SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Internet of Things (IoT) 
Ramiro Cid | @ramirocid 
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid 
2 
Index 
1. Introduction Slide 3 
2. History of Internet of Things Slide 5 
3. Applications Slide 6 
4. Use of Internet of Things (TODAY) Slide 7 
5. Use of Internet of Things (NEAR FUTURE) Slide 10 
6. Criticism and controversies Slide 13 
7. Sources used and webs to expand knowledge Slide 14
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid 
Introduction 
The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet 
infrastructure. 
Typically, IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine 
communications (M2M) and covers a variety of protocols, domains, and applications. The interconnection of these embedded devices 
(including smart objects), is expected to usher in automation in nearly all fields, while also enabling advanced applications. 
Integration with the Internet (“Cloud of Things” in other words) implies that devices will utilize an IP address as a unique identifier. 
However, due to the limited address space of IPv4 (which allows for 4.3 billion unique addresses), objects in the IoT will have to use 
IPv6 to accommodate the extremely large address space required, this is an important and necessary upgrade to be done, because, 
according to Gartner, there will be nearly 26 billion devices on the Internet of Things by 2020.
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid 
Introduction 
A thing, in the Internet of Things, can be a person with a heart monitor implant, a farm animal with a biochip transponder, an 
automobile that has built-in sensors to alert the driver when tire pressure is low, a refrigerator, a security camera, etc. 
Internet of Things is a combination between 2 different worlds: Physical World and Virtual World, both need the other.
History of Internet of Things 
Although the concept of “Internet of Things” wasn't named until 1999, the Internet of Things has been in development for decades. 
The first Internet appliance, for example, was a Coke machine at Carnegie Melon University in the early 1980s. The programmers 
could connect to the machine over the Internet, check the status of the machine and determine whether or not there would be a cold 
drink awaiting them, should they decide to make the trip down to the machine. 
The concept of the Internet of Things first became popular through the Auto-ID Center at MIT and related market-analysis 
publications. Radio-frequency identification (RFID) was seen as a prerequisite for the Internet of Things in the early days. If all 
objects and people in daily life were equipped with identifiers, computers could manage and inventory them. Besides using RFID, the 
tagging of things may be achieved through such technologies as near field communication, barcodes, QR codes and digital 
watermarking. 
Nowadays the vision of the Internet of Things has evolved due to a convergence of multiple technologies, ranging from wireless 
communication to the Internet and from embedded systems to micro-electromechanical systems (MEMS). This means that the 
traditional fields of embedded systems, wireless sensor networks, control systems, automation (including home and building 
automation), and others, all have contributions to enable the Internet of Things (IoT). 
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid 
Applications 
The ability to network embedded devices with limited CPU, memory and power resources means that IoT finds applications in nearly 
every field: 
1. Environmental Monitoring: sensors to assist in environmental protection by monitoring air or water quality, atmospheric, etc. 
2. Energy Management: Integration of sensing and actuation systems, connected to the Internet, is likely to optimize energy 
consumption as a whole 
3. Infrastructure Management: Monitoring and controlling operations of urban and rural infrastructures like bridges, railway tracks 
4. Industrial Applications: Network control/management of manufacturing equipment, asset and situation management, or 
manufacturing process control 
5. Building and Home Automation: Monitoring and controlling the mechanical, electrical and electronic systems used in various 
types of buildings 
6. Transport Systems: Assist in integration of communications, control, and information processing across various transportation 
systems 
7. Large Scale Deployments: There are several planned or ongoing large-scale deployments of the IoT, to enable better 
management of cities and systems (example: Start cities) 
8. Medical and Healthcare Systems: IoT devices can be used to enable remote health monitoring and emergency notification 
systems (telemedicine)
Use of Internet of Things (TODAY) 
Nowadays there are hundreds (or thousands) of different types of use of Internet of Things. Companies, individuals use it, is present 
in our homes, mobile (and not mobile) devices (smart phones, tablets, mp3, etc.), home appliances (TV, washing machines, 
refrigerators, etc.), telemedicine devices (included devices inside our bodies like heart monitor implants). 
We will see in the next slides some used of Internet of Things we have nowadays. 
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
Use of Internet of Things (TODAY) 
Internet of things in our homes 
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
Use of Internet of Things (TODAY) 
Extended use of Internet of things 
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
Use of Internet of Things (NEAR FUTURE) 
In the near future the use of Internet of Things will be unmeasurable and maybe unthinkable. Companies and individuals will do an 
extensive use of all kind of technologies, all connected in Internet. Nearly 26 billion devices on the Internet of Things by 2020 
(according to Gartner). 
We will see in the next slides some used of Internet of Things we will have in a few years. 
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
Use of Internet of Things (NEAR FUTURE) 
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid 
Growing evolution
Use of Internet of Things (NEAR FUTURE) 
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid 
Forecast for 2020
Criticism and controversies 
While many technologists though the Internet of Things as a step towards a better world, scholars and social observers have doubts 
about the promises of this computing revolution. 
a. Privacy, autonomy and control: Regarding the use of the very big amount of data (following Big Data concept), there’s simply no 
way to forecast how these immense powers -- disproportionately accumulating in the hands of corporations seeking financial 
advantage and governments craving ever more control 
b. Security: A different criticism is that the Internet of Things is being developed rapidly without appropriate consideration of the 
profound security challenges involved and the regulatory changes that might be necessary. In particular, as the Internet of Things 
spreads widely, cyber attacks are likely to become an increasingly physical (rather than simply virtual) threat 
c. Design: Given widespread recognition of the evolving nature of the design and management of the Internet of Things, sustainable 
and secure deployment of Internet of Things solutions must design for "anarchic scalability." Application of the concept of 
anarchic scalability can be extended to physical systems, by virtue of those systems being designed to account for uncertain 
management futures. Successful execution of the Internet of Things requires consideration of the interface's usability as well as 
the technology itself. These interfaces need to be not only more user friendly but also better integrated 
d. Environmental impact: A concern regarding IoT technologies pertains to the environmental impacts of the manufacture, use, and 
eventual disposal of all these semiconductor-rich devices. Modern electronics are replete with a wide variety of heavy metals and 
rare-earth metals, as well as highly toxic synthetic chemicals. This makes them extremely difficult to properly recycle. 
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
Sources used and webs to expand knowledge 
 “How Fast Is The Internet Growing?” - Author The Connectivist | URL: http://www.theconnectivist.com/2014/05/infographic-the-growth- 
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid 
of-the-internet-of-things/ 
 “Ever Feel like Somebody is Watching You? They Are!” – Author: Privacy Professor 
URL: http://privacyguidance.com/blog/ever-feel-like-somebody-is-watching-you-they-are/ 
 “Six Ways To Define Your Internet Of Things Strategy” – Author: Frank Burkitt | URL: 
http://www.forbes.com/sites/strategyand/2014/12/05/six-ways-to-define-your-internet-of-things-strategy/ 
 “What is Internet of Things (IoT)?” Author: Margaret Rouse | URL: http://whatis.techtarget.com/definition/Internet-of-Things 
 “What is the Internet of Things (IoT)?” - Definition from Techopedia” | URL: http://www.techopedia.com/definition/28247/internet-of-things- 
iot 
 “The Internet of Things - IoT” - Gartner IT | URL: http://www.gartner.com/it-glossary/internet-of-things/ 
 “Internet of Things” | Microsoft | URL: http://www.microsoft.com/en-us/server-cloud/internet-of-things.aspx 
 “Internet of Things (IoT)” - Cisco Systems | URL: http://www.cisco.com/web/solutions/trends/iot/overview.html 
 ”Internet of Things” - Autor: Wikipedia | URL: http://en.wikipedia.org/wiki/Internet_of_Things
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid 
Questions ? 
Many thanks ! 
Ramiro Cid 
CISM, CGEIT, ISO 27001 LA, ISO 22301 LA, ITIL 
ramiro@ramirocid.com 
@ramirocid 
http://www.linkedin.com/in/ramirocid 
http://ramirocid.com http://es.slideshare.net/ramirocid 
http://www.youtube.com/user/cidramiro

Weitere ähnliche Inhalte

Was ist angesagt?

Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Tarika Verma
 
Applications of IOT (internet of things)
Applications of IOT (internet of things)Applications of IOT (internet of things)
Applications of IOT (internet of things)Vinesh Gowda
 
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarRAJESHKUMARG12
 
The Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionThe Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionSathvik N Prasad
 
Internet of things
Internet of thingsInternet of things
Internet of thingsPalak Sood
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Prakash Honnur
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
 
Garbage monitoring system IOT
Garbage monitoring system IOTGarbage monitoring system IOT
Garbage monitoring system IOTamandeep singh
 
Internet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptInternet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptNishant Kayal
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 pptMhae Lyn
 

Was ist angesagt? (20)

Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Applications of IOT (internet of things)
Applications of IOT (internet of things)Applications of IOT (internet of things)
Applications of IOT (internet of things)
 
IoT ppt
IoT pptIoT ppt
IoT ppt
 
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
 
The Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionThe Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolution
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Iot
IotIot
Iot
 
Iot - Internet of Things
Iot - Internet of ThingsIot - Internet of Things
Iot - Internet of Things
 
Internet of things ppt
Internet of things pptInternet of things ppt
Internet of things ppt
 
The future of IOT
The future of IOTThe future of IOT
The future of IOT
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Wearable Computer
Wearable ComputerWearable Computer
Wearable Computer
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Iot
IotIot
Iot
 
Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022
 
Internet of Things (IoT) - IK
Internet of Things (IoT) - IKInternet of Things (IoT) - IK
Internet of Things (IoT) - IK
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Garbage monitoring system IOT
Garbage monitoring system IOTGarbage monitoring system IOT
Garbage monitoring system IOT
 
Internet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptInternet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar ppt
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 

Ähnlich wie Internet of things

Internet Of Things Introduction
Internet Of Things Introduction Internet Of Things Introduction
Internet Of Things Introduction AARYAN GUPTA
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Introduction to IoT.pptx
Introduction to IoT.pptxIntroduction to IoT.pptx
Introduction to IoT.pptxDukeCalvin
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfImXaib
 
Application and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information TechnologyApplication and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information TechnologyDr. Amarjeet Singh
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptxttyu2
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Thingspandey97
 
IoT Classroom Trainings
IoT Classroom TrainingsIoT Classroom Trainings
IoT Classroom TrainingsCOEPD HR
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaionMdShahinAlam25
 
IoT : Research, Development, Challenges
IoT: Research, Development, ChallengesIoT: Research, Development, Challenges
IoT : Research, Development, Challengesbaddi youssef
 
Internet of Things by Shantanu Garg
Internet of Things by Shantanu GargInternet of Things by Shantanu Garg
Internet of Things by Shantanu GargMphasis
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Internet of Things for Smart City
Internet of Things for Smart CityInternet of Things for Smart City
Internet of Things for Smart CityIRJET Journal
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionAbaram Network Solutions
 
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET Journal
 

Ähnlich wie Internet of things (20)

Internet Of Things Introduction
Internet Of Things Introduction Internet Of Things Introduction
Internet Of Things Introduction
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
nptel-1.pdf
nptel-1.pdfnptel-1.pdf
nptel-1.pdf
 
Introduction to IoT.pptx
Introduction to IoT.pptxIntroduction to IoT.pptx
Introduction to IoT.pptx
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
 
Application and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information TechnologyApplication and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information Technology
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoT Classroom Trainings
IoT Classroom TrainingsIoT Classroom Trainings
IoT Classroom Trainings
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
 
IoT : Research, Development, Challenges
IoT: Research, Development, ChallengesIoT: Research, Development, Challenges
IoT : Research, Development, Challenges
 
Internet of Things by Shantanu Garg
Internet of Things by Shantanu GargInternet of Things by Shantanu Garg
Internet of Things by Shantanu Garg
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of Things for Smart City
Internet of Things for Smart CityInternet of Things for Smart City
Internet of Things for Smart City
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial Revolution
 
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...
 

Mehr von Ramiro Cid

Seminario sobre ciberseguridad
Seminario sobre ciberseguridadSeminario sobre ciberseguridad
Seminario sobre ciberseguridadRamiro Cid
 
Captación y registro de comunicaciones orales y de imagen
Captación y registro de comunicaciones orales y de imagenCaptación y registro de comunicaciones orales y de imagen
Captación y registro de comunicaciones orales y de imagenRamiro Cid
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for saleRamiro Cid
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017Ramiro Cid
 
¿Cuáles son los peligros a los que se enfrenta su sistema informático?
¿Cuáles son los peligros a los que se enfrenta su sistema informático?¿Cuáles son los peligros a los que se enfrenta su sistema informático?
¿Cuáles son los peligros a los que se enfrenta su sistema informático?Ramiro Cid
 
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?Ramiro Cid
 
Lean Six Sigma methodology
Lean Six Sigma methodologyLean Six Sigma methodology
Lean Six Sigma methodologyRamiro Cid
 
IT Governance & ISO 38500
IT Governance & ISO 38500IT Governance & ISO 38500
IT Governance & ISO 38500Ramiro Cid
 
Cyber Security Resilience & Risk Aggregation
Cyber Security Resilience & Risk AggregationCyber Security Resilience & Risk Aggregation
Cyber Security Resilience & Risk AggregationRamiro Cid
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection RegulationRamiro Cid
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Thinking on risk analysis
Thinking on risk analysisThinking on risk analysis
Thinking on risk analysisRamiro Cid
 
Drones and their use on critical infrastructure
Drones and their use on critical infrastructureDrones and their use on critical infrastructure
Drones and their use on critical infrastructureRamiro Cid
 
Internet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyInternet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyRamiro Cid
 
Space computing
Space computingSpace computing
Space computingRamiro Cid
 
The relation between internet of things, critical infrastructure and cyber se...
The relation between internet of things, critical infrastructure and cyber se...The relation between internet of things, critical infrastructure and cyber se...
The relation between internet of things, critical infrastructure and cyber se...Ramiro Cid
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Risk optimization management inside it governance
Risk optimization management inside it governanceRisk optimization management inside it governance
Risk optimization management inside it governanceRamiro Cid
 

Mehr von Ramiro Cid (20)

Seminario sobre ciberseguridad
Seminario sobre ciberseguridadSeminario sobre ciberseguridad
Seminario sobre ciberseguridad
 
Captación y registro de comunicaciones orales y de imagen
Captación y registro de comunicaciones orales y de imagenCaptación y registro de comunicaciones orales y de imagen
Captación y registro de comunicaciones orales y de imagen
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for sale
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
¿Cuáles son los peligros a los que se enfrenta su sistema informático?
¿Cuáles son los peligros a los que se enfrenta su sistema informático?¿Cuáles son los peligros a los que se enfrenta su sistema informático?
¿Cuáles son los peligros a los que se enfrenta su sistema informático?
 
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?
 
Lean Six Sigma methodology
Lean Six Sigma methodologyLean Six Sigma methodology
Lean Six Sigma methodology
 
IT Governance & ISO 38500
IT Governance & ISO 38500IT Governance & ISO 38500
IT Governance & ISO 38500
 
Cyber Security Resilience & Risk Aggregation
Cyber Security Resilience & Risk AggregationCyber Security Resilience & Risk Aggregation
Cyber Security Resilience & Risk Aggregation
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection Regulation
 
Payment fraud
Payment fraudPayment fraud
Payment fraud
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Thinking on risk analysis
Thinking on risk analysisThinking on risk analysis
Thinking on risk analysis
 
Drones and their use on critical infrastructure
Drones and their use on critical infrastructureDrones and their use on critical infrastructure
Drones and their use on critical infrastructure
 
Internet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyInternet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacy
 
Space computing
Space computingSpace computing
Space computing
 
The relation between internet of things, critical infrastructure and cyber se...
The relation between internet of things, critical infrastructure and cyber se...The relation between internet of things, critical infrastructure and cyber se...
The relation between internet of things, critical infrastructure and cyber se...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Risk optimization management inside it governance
Risk optimization management inside it governanceRisk optimization management inside it governance
Risk optimization management inside it governance
 

Kürzlich hochgeladen

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Kürzlich hochgeladen (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Internet of things

  • 1. Internet of Things (IoT) Ramiro Cid | @ramirocid ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
  • 2. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid 2 Index 1. Introduction Slide 3 2. History of Internet of Things Slide 5 3. Applications Slide 6 4. Use of Internet of Things (TODAY) Slide 7 5. Use of Internet of Things (NEAR FUTURE) Slide 10 6. Criticism and controversies Slide 13 7. Sources used and webs to expand knowledge Slide 14
  • 3. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid Introduction The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. Typically, IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications (M2M) and covers a variety of protocols, domains, and applications. The interconnection of these embedded devices (including smart objects), is expected to usher in automation in nearly all fields, while also enabling advanced applications. Integration with the Internet (“Cloud of Things” in other words) implies that devices will utilize an IP address as a unique identifier. However, due to the limited address space of IPv4 (which allows for 4.3 billion unique addresses), objects in the IoT will have to use IPv6 to accommodate the extremely large address space required, this is an important and necessary upgrade to be done, because, according to Gartner, there will be nearly 26 billion devices on the Internet of Things by 2020.
  • 4. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid Introduction A thing, in the Internet of Things, can be a person with a heart monitor implant, a farm animal with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low, a refrigerator, a security camera, etc. Internet of Things is a combination between 2 different worlds: Physical World and Virtual World, both need the other.
  • 5. History of Internet of Things Although the concept of “Internet of Things” wasn't named until 1999, the Internet of Things has been in development for decades. The first Internet appliance, for example, was a Coke machine at Carnegie Melon University in the early 1980s. The programmers could connect to the machine over the Internet, check the status of the machine and determine whether or not there would be a cold drink awaiting them, should they decide to make the trip down to the machine. The concept of the Internet of Things first became popular through the Auto-ID Center at MIT and related market-analysis publications. Radio-frequency identification (RFID) was seen as a prerequisite for the Internet of Things in the early days. If all objects and people in daily life were equipped with identifiers, computers could manage and inventory them. Besides using RFID, the tagging of things may be achieved through such technologies as near field communication, barcodes, QR codes and digital watermarking. Nowadays the vision of the Internet of Things has evolved due to a convergence of multiple technologies, ranging from wireless communication to the Internet and from embedded systems to micro-electromechanical systems (MEMS). This means that the traditional fields of embedded systems, wireless sensor networks, control systems, automation (including home and building automation), and others, all have contributions to enable the Internet of Things (IoT). ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
  • 6. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid Applications The ability to network embedded devices with limited CPU, memory and power resources means that IoT finds applications in nearly every field: 1. Environmental Monitoring: sensors to assist in environmental protection by monitoring air or water quality, atmospheric, etc. 2. Energy Management: Integration of sensing and actuation systems, connected to the Internet, is likely to optimize energy consumption as a whole 3. Infrastructure Management: Monitoring and controlling operations of urban and rural infrastructures like bridges, railway tracks 4. Industrial Applications: Network control/management of manufacturing equipment, asset and situation management, or manufacturing process control 5. Building and Home Automation: Monitoring and controlling the mechanical, electrical and electronic systems used in various types of buildings 6. Transport Systems: Assist in integration of communications, control, and information processing across various transportation systems 7. Large Scale Deployments: There are several planned or ongoing large-scale deployments of the IoT, to enable better management of cities and systems (example: Start cities) 8. Medical and Healthcare Systems: IoT devices can be used to enable remote health monitoring and emergency notification systems (telemedicine)
  • 7. Use of Internet of Things (TODAY) Nowadays there are hundreds (or thousands) of different types of use of Internet of Things. Companies, individuals use it, is present in our homes, mobile (and not mobile) devices (smart phones, tablets, mp3, etc.), home appliances (TV, washing machines, refrigerators, etc.), telemedicine devices (included devices inside our bodies like heart monitor implants). We will see in the next slides some used of Internet of Things we have nowadays. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
  • 8. Use of Internet of Things (TODAY) Internet of things in our homes ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
  • 9. Use of Internet of Things (TODAY) Extended use of Internet of things ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
  • 10. Use of Internet of Things (NEAR FUTURE) In the near future the use of Internet of Things will be unmeasurable and maybe unthinkable. Companies and individuals will do an extensive use of all kind of technologies, all connected in Internet. Nearly 26 billion devices on the Internet of Things by 2020 (according to Gartner). We will see in the next slides some used of Internet of Things we will have in a few years. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
  • 11. Use of Internet of Things (NEAR FUTURE) ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid Growing evolution
  • 12. Use of Internet of Things (NEAR FUTURE) ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid Forecast for 2020
  • 13. Criticism and controversies While many technologists though the Internet of Things as a step towards a better world, scholars and social observers have doubts about the promises of this computing revolution. a. Privacy, autonomy and control: Regarding the use of the very big amount of data (following Big Data concept), there’s simply no way to forecast how these immense powers -- disproportionately accumulating in the hands of corporations seeking financial advantage and governments craving ever more control b. Security: A different criticism is that the Internet of Things is being developed rapidly without appropriate consideration of the profound security challenges involved and the regulatory changes that might be necessary. In particular, as the Internet of Things spreads widely, cyber attacks are likely to become an increasingly physical (rather than simply virtual) threat c. Design: Given widespread recognition of the evolving nature of the design and management of the Internet of Things, sustainable and secure deployment of Internet of Things solutions must design for "anarchic scalability." Application of the concept of anarchic scalability can be extended to physical systems, by virtue of those systems being designed to account for uncertain management futures. Successful execution of the Internet of Things requires consideration of the interface's usability as well as the technology itself. These interfaces need to be not only more user friendly but also better integrated d. Environmental impact: A concern regarding IoT technologies pertains to the environmental impacts of the manufacture, use, and eventual disposal of all these semiconductor-rich devices. Modern electronics are replete with a wide variety of heavy metals and rare-earth metals, as well as highly toxic synthetic chemicals. This makes them extremely difficult to properly recycle. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
  • 14. Sources used and webs to expand knowledge “How Fast Is The Internet Growing?” - Author The Connectivist | URL: http://www.theconnectivist.com/2014/05/infographic-the-growth- ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid of-the-internet-of-things/ “Ever Feel like Somebody is Watching You? They Are!” – Author: Privacy Professor URL: http://privacyguidance.com/blog/ever-feel-like-somebody-is-watching-you-they-are/ “Six Ways To Define Your Internet Of Things Strategy” – Author: Frank Burkitt | URL: http://www.forbes.com/sites/strategyand/2014/12/05/six-ways-to-define-your-internet-of-things-strategy/ “What is Internet of Things (IoT)?” Author: Margaret Rouse | URL: http://whatis.techtarget.com/definition/Internet-of-Things “What is the Internet of Things (IoT)?” - Definition from Techopedia” | URL: http://www.techopedia.com/definition/28247/internet-of-things- iot “The Internet of Things - IoT” - Gartner IT | URL: http://www.gartner.com/it-glossary/internet-of-things/ “Internet of Things” | Microsoft | URL: http://www.microsoft.com/en-us/server-cloud/internet-of-things.aspx “Internet of Things (IoT)” - Cisco Systems | URL: http://www.cisco.com/web/solutions/trends/iot/overview.html ”Internet of Things” - Autor: Wikipedia | URL: http://en.wikipedia.org/wiki/Internet_of_Things
  • 15. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid Questions ? Many thanks ! Ramiro Cid CISM, CGEIT, ISO 27001 LA, ISO 22301 LA, ITIL ramiro@ramirocid.com @ramirocid http://www.linkedin.com/in/ramirocid http://ramirocid.com http://es.slideshare.net/ramirocid http://www.youtube.com/user/cidramiro