdfIntel_IoT_gateway.pdf
Intel_IoT_gateway.pdf
 
Preparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of ThingsPreparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of Things
 
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Intel IT Experts Tour   Cyber Security - Matthew Rosenquist 2013Intel IT Experts Tour   Cyber Security - Matthew Rosenquist 2013
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
 
AI & Computer Vision (OpenVINO) - CPBR12
AI & Computer Vision (OpenVINO) - CPBR12AI & Computer Vision (OpenVINO) - CPBR12
AI & Computer Vision (OpenVINO) - CPBR12
 
A Path to NFV/SDN - Intel. Michael Brennan, INTEL
A Path to NFV/SDN - Intel. Michael Brennan, INTELA Path to NFV/SDN - Intel. Michael Brennan, INTEL
A Path to NFV/SDN - Intel. Michael Brennan, INTEL
 
Industrial IoT with Intel IoT Gateway & Octoblu
Industrial IoT with Intel IoT Gateway & OctobluIndustrial IoT with Intel IoT Gateway & Octoblu
Industrial IoT with Intel IoT Gateway & Octoblu
 
Intel HPC Update
Intel HPC UpdateIntel HPC Update
Intel HPC Update
 
MeeGo Overview DeveloperDay Munich
MeeGo Overview DeveloperDay MunichMeeGo Overview DeveloperDay Munich
MeeGo Overview DeveloperDay Munich
 
Lynn Comp - Intel Big Data & Cloud Summit 2013 (2)
Lynn Comp - Intel Big Data & Cloud Summit 2013 (2)Lynn Comp - Intel Big Data & Cloud Summit 2013 (2)
Lynn Comp - Intel Big Data & Cloud Summit 2013 (2)
 
Технологии Intel для виртуализации сетей операторов связи
Технологии Intel для виртуализации сетей операторов связиТехнологии Intel для виртуализации сетей операторов связи
Технологии Intel для виртуализации сетей операторов связи
 
Crooke CWF Keynote FINAL final platinum
Crooke CWF Keynote FINAL final platinumCrooke CWF Keynote FINAL final platinum
Crooke CWF Keynote FINAL final platinum
 
Embree Ray Tracing Kernels
Embree Ray Tracing KernelsEmbree Ray Tracing Kernels
Embree Ray Tracing Kernels
 
“Federated Edge Computing System Architectures,” a Presentation from Intel
“Federated Edge Computing System Architectures,” a Presentation from Intel“Federated Edge Computing System Architectures,” a Presentation from Intel
“Federated Edge Computing System Architectures,” a Presentation from Intel
 

Mehr von GeeksLab Odessa

DataScience Lab2017_Коррекция геометрических искажений оптических спутниковых...
DataScience Lab2017_Коррекция геометрических искажений оптических спутниковых...DataScience Lab2017_Коррекция геометрических искажений оптических спутниковых...
DataScience Lab2017_Коррекция геометрических искажений оптических спутниковых...
GeeksLab Odessa
 
DataScienceLab2017_Cервинг моделей, построенных на больших данных с помощью A...
DataScienceLab2017_Cервинг моделей, построенных на больших данных с помощью A...DataScienceLab2017_Cервинг моделей, построенных на больших данных с помощью A...
DataScienceLab2017_Cервинг моделей, построенных на больших данных с помощью A...
GeeksLab Odessa
 
DataScienceLab2017_Высокопроизводительные вычислительные возможности для сист...
DataScienceLab2017_Высокопроизводительные вычислительные возможности для сист...DataScienceLab2017_Высокопроизводительные вычислительные возможности для сист...
DataScienceLab2017_Высокопроизводительные вычислительные возможности для сист...
GeeksLab Odessa
 
DataScience Lab 2017_Графические вероятностные модели для принятия решений в ...
DataScience Lab 2017_Графические вероятностные модели для принятия решений в ...DataScience Lab 2017_Графические вероятностные модели для принятия решений в ...
DataScience Lab 2017_Графические вероятностные модели для принятия решений в ...
GeeksLab Odessa
 
JS Lab 2017_Mapbox GL: как работают современные интерактивные карты_Владимир ...
JS Lab 2017_Mapbox GL: как работают современные интерактивные карты_Владимир ...JS Lab 2017_Mapbox GL: как работают современные интерактивные карты_Владимир ...
JS Lab 2017_Mapbox GL: как работают современные интерактивные карты_Владимир ...
GeeksLab Odessa
 

Mehr von GeeksLab Odessa (20)

DataScience Lab2017_Коррекция геометрических искажений оптических спутниковых...
DataScience Lab2017_Коррекция геометрических искажений оптических спутниковых...DataScience Lab2017_Коррекция геометрических искажений оптических спутниковых...
DataScience Lab2017_Коррекция геометрических искажений оптических спутниковых...
 
DataScience Lab 2017_Kappa Architecture: How to implement a real-time streami...
DataScience Lab 2017_Kappa Architecture: How to implement a real-time streami...DataScience Lab 2017_Kappa Architecture: How to implement a real-time streami...
DataScience Lab 2017_Kappa Architecture: How to implement a real-time streami...
 
DataScience Lab 2017_Блиц-доклад_Турский Виктор
DataScience Lab 2017_Блиц-доклад_Турский ВикторDataScience Lab 2017_Блиц-доклад_Турский Виктор
DataScience Lab 2017_Блиц-доклад_Турский Виктор
 
DataScience Lab 2017_Обзор методов детекции лиц на изображение
DataScience Lab 2017_Обзор методов детекции лиц на изображениеDataScience Lab 2017_Обзор методов детекции лиц на изображение
DataScience Lab 2017_Обзор методов детекции лиц на изображение
 
DataScienceLab2017_Сходство пациентов: вычистка дубликатов и предсказание про...
DataScienceLab2017_Сходство пациентов: вычистка дубликатов и предсказание про...DataScienceLab2017_Сходство пациентов: вычистка дубликатов и предсказание про...
DataScienceLab2017_Сходство пациентов: вычистка дубликатов и предсказание про...
 
DataScienceLab2017_Блиц-доклад
DataScienceLab2017_Блиц-докладDataScienceLab2017_Блиц-доклад
DataScienceLab2017_Блиц-доклад
 
DataScienceLab2017_Блиц-доклад
DataScienceLab2017_Блиц-докладDataScienceLab2017_Блиц-доклад
DataScienceLab2017_Блиц-доклад
 
DataScienceLab2017_Блиц-доклад
DataScienceLab2017_Блиц-докладDataScienceLab2017_Блиц-доклад
DataScienceLab2017_Блиц-доклад
 
DataScienceLab2017_Cервинг моделей, построенных на больших данных с помощью A...
DataScienceLab2017_Cервинг моделей, построенных на больших данных с помощью A...DataScienceLab2017_Cервинг моделей, построенных на больших данных с помощью A...
DataScienceLab2017_Cервинг моделей, построенных на больших данных с помощью A...
 
DataScienceLab2017_BioVec: Word2Vec в задачах анализа геномных данных и биоин...
DataScienceLab2017_BioVec: Word2Vec в задачах анализа геномных данных и биоин...DataScienceLab2017_BioVec: Word2Vec в задачах анализа геномных данных и биоин...
DataScienceLab2017_BioVec: Word2Vec в задачах анализа геномных данных и биоин...
 
DataScienceLab2017_Data Sciences и Big Data в Телекоме_Александр Саенко
DataScienceLab2017_Data Sciences и Big Data в Телекоме_Александр Саенко DataScienceLab2017_Data Sciences и Big Data в Телекоме_Александр Саенко
DataScienceLab2017_Data Sciences и Big Data в Телекоме_Александр Саенко
 
DataScienceLab2017_Высокопроизводительные вычислительные возможности для сист...
DataScienceLab2017_Высокопроизводительные вычислительные возможности для сист...DataScienceLab2017_Высокопроизводительные вычислительные возможности для сист...
DataScienceLab2017_Высокопроизводительные вычислительные возможности для сист...
 
DataScience Lab 2017_Мониторинг модных трендов с помощью глубокого обучения и...
DataScience Lab 2017_Мониторинг модных трендов с помощью глубокого обучения и...DataScience Lab 2017_Мониторинг модных трендов с помощью глубокого обучения и...
DataScience Lab 2017_Мониторинг модных трендов с помощью глубокого обучения и...
 
DataScience Lab 2017_Кто здесь? Автоматическая разметка спикеров на телефонны...
DataScience Lab 2017_Кто здесь? Автоматическая разметка спикеров на телефонны...DataScience Lab 2017_Кто здесь? Автоматическая разметка спикеров на телефонны...
DataScience Lab 2017_Кто здесь? Автоматическая разметка спикеров на телефонны...
 
DataScience Lab 2017_From bag of texts to bag of clusters_Терпиль Евгений / П...
DataScience Lab 2017_From bag of texts to bag of clusters_Терпиль Евгений / П...DataScience Lab 2017_From bag of texts to bag of clusters_Терпиль Евгений / П...
DataScience Lab 2017_From bag of texts to bag of clusters_Терпиль Евгений / П...
 
DataScience Lab 2017_Графические вероятностные модели для принятия решений в ...
DataScience Lab 2017_Графические вероятностные модели для принятия решений в ...DataScience Lab 2017_Графические вероятностные модели для принятия решений в ...
DataScience Lab 2017_Графические вероятностные модели для принятия решений в ...
 
DataScienceLab2017_Оптимизация гиперпараметров машинного обучения при помощи ...
DataScienceLab2017_Оптимизация гиперпараметров машинного обучения при помощи ...DataScienceLab2017_Оптимизация гиперпараметров машинного обучения при помощи ...
DataScienceLab2017_Оптимизация гиперпараметров машинного обучения при помощи ...
 
DataScienceLab2017_Как знать всё о покупателях (или почти всё)?_Дарина Перемот
DataScienceLab2017_Как знать всё о покупателях (или почти всё)?_Дарина Перемот DataScienceLab2017_Как знать всё о покупателях (или почти всё)?_Дарина Перемот
DataScienceLab2017_Как знать всё о покупателях (или почти всё)?_Дарина Перемот
 
JS Lab 2017_Mapbox GL: как работают современные интерактивные карты_Владимир ...
JS Lab 2017_Mapbox GL: как работают современные интерактивные карты_Владимир ...JS Lab 2017_Mapbox GL: как работают современные интерактивные карты_Владимир ...
JS Lab 2017_Mapbox GL: как работают современные интерактивные карты_Владимир ...
 
JS Lab2017_Под микроскопом: блеск и нищета микросервисов на node.js
JS Lab2017_Под микроскопом: блеск и нищета микросервисов на node.js JS Lab2017_Под микроскопом: блеск и нищета микросервисов на node.js
JS Lab2017_Под микроскопом: блеск и нищета микросервисов на node.js
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Алексей Слепцов_"Интернет вещей. Что это и для чего"

  • 1. INTEL CONFIDENTIAL Vitali Damasevich (OSAM) Rome, 15th May 2014 Intel® Gateway Solutions for the Internet of Things (IoT) Overview 1
  • 2. INTEL CONFIDENTIAL • INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. • A "Mission Critical Application" is any application in which failure of the Intel® Product could result, directly or indirectly, in personal injury or death. SHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION, YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES, AND THE DIRECTORS, OFFICERS, AND EMPLOYEES OF EACH, HARMLESS AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE ATTORNEYS' FEES ARISING OUT OF, DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR DEATH ARISING IN ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION, WHETHER OR NOT INTEL OR ITS SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS PARTS. • Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked “reserved" or "undefined". Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. • The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. • Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. • This document contains information on products in the design phase of development. • Intel® processor numbers are not a measure of performance. Processor numbers differentiate features within each processor family, not across different processor families: Go to: Learn About Intel® Processor Numbers • All products, computer systems, dates and figures specified are preliminary based on current expectations, and are subject to change without notice. • Intel® product plans in this presentation do not constitute Intel plan of record product roadmaps. Please contact your Intel representative to obtain Intel's current plan of record product roadmaps. • **Code Names are only for use by Intel to identify products, platforms, programs, services, etc. (“products”) in development by Intel that have not been made commercially available to the public, i.e., announced, launched or shipped. They are never to be used as “commercial” names for products. Also, they are not intended to function as trademarks. • Intel, the Intel logo, Intel Atom and Intel SpeedStep are trademarks of Intel Corporation in the U.S. and/or other countries. • Intel® Active Management Technology (Intel® AMT) requires the platform to have an Intel AMT-enabled chipset, network hardware and software, as well as connection with a power source and a corporate network connection. With regard to notebooks, Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating or powered off. For more information, see http://www.intel.com/technology/iamt. • Enhanced Intel SpeedStep® Technology for specified units of this processor available Q2/06. See the Processor Spec Finder at http://processorfinder.intel.com or contact your Intel representative for more information • 64-bit computing on Intel architecture requires a computer system with a processor, chipset, BIOS, operating system, device drivers and applications enabled for Intel® 64 architecture. Performance will vary depending on your hardware and software configurations. Consult with your system vendor for more information. • No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology is a security technology under development by Intel and requires for operation a computer system with Intel® Virtualization Technology, an Intel Trusted Execution Technology-enabled processor, chipset, BIOS, Authenticated Code Modules, and an Intel or other compatible measured virtual machine monitor. In addition, Intel Trusted Execution Technology requires the system to contain a TPMv1.2 as defined by the Trusted Computing Group and specific software for some uses. See http://www.intel.com/technology/security/ for more information. • Intel® Hyper-Threading Technology (Intel® HT Technology) requires a computer system with an Intel® Pentium® 4 Processor supporting Intel HT Technology and an Intel HT Technology-enabled chipset, BIOS, and operating system. Performance will vary depending on the specific hardware and software you use. See www.intel.com/products/ht/hyperthreading_more.htm for more information including details on which processors support Intel HT Technology. • Intel® Virtualization Technology requires a computer system with an enabled Intel® processor, BIOS, virtual machine monitor (VMM) and, for some uses, certain platform software enabled for it. Functionality, performance or other benefits will vary depending on hardware and software configurations and may require a BIOS update. Software applications may not be compatible with all operating systems. Please check with your application vendor. • Other vendors are listed by Intel as a convenience to Intel's general customer base, but Intel does not make any representations or warranties whatsoever regarding quality, reliability, functionality, or compatibility of these devices. This list and/or these devices may be subject to change without notice. • *Other names and brands may be claimed as the property of others. • Copyright © 2014 Intel Corporation. All rights reserved. Legal Disclaimer 2
  • 3. INTEL CONFIDENTIAL IOT Opportunity *Other names and brands may be claimed as the property of others. Industry Alignment IoT is a Big Opportunity 3
  • 4. INTEL CONFIDENTIAL END TO END ANALYTICS INTELLIGENT GATEWAYSINTELLIGENT DEVICES Solutions from device to cloud to deliver end-to-end customer value Unlocking and sharing valuable data in both legacy and new devices Deliver Intelligence where needed to acquire and filter data securely Intel’s IoT Vision 4
  • 5. INTEL CONFIDENTIAL Assetsto Deliver Value Integrated, highly optimized platforms Aligning Intel’s Approach to IoT Gateways: McAfee*Assetsto Deliver Value * *Other names and brands may be claimed as the property of others. 5
  • 6. INTEL CONFIDENTIAL Family of scalable gateway platforms: Intel® Quark™ -> Intel® Atom™ SoCs Business and software licensing model Integrated, validated solution with McAfee* and Wind River* SW Enables seamless and secure data flow Optimized solutions to meet specific vertical markets Hosts ecosystem apps and services Introducing Intel® Gateway Solutions for IoT *Other names and brands may be claimed as the property of others. 6
  • 7. INTEL CONFIDENTIAL • Fast Time to Market • Unmatched Scalability • Integrated Security Intel® Gateway Solutions for IoT Value Proposition 7
  • 8. INTEL CONFIDENTIAL Intel Gateways Solutions for IoT Platform Technology Pillars Connectivity Manageability Security • PAN (Wi-Fi, Bluetooth*, ZigBee*) • LAN (Ethernet, Wi-Fi) • WAN (2G/3G/LTE) • Connection manager • Cloud connector • OMA DM • TR-069 • OSGi • Web-interface-based configuration and management • Secure device • Secure data • Secure remote management • McAfee* Embedded Control *Other names and brands may be claimed as the property of others. 8
  • 9. INTEL CONFIDENTIAL Connectivity DevelopmentEnvironment Intel BSP: Board and Modules (Intel® Quark™ SoC, Intel® Atom™ SoC) Linux* 5.0.1 Ecosystem Apps & Services SI/ITOs, Customers Manageability SecurityCloud Connector OMA DM TR-069 Web Config OpenSSL* TPM Engine SRM Signing Tool Certificate Management Secure Boot Application Integrity Monitor Application Resource Control Remote Attestation Secure Package Management Encrypted Storage FIPS 140-2 OpenSSL Lib McAfee* Embedded Control Intel Gateways Solutions for IoT Software Third Party 2G/3G/4G Bluetooth* Ethernet Zigbee* Stack Serial / USB VPN WiFi Access Point MQTT Prosys OSGi OpenJdk Sqlite3 LUA Scripting McAfee* Embedded Control *Other names and brands may be claimed as the property of others. Runtime Environment 9
  • 10. INTEL CONFIDENTIAL Intel® Gateway Solutions for IoT Industrial Markets & Energy Markets 1H’ 14 Solutions: Codename: DK & PK 100 Series DK & PK 300 Series SOC Intel® Quark™ SoC X1021 Intel® Atom™ Processor E3800 Series Temp Range 0° - 55°C -20° - 60°C Production WW26 - 32 WW26 - 32 10 Transport Markets 1H’ 14 Solutions: Codename: DK & PK 200 Series DK & PK 300 Series SOC Intel® Quark™ SoC X1021 Intel® Atom™ Processor E3800 Series Temp Range 0° - 55° -20° - 60°C Production WW26 - 32 WW26 - 32 All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. Target Market: Developers 1H’ 14 Solutions: Codename: DK 50 Series SOC Intel® Quark™ SoC X1021 Temp Range N/A Production N/A • Development Kit 100, 200, and 300 Series provides customers a commercial SW license as well as production-ready systems from ODMs • Development Kit 50 Series provides developers a low cost platform with a non-production, limited term SW license (6 months) for development, prototyping, and testing. •
  • 11. INTEL CONFIDENTIAL Intel® Gateway Solutions for the Internet of Things Development Kits DK 50 Series DK 100 Series DK 200 Series DK 300 Series Intel® Quark™ SoC X1000    Intel® Atom™ Processor E3826  Board, radio(s), chassis, power supply Board and Power Supply Only    Software Components: • Wind River* Linux* OS • Wind River IDP XT 2.1 & Workbench Tools • McAfee* Embedded Control • SW License     SW License Non-production, Limited Term License Commercial License Commercial License Commercial License Target Markets Developers Industrial & Energy Transportation Multi Vertical All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. *Other names and brands may be claimed as the property of others. 11
  • 12. INTEL CONFIDENTIAL 12 DK50 – Galileo based development kit  Intel® Quark™ SoC X1000  400 MHz Quark™ Core  512KB eSRAM, 16KB L1 cache  256MB DDR3-800  10/100Mb Ethernet Port  USB2.0 Device Port  USB2.0 Host Port (EHCI/OHCI)  RS-232 UART Port, 3.5mm jack  PCIe Gen 2 Full Mini-card slot  Micro SD slot, up to 32GB  8MB NVRAM SPI NOR flash chip  SPI programming port  10 pin JTAG  Physical Characteristics  6 Layer Board  10cm x 7cm  Arduino Compatible Interface For Educators, Students, and Makers  6 channel A-to-D Converter  1 SPI port (up to 25MHz)  1 UART  1 I2C  14 GPIOs w prog interrupts  6 PWM  Open Source Hardware and Software:  Arduino Software IDE for the Intel® Quark™ SoC X1000  Linux* firmware pre-installed with  Full open source driver  Full open source tool chain  Open HW Documentation  BOM/Schematic/Board File/  Datasheet
  • 13. INTEL CONFIDENTIAL 13 Industrial/Energy Form Factor Reference Design (FFRD) - DK100  Physical System Characteristics  4 Layer Board  10cm x 15cm in enclosure  Intel® Quark™ X1000 Core  400 MHz Quark™ Core  ECC Enabled  Secure Boot  Wireless Connectivity  Intel® Centrino® 6205 Wi-Fi  Telit* HE910 3G with GPS  Zigbee* (X-bee* & Exigen*)  Wired Connectivity  4GB MicroSD  2 10/100 Ethernet Ports  1 USB2.0 Device Port  1 USB2.0 Host Port  1 RS-232 UART Port  Industrial /Energy Specific Features  1 GB DDR3-800  8 channel ADC for sensing raw inputs  1 RS-485 port  Option 3 Energy sensor Modules various voltages ranges and configurations  Certifications (CE, FCC, PTCRB ..)  Development Kit Content:  Chassis with CRB installed  Linux image pre-installed  Power supply, Accessories  Documentation  Quark™ X1000 Software Stack to be downloaded via web site  Safety & Carrier Certified  SW Licenses Comes WITH enclosure
  • 14. INTEL CONFIDENTIAL DK100 front and rear view 14
  • 15. INTEL CONFIDENTIAL 15 Transport Form Factor Reference Design (FFRD) – DK200  Physical System Characteristics  Board in Enclosure  Intel® Quark™ X1000 Core  400 MHz Quark™ Core  ECC Enabled, Secure Boot  512 MB DDR3-800  Vehicle Interface and Network Connectivity  1 High Speed CAN (up to 1Mbps)  1 Fault Tolerant CAN (up to 125 kbps)  6 Ch 12-bit ADC  Wireless Connectivity  PCIe based Wi-Fi  Bluetooth* 4.0  Telit* HE910 3G Modem with GPS  Wired Connectivity  2 10/100 Ethernet Ports  1 USB2.0 Device Port  3 USB2.0 Host Port  1 RS-232 UART Port  4GB MicroSD  Transportation Specific Features  Collision and Rollover Detection via on board Accelerometer  Emergency Call Support with Microphone In and Line Out  Driver Call Button  Driver Alarm Button  4.5V to 28V with Battery Backup  Battery Monitor(s)  Certifications for Transportation use, including CE, FCC, PTCRB)  Development Kit Content:  Chassis with CRB installed  Linux image pre-installed  Power supply, Accessories  Documentation  Safety & Carrier Certified  Quark™ X1000 Software Stack battery mPCIe Comes WITH enclosure
  • 16. INTEL CONFIDENTIAL Wind River IDP main features 16
  • 17. INTEL CONFIDENTIAL Indu/Transport Software Stack 17 Software License Types BSD License Branded or Licensed Binary GPL LicenseDual BSD/GPL License On Die Silicon based ROM Wind River IDP 2.1 Middle IDP 2.0 XT Adders Industrial FFRD DriversTransportation FFRD Drivers Common Kernel Drivers for all FFRDs Common Tools/ Support Software Trusted Boot Trusted Boot ROM OS Loader Linux v3.8 SoC BSP USB Dev SD/eMMC ECC Ethernet SPI USB OHCI GPIO SC ThermalUART UEFI Firmware UEFI 2.3.1 (UDK 2010 plus Bailey Park update) Based BSP Clanton Platform Open CodeuCode update Signing & Flash Tools Yocto Linux Debug OpenOCD JTAG Clanton support in Kernel GNU GRUB v0.97 Bootloader (GPL v2) May not include all software required to enable 3rd party devices or OS for FFRD support (e.g. WR, McAfee, IMC components). USB UHCI Watchdog GPIO NC Pre- UART Telit* HE910 3G LS-ADC I2S Audio Intel Wifi 135/6205/7260 Energy ADC ZigBee™ SPI Mux I2C* RS485CAN Wind River Workbench Transportation Applications Diagnostics e-Call Industrial Applications M2M AggregationUtility Meter Accelerometer Intel® Galileo® GPIO & PWM MuxTPM Arduino IDE Shield Libraries Core Libraries DL Client Java MQTTLUA SRM Connectivity McAfee Embedded Control MI Runtime License
  • 18. INTEL CONFIDENTIAL Tested drivers for Intel IoT Gateway Platform 18
  • 19. INTEL CONFIDENTIAL Intel Gateways Solutions for IoT Development Kits 19 DK50 series DK100 series DK200 series DK300 series Target Markets Developers Industrial, Energy Transportation Industrial, Energy, and Transportation SoC Intel® Quark™ SoC X1000 Intel® Quark™ SoC X1000 Intel® Quark™ SoC X1000 Intel® Atom™ Processor E3826 Software Same with Non-production, Limited Term SW License Wind River Linux* 5.0.1 (Host), Wind River* Intelligent Device Platform XT 2.1, Wind River Workbench, McAfee® Embedded Control 6.1 Data Security and Attestation OpenSSL Library, VPN Certificate Management, Remote Attestation, OpenSSL (HW TPM for DK300), FIPS 140-2 OpenSSL* Library, SRM Signing Tool, Encrypted Storage, VPN End Point Security McAfee* Embedded Control McAfee* Embedded Control, Application Integrity Monitor, Application Resource Control, Secure Package Management, Secure Boot Manageability and Provisioning OMA DM, TR-069, Web-based configuration interfaces OMA DM, TR-069, Web-based configuration interfaces Communications and Connectivity Serial, USB, VPN, MQTT Cellular 2G/3G/4G, Bluetooth*, Serial, USB, VPN, Wi-Fi* Access Point, MQTT, and 802.15.4 (ZigBee* DK100 series only) Runtime Environments Java, OSGi Lua*, Java*, and OSGi* I/O Ethernet* 10/100, USB 2.0 host & device, RS-232, full PCIe* mini card slot, UART 5V/3.3V, SPI for Arduino shield, I2C, 14 digital I/O pins, 12bit 8 channel ADC 2x Ethernet* 10/100, USB 2.0 host & device, RS-232, RS-485, third party optional 802.15.4 (ZigBee*), Wi-Fi*/Bluetooth* mini PCIe Module, 3G (data), SPI (internal), 12bit 8 channel ADC 2x Ethernet* 10/100, USB 2.0 host & device, RS-232, Audio line in/out, CAN*, Wi-Fi*/Bluetooth* mini PCIe Module, 3G (data and voice), 3 axis accelerometer (internal), 12bit 8 channel ADC 2x Ethernet* 10/100/1000, 2x USB 2.0, 1X USB 3.0, RS- 232/422/485, Line in/out, Wi- Fi*/Bluetooth* mini PCIe Module, Cellular WAN mini PCIe module, optional third party ZigBee* via USB, HDMI Memory and Storage 512k SRAM; 256MBytes DDR3, optional micro SD card 512k SRAM; 1 GB ECC DDR3, Onboard SD Card 512k SRAM; 512MB ECC DDR3, Onboard SD Card Up to 8 GB DDR3, 2.5¨ SSD via onboard SATA All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. *Other names and brands may be claimed as the property of others.
  • 20. INTEL CONFIDENTIAL IoT Gateway Development Kit Customer User Experience 20 HW Components • Board, radio(s), chassis, power supply • Intel CPU/SOC Software Components: • Wind River* Linux* OS • Wind River* IDP XT 2.1 & Workbench Tools • McAfee* Embedded Control SW License Customer Purchases Development Kit Development Kit Contents: SW downloaded from Wind River fulfillment servers • Installer file included on USB thumb drive Customer clicks to accept Developer and EULA License Software is registered with Intel and customer receives perpetual license key SW is activated Customer Installs SW Customer builds SW target image and develops SW and Services Host and test ecosystem applications and services Connect to sensors and the cloud Test and evaluate application and services Determine security policies HW/SW Development All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. *Other names and brands may be claimed as the property of others.
  • 21. INTEL CONFIDENTIAL IoT Gateway Development Kit Customer User Experience 21 HW Components • Intel CPU/SOC Software Components: • N/A SW Entitlement Document • Obtained “rights” to copy the runtime SW onto the production kit and associated HW • Customer is reminded that binaries of system image are inseparably embedded to production kit Customer Purchases Gateway from ecosystem Gateway contains Production Kit from Intel Production Kit Contents: Gateway integrated with applications and services and provisioned End to End system integration Gateway shipped to Customer Gateway is deployed in a production environment Services deployed Gateway is deployed All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. *Other names and brands may be claimed as the property of others.
  • 22. INTEL CONFIDENTIAL Ecosystem Engagement Engagements require selling a solution with ecosystem partners Scalable and inter-operable ecosystem is needed to accelerate deployments ODM ISV SI Telco SP OEM End User 22
  • 24. INTEL CONFIDENTIAL Intel Gateways Solutions for IoT Industrial HVAC Use Case Securely connect to HVAC units and send data to the cloud Aggregate, Analyze, Manage Data Intel Gateway Solution for IoT Accelerating Business Transformation Cloud Services Creation and Deployment Performance Management (Owner) • Energy performance benchmarking • Utility grade demand response • Sustainability and regulatory reporting Asset Management (Service) • 24/7/365 anywhere access • Remote diagnostics and monitoring • Online integrated service and parts locator 24
  • 25. INTEL CONFIDENTIAL Summary Intel is developing scalable gateway solutions for IoT Integrated with foundational HW, SW, and security building blocks Securely connects and aggregates data from the edge to the cloud Simplifies the development process and deployment of IoT gateways Delivers value by accelerating business transformation 25
  • 26. INTEL CONFIDENTIAL Additional Information http://newsroom.intel.com/community/intel_newsroom/blog/2014/04/01/intel-ceo-outlines-new-computing-opportunities-investments-and- collaborations-with-burgeoning-china-technology-ecosystem 26 Public-Facing Press Release from BK April IDF Product family launch: Public-Facing Intel Gateway web site http://www.intel.com/content/www/us/en/intelligent-systems/gateway-hardware-platforms.html www.intel.com/iotgateways Public-Facing Developer Web site + Moon Island Fact Sheet:
  • 27. Intel Confidential — Do Not Forward
  • 28. INTEL CONFIDENTIAL Moon Island Portfolio of Products Decoder Ring 28 Code Name Description Brand Name Moon Island Product portfolio name for the Intel Gateways Solutions for IoT. Intel® Gateway Solutions for the Internet of Things (IoT) Shellman Bluff Intel® Galileo board based development kit with Moon Island SW stack with a non-production, limited term SW license (6 months) for development, prototyping, and testing. Intel® Gateway Solutions for the Internet of Things Development Kit DK50 Series Cross Hill Intel® Quark™ SoC based gateway solution targeted at Industrial and Energy market segments. Intel® Gateway Solutions for the Internet of Things Development Kit DK100 & Production Kit PK100 Series Clanton Hill Intel® Quark™ SoC based gateway solution targeted at transportation segments. Intel® Gateway Solutions for the Internet of Things Development Kit DK200 & Production Kit PK200 Series Blacks Beach Intel® Atom SoC based gateway that spans across multiple verticals such as Industrial, Energy, Transportation, and Retail. Intel® Gateway Solutions for the Internet of Things Development Kit DK300 & Production Kit PK300 Series
  • 29. INTEL CONFIDENTIAL Intel® Gateway Solutions for the Internet of Things DK50 Series 29 Intel® Gateway Solutions for Internet of Things (IoT) Name Development Kit DK50 Series SoC Intel® Quark™ SoC X1000 Cellular Module N/A Wi-Fi Module N/A Temp Range N/A Software Wind River Linux* 5.0.1 (Host), Wind River* Intelligent Device Platform XT 2.1, Wind River* Workbench, McAfee® Embedded Control 6.1 MM# TBD All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. *Other names and brands may be claimed as the property of others.
  • 30. INTEL CONFIDENTIAL Intel® Gateway Solutions for the Internet of Things DK100 & PK100 Series Intel® Gateway Solutions for Internet of Things (IoT) Name Development Kit - DK100 Series Production Kit – PK100 Series SoC Intel® Quark™ SoC X1000 Intel® Quark™ SoC X1021 Cellular Module Telit* HE-910 N/A Wi-Fi Module Intel® Dual Band Wireless-AC 7260 N/A Temp Range 0° - 55°C N/A Software Wind River Linux* 5.0.1 (Host), Wind River* Intelligent Device Platform XT 2.1, Wind River* Workbench, McAfee® Embedded Control 6.1 N/A (SW entitlement document stating customer can ship runtime software with the production kit) MM# 935950 (w/o PRC certification) 935951 (w PRC certification) TBD All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. *Other names and brands may be claimed as the property of others. 30
  • 31. INTEL CONFIDENTIAL Intel® Gateway Solutions for the Internet of Things DK200 & PK200 Series 31 Intel® Gateway Solutions for Internet of Things (IoT) Name Development Kit – DK200 Series Production Kit – PK200 Series SoC Intel® Quark™ SoC X1000 Intel® Quark™ SoC X1021 Cellular Module Telit* HE-910 N/A Wi-Fi Module Intel® Dual Band Wireless-AC 7260 N/A Temp Range 0° - 55°C N/A Software Wind River* Linux* 5.0.1 (Host), Wind River* Intelligent Device Platform XT 2.1, Wind River* Workbench, McAfee® Embedded Control 6.1 N/A (SW entitlement document stating customer can ship runtime software with the production kit) MM# 935953 TBD All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. *Other names and brands may be claimed as the property of others.
  • 32. INTEL CONFIDENTIAL Intel® Gateway Solutions for the Internet of Things DK300 & PK 300 Series 32 Intel® Gateway Solutions for Internet of Things (IoT) Code Name Development Kit – DK300 Series Production Kit – PK300 Series SoC Intel® Atom™ Processor E3826 Intel® Atom™ Processor E3800 Series Cellular Module Telit* HE-910 N/A Wi-Fi Module Intel® Dual Band Wireless-AC 7260 N/A Temp Range -20° - 60°C N/A Software Wind River Linux* 5.0.1 (Host), Wind River* Intelligent Device Platform XT 2.1, Wind River* Workbench, McAfee® Embedded Control 6.1 N/A (SW entitlement document stating customer can ship runtime software with the production kit) MM# 935952 TBD All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. *Other names and brands may be claimed as the property of others.
  • 33. INTEL CONFIDENTIAL eODM Moon Island Production Kit Process 33 HW Components • Intel CPU/SOC Software Components: • N/A SW Entitlement Document • Obtained “rights” to copy the runtime SW onto the production kit and associated HW • Customer is reminded that binaries of system image are inseparably embedded to production kit Customer Purchases Production Kits Production Kit Contents: Ships to OEMs, End Users, ISVs, or Integrators Gateway Ready to ship All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. *Other names and brands may be claimed as the property of others.