SlideShare ist ein Scribd-Unternehmen logo
1 von 48
ECVET Training for Operatorsof IoT-enabledSmart Buildings (VET4SBO)
2018-1-RS01-KA202-000411
Level 2
Module 6: Enhanced automation and reduction of
human intervention
Unit 6.4: Limitations of automation solutions
Outline
1. Limitations of IoT-enabled solutions, to avoid errors on the
job
2. What not to expect from the IoT-enabled building automation
solutions
Main challenges faced by IoT
The adoption of IoT is challenged by certain technological limitations,
covering technologies needed to make IoT systems function smoothly.
These technological challenges include: Security, Integration and
Interoperability (Connectivity), Compatibility & Longevity,
Communication Standards and Technologies related to the Intelligent
Analysis & Decision Support for Actions
(Cyber)-security and data privacy
The more data and devices are connected to each other, the bigger the
cybersecurity and data privacy concerns are. It is much easier for hackers to
acquire access to building functions by exploiting vulnerabilities in individual
devices from variety of manufacturers and through variety of communication
protocols.
There are many security measures that are taken to protect the data and
information, however, there is an ongoing battle between security levels and
hacking practices; there is always the possibility that the latter manage to
break into a system and compromise data. For example, well-known groups
of hackers, like Anonymous, hack into governmental and other sites and get
access to confidential information.
(Cyber)-security and data privacy
Consider then the case where all our information and building
operation details are stored on the internet, through IoT; it would
reveal a great deal of details about personal living patterns. There is
also the case of building management companies that may use the
data and information inappropriately, as it happens with other types
of data; there is a lot of value in that information.
The concerns become bigger if one considers that the IoT industry is
currently in its infancy state; during this phase, typically technology
and functionality is the focus, in the hunt for customers and
competition, while security is left behind.
(Cyber)-security and data privacy
With all these security and privacy concerns, there is an issue of who
will be given the trust to control the IoT; and where would the data
be stored? How is the data going to be encrypted during
communication?
How can one trust the automation systems when there is even a
small possibility for a malicious third party to compromise the data?
Imagine the case of appliances operating outside your will, products
with malicious content being delivered after ordering, etc.
(Cyber)-security and data privacy
Furthermore, consider the potential hacking of baby monitors,
smart fridges, thermostats, drug infusion pumps, cameras and
even the radio in your car. There will be so many “attack vectors”
offered to the hackers...
If the IoT is exposed, then the organisationsrelying their
processes on it are equally exposed to security holes.
(Cyber)-security and data privacy
Walled Internet: according to the World Economic Forum, the growing
number of cross border attacks will start pushing national governments
towards breaking up the internet in national, or even regional “walled
gardens”.
This will create major barriers to the flow of content and transactions.
(Cyber)-security and data privacy
Cloud attacks: it is likely that cloud providers will be one of the main targets
of hackers. And cybersecurity is not as advanced as the other IoT
technological and business trends. The World Economic Forum report states
that “a takedown of a single cloud provider could cause $50 billion to $120
billion of economic damage — a loss somewhere between Hurricane Sandy
and Hurricane Katrina”.
(Cyber)-security and data privacy
Security issues related to artificial intelligence (AI): taking a cloud provider’s
infrastructure down, affects hundreds of businesses, government entities,
critical infrastructures, and healthcare organisations. And this may become
feasible when hackers start using artificial intelligence embedded in
machines, to analyse the data and learn the internet security holes and
patterns and create malicious software automatically. It has always been the
case, for technology advances to be used in both good and bad ways.
(Cyber)-security and data privacy
Botnet-related issues: it is expected that small, cheap, consumer devices will
not be that protected in terms of avoiding attacks. There is a risk for this
distributed network of devices to open big security holes to whole building
networks and even utilities (through the utility measurements)and city
infrastructure.
It is thereforenecessary to secure devices with anomaly detection solutions,
to recognise the events of devices showing abnormal behaviour. It also helps
to have clear communication standards with bounds on what data devices
are allowed to send or how often they're allowed to send it.
(Cyber)-security and data privacy
Lack of confidence: Reports (e.g. State of IoT Security research report) state that
90% of consumers lack confidence in the security of IoT devices. As high as 96% of
businesses and 90% of consumers believe there should be IoT security regulations.
Only 14% of consumers believe that they are knowledgeable on IoT device security.
Around 60% percent of consumers are concerned about data being leaked.
Jason Hart, CTO of Data Protection at Gemalto company in The Netherlands, said:
"It's clear that both consumers and businesses have serious concerns around IoT
security and little confidence that IoT service providers and device manufacturers
will be able to protect IoT devices and more importantly the integrity of the data
created, stored and transmitted by these devices…Until there is confidence in IoT
amongst businesses and consumers, [IoT] won't see mainstream adoption…”
Integration and interoperability
Despite the technological advancements and the existence of certain
open protocols like BACnet, Lonworks, ModBus, etc., there is still lack
of widely adopted industry standards, which acts as a barrier to wide
adoption of IoT-enabled buildings.
Many legacy BMSs use their own data representation and
communication standards, leading to inability to achieve vendor- and
technology-independent integration. The result is to have multiple
protocols enabled in a single building simultaneously, creating
unnecessary installation, configuration and maintenance costs.
Integration and interoperability
Integration of devices across building functions has not been the
industry priority in building constructionperiod.
Lack of scalability beyond the physical boundaries of the building
to enable remote controlling and monitoring over the internet
and cloud.
Integration and interoperability
Compatibility challenges: as devices from different manufacturers will be interconnected, the
issue of compatibility in data formatting and communicating becomes bigger. It is unlikely that
all vendors will agree to a single common standard in the foreseeable future (consider non-
unified cloud services, lack of standardized M2M protocols and diversities in firmware and
operating systems among IoT devices).
These issues may result in consumers being locked to specific devices’ vendors, thus preventing
the real wide adoption of the IoT and seriously limiting its foreseen value.
And many of the adopted technologies will eventually become obsolete in the next few years,
causing major costs to consumers that will invest on them; who would like their IoT appliances
(such as smart fridges or TVs) to require replacement in 2-5 years?
Integration and interoperability
Connectivity challenges: connecting so many devices will be a challenge for current
communication models and technologies. For instance the server/client
authentication/authorisation mechanisms will suffer from the volume of devices requiring to
be securely connected. What will happen when billions and hundreds of billions of devices will
ask to join existing networks? Entire systems can go down, if the servers’ infrastructure
becomes unavailable.
It is expected that the future of IoT will be the decentralised networks. Moving much data
processing and analysis to the edge, with devices taking some mission-critical operations
locally, may help smoothing a little bit the connectivity problem.
There can also be solutions adopting peer-to-peer authentication/authorisation models,
without the need of a centralised broker; consider the possible merging of IoT technologies
with Blockchain distributed trust infrastructure.
Integration and interoperability
Standards:
Technology standards which include network protocols,
communication protocols and data-aggregation formats are defining
ways to handle, process and store the data collected from the IoT
devices.
There are certain challenges related to handling unstructured data:
While structured data are stored in relational databases and queried
through (standard) SQL, unstructured data are stored in different
types of NoSQL databases, where there are no standard querying
approaches.
Scalability limitations
Even smart BMS data, still today, suffer from their inherent lack of
scalability. It was impractical in the past and it still is impractical in the
new IoT era to have buildings installing only compatible equipment
from specific vendors, using specific communication protocols and so
on.
Usually vendors are reluctant to adopt open protocols; especially the
“strong” players in the market, tend to push their own proprietary
data communication protocols, which closes the door to any third-
party integrations, thus killing scalability.
Data capturing and processing limitations
According to scientists and engineers, analysing and visualising the dense BMS data, will offer to building
operators the means to produce the ideal environment for occupants, in a more energy and cost
effective way.
However, there currently exist practical limitations with the data that can be captured by building
managementsystems, as well as limitations on the extent to which BMS data can be used to achieve the
aforementioned goal.
As of today, it is still expensive to capture and maintain data. Although the cost of sensors
has considerably dropped in recent years, the cost of a complete deployment of a BMS solution is still
high. Even the cheapest options have a cost of around €5 per square meter. And this is even for solving
individual problems, such as basic lighting controls.
[1] Evans, D. (2011) The Internet of Things: How the Next Evolution of the Internet Is Changing Everything.
http://www.cisco.com/web/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf
Data capturing and processing limitations
In addition, there is a cost related to using the data. There is a need for expert and
dedicated building engineers to be analysing the data and adjusting set points and
configurations to derive value. This is time consuming and costly. Even in the case of
using a software to analyse and visualise the data, there are additional costsinvolved
with the product or service used for that.
Phone service suppliers such as Verizon and AT&T are no longer offering unlimited data
usage for mobile phones because it is too costly, yet by 2020 it is expected that 50
billion devices will be connected,collecting and storing data. [1]
[1] Evans, D. (2011) The Internet of Things: How the Next Evolution of the Internet Is Changing Everything.
http://www.cisco.com/web/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf
Data value limitations
Data alone have no or little value; what carries value is the decision-making
information that hides within the datasets.
In the case of buildings, relevant decisions include equipment schedules, set points,
system configuration optimisations, etc. For instance, one can reduce the operation
costs of a building by simply turning off certain devices/functions (e.g. heating, lights),
when nobody benefits from them.
Data value limitations
However, the benefit is much prominent in certain types of buildings, such as hotels or
big office complexes,which have a very dynamic profile of usage patterns. There is not
much space for optimisation, and subsequently for savings, when it comes to
residential or long-rented office buildings with consistentusage patterns.
Would it be worth the investment of data capturing and visualisations if the
optimisation space appears to be small?
Data value limitations
Intelligent data analysis and actionable decisions
In many cases, data analysis is driven by cognitive technologies and the
accompanying models that facilitate the use of cognitive technologies. Artificial
intelligence models can be trained and improved with large data sets, which will be
available through cloud providers of services to smart buildings. New algorithms
and improvements in existing ones will become available through the increased
data availability.
However, there is always the chance of inaccurate analysis due to flaws in the data
and/or the models describing the data, thus exposing various algorithmic
limitations. This is coupled with the fact that most IoT interactions generate
unstructured data and there are no widely adopted ways of managing these data.
Data value limitations
Intelligent data analysis and actionable decisions
Moreover, traditional analytics software are not yet ready to analyse
real-time data streams, considering the volume, velocity and variety
of information captured.
The challenges are summarised as:
• slow emergence of technologies to handle real-time data and
analyse them
• machines’ actions in unpredictable situations
• mean-reverting human behaviour
Over-reliance on technology
Imagine scenarios where
• Your fridge can identify that you have run out of milk; it contactsthe supermarket
and orders the quantity you usually need, and also informs you by sending a
message on your phone
• Your alarm rings at 6:30 am; you wake up and switch it off. As soon as you switch off
your alarm, it conveys to the geyser to heat water at a temperature you prefer and
also the coffee maker starts brewing coffee!
Over-reliance on technology
It becomes obvious that, like it did happen with the internet and the mobile devices,
our lives will be increasingly controlled by and depend on technology. We need to
make an early clear decision on how much of our daily lives we are willing to let be
controlled by technology. We need to understand that no machine system is robust and
fault-free. The more we entrust and the more dependent we are on the IoT, could lead
to a potentially catastrophic event if things collapse.
The IoT systems will be complex, thus creating more opportunities of failure. Imagine
scenarios where a bug in the software ends up automatically turning on and off the air-
conditioning system and lights every few minutes.
Potential loss of jobs
There is a big concern that reliance on the IoT and offering of
advanced automation will eventually result in the loss of jobs. The
impact is expected to be higher on the less-educated workers.
For example, people who manage inventories will lose their jobs,
because devices can not only communicate between each other, but
transmit that information to the owner. There are already jobs being
lost to automated machines, such as the checkout line in
supermarkets and even ATM’s.
Potential loss of jobs
It results to a decrease in employment of menial staff!
The unskilled workers and helpers may end up losing their jobs in
the effect of automation of daily activities. This can lead to (at
least temporary) unemployment issues in the society.
The answer is education. There will be tremendous need for
highly-educatedstaff to manage the automated systems, train
the AI algorithms and maintain them.
Business-related issues
If businesses start investing in IoT without sound plans, then the
model will fail.
It is expected that end-to-end solution providers operating in
vertical industries and delivering services using cloud analytics
will be the most successful at monetizing a large portion of the
value in IoT.
Business-related issues
IoT can be divided into 3 categories, based on usage and clients base:
• Consumer IoT includes the connected devices such as smart cars,
phones, watches, laptops, connected appliances and entertainment
systems.
• Commercial IoT includes things like inventory controls, device
trackers and connected medical devices.
• Industrial IoT covers things such as connected electric meters,
waste water systems, flow gauges, pipeline monitors,
manufacturing robots and other types of connected industrial
devices and systems.
Business-related issues
Devices without IoT capabilities may be more expensive in the future, since
they will lack data that can be utilised by manufacturers.
Missing regulatory standards: But, regulatory standards for all these IoT and
data markets need to be in place; need to regulate companies that sell data
collected from various sources. There is a lack of transparency about who
gets access to data and how those data are used to develop products or
services and sold to advertisers and third parties. There is a need for clear
guidelines on the retention, use and security of the data including metadata
(the data that describe other data).
Society-related issues
Understanding IoT from the customersand regulators perspective is not an easy task
for the following reasons:
• Customer demands and requirements change dynamically
• New uses for devices—as well as new devices— emerge
• Inventing and reintegrating must-have features and capabilities are expensive and
take time and resources
• The uses for IoT technology are also expanding dynamically
Society-related issues
Consumer confidence: The above may limit the will of consumers to adopt IoT and connecting
their lives to the internet. This challenge becomes bigger with the lack of understanding or
education by consumers of best practices for IoT devices security to help in improving privacy.
Beyond data privacy: consider integrating devices into our environments without us
consciously using them, e.g. tracking devices for phones and cars, as well as smart televisions
with voice recognition or vision features that can continuously listen to conversations or watch
for activity and selectively transmit that data to a cloud service for processing, which
sometimes includes a third party.
In addition, there are IoT scenarios that involve cross-national and cross-cultural deployments,
thus increasing the interoperability challenges related to societal issue. Privacy of people and
data need to consider not only technological dimensions, but also cultural and societal.
Technological limitations related to the IoT leverage
The Web of Things role in the IoT [2]
There are currently no clear boundaries to what the IoT is or is not. The Internet extends into
the physical world.
As discussed, “the Internet of Things (IoT) is a system of physical objects that can be
discovered, monitored, controlled or interacted with by electronic devices which communicate
over various networking interfaces, and eventually can be connected to the wider Internet”.
Scenarios where physical objects feel the world through sensors and then analyse, store and
exchange information are becoming reality. These objects are typically called: smart things.
Such Things go beyond the physical objects, accompanied by information stored digitally and
describing the Thing, which can be sensors, actuators, computation components,
communication interfaces.
[2] https://www.manning.com/books/building-the-web-of-things?a_bid=16f48f14&a_aid=wot
Technological limitations related to the IoT leverage
The physical world is extended in various ways, through a range of technologies that
started with the use of tags of objects (QR codes, RFID Tags), then emerged with
devices like Arduino and Raspberry Pi, continued with machines like all those smart
sensors and smart cars and is emerging with automating whole environments like
buildings and cities.
Technological limitations related to the IoT leverage
The Internet part of IoT, enables the Thing (i.e. its associated data and
services, inputs/outputs) to be accessed and processed by third-party
applications through the existing Internet infrastructure.
This means that the Thing can exist on the Internet even in the cases
where it is not physically connected to the Internet.
As of today, there are no unique and universal data formatting, data
communication and application protocols for IoT. This means that the
IoT of today is a collection of isolated Intranets of Things that are not
able to interact with each other.
Milis, George, Panayiotou, Christos, & Polycarpou, Marios. (2017). SEMIoTICS: Semantically-enhanced IoT-enabled Intelligent Control Systems. IEEE
Internet of Things Journal, (Special Issue IoT Feedback Control). http://doi.org/10.5281/zenodo.1053854
Technological limitations related to the IoT leverage
For all these Things to communicate seamlessly, a common
“language” would be necessary, for devices and applications to
understand each other, regardless of their physical technology
particularities.
Technology is already there, yet still not utilised in its full. It’s been
more than 20 years that Web technologies exist to make data and
services interoperable. Such technologies are related to the Semantic
Web, which is about Things on the internet and widely adopted Web
protocols and standards that make data and services offered by
objects more accessible to a larger pool of (Web) developers. [3]
Milis, George, Panayiotou, Christos, & Polycarpou, Marios. (2017). SEMIoTICS: Semantically-enhanced IoT-enabled Intelligent Control Systems. IEEE
Internet of Things Journal, (Special Issue IoT Feedback Control). http://doi.org/10.5281/zenodo.1053854
Technological limitations related to the IoT leverage
The limitations of the IoT become obvious when one wants to
integrate devices from various manufacturers into a single application
or system.
Building cross-functionality applications in buildings would require
smart lights from vendor A, HVAC system from vendor B, air quality
sensors from vendor C, and so on. Making these devices and systems
talk and work with each other will require lots of custom system
integration work.
Technological limitations related to the IoT leverage
Building this type of interoperability in custom hard-coding projects, will end
up having systems with zero robustness and big potential maintenance costs;
not to mention the lack of scalability and extensibility, security,
configurability.
In an ideal scenario, any device should be able to seamlessly integrate and
talk to other devices, having its data consumed by any application from any
vendor, regardless of the networking protocols used by those devices.
This is exactly where the Semantic Web would come into play.
Technological limitations related to the IoT leverage
It would be beneficial for the IoT to reuse the technology that enables Web services like
Facebook or Google to scale to millions of concurrent users, without compromising on
security or performance.
Until today, the IoT communities have been working mostly on devices and networking
issues. The Semantic Web, on the other hand, has been focusing for decades on the
application layer and the interoperability between data and services.
Properly mapping the devices into the Web layer, makes immediately all Things agnostic to
the physical and transport layer protocols used by the underline devices. What is needed is
only a set of “semantic web drivers”, which will hold a part of the information associated
with a Thing and its virtual existence on the Internet.
Technological limitations related to the IoT leverage
The Web has already become the global integration platform for distributed
applications over the Internet. Therefore,this can be extended to the
integration of the physical world applications and services, by hiding the
complexity and differences between various transport protocols used in the
IoT. Developers of IoT applications should focus on the logic of their
applications, without having to deal with the underline technicalities.
If there is no single language to be spoken by all devices, then we need a
transparent translator that will make the interactions seamless. Having such a
“semantic layer” (see Units of Level 3) would minimise the effort requiredto
maintain the system each time a device or service is added, removed, or
updated.
Technological limitations related to the IoT leverage
Such a step is realistic today, since devices can have embedded Web
servers with advanced features at low cost. Combining this with the
JavaScript advances, data processing for the language translations
maintenance can happen on the client devices or on cloud services,
thus saving computation power of servers on embedded devices.
When Things are connected on the Web, they will use the same
standards and techniques as traditional Web services. This means
that developers will be able to write IoT applications that interact
with embedded devices in exactly the same way as they write
applications to interact with any RESTful services over Web APIs.
Technological limitations related to the IoT leverage
REST is an architectural style for developing distributed applications and is
the basis upon which the modern Web is built. The essence of REST is to
focus on creating loosely coupled services that can be easily reused, which is
implemented using URIs, HTTP and standardized media types.
Abstracting the services from their application-specific semantics thanks to a
uniform interface (HTTP verbs and response codes) makes it easy to build
loosely coupled services, as it provides a simple mechanism for clients to
select the best possible representations for interactions. This makes the Web
the ideal substrate for building a “universal” architecture and Application
Programming Interface (API) to interact with Things.
Technological limitations related to the IoT leverage
• In practice, this means developers
can start interacting with Things via
Web browsers. Real-time data
collected from distributed sensors
can then be easily retrieved,
processed and displayed on the
Web, using HTML, CSS and
JavaScript technologies. This is
particularly interesting because it
enables anyone with basic Web
programming skills to build Web
sites and applications with real-time
data from the physical world.
Technological limitations related to the IoT leverage
It must be clarified that the Web technologies for the Things can
work equally well in local internets, e.g. in single buildings or
groups of buildings.
In some cases, it would make sense for Things to have a public
URL and be openly accessible over the Web. For example, traffic
or pollution sensors in a city operated by the public authorities
would be useful information in an air quality applicationof a
building in that city.
Technological limitations related to the IoT leverage
Web-connected objects can also become active and participate
to the Web as other users, by publishing their own blogs or talk
to each other using the APIs of services such as Twitter.
Leveraging the IoT into the Web represents a natural and very
promising evolution of the IoT, that would overcome a set of
today’s technologicallimitations.
Resources
• https://www.enertiv.com/resources/blog/4-limitations-bms-data
• https://sites.google.com/a/cortland.edu/the-internet-of-things/disadvantages
• https://www.linkedin.com/pulse/advantages-disadvantages-internet-things-iot-
tommy-quek/
• https://www.manning.com/books/building-the-web-of-
things?a_bid=16f48f14&a_aid=wot
• https://iot.ieee.org/newsletter/march-2017/three-major-challenges-facing-
iot.html
• https://www.cmswire.com/cms/internet-of-things/7-big-problems-with-the-
internet-of-things-024571.php
• https://dzone.com/articles/problems-with-internet-of-things-you-need-to-know
Disclaimer
For further information, relatedto the VET4SBO project, please visit the project’swebsite at https://smart-building-
operator.euor visit us at https://www.facebook.com/Vet4sbo.
Downloadour mobile app at https://play.google.com/store/apps/details?id=com.vet4sbo.mobile.
This project (2018-1-RS01-KA202-000411) has been funded with support from the European Commission (Erasmus+
Programme). Thispublicationreflects the views only of the author, and the Commission cannot be held responsible
for any use which may be made of the informationcontainedtherein.

Weitere ähnliche Inhalte

Was ist angesagt?

THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
 
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Tyrone Systems
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsShyam Goyal
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain ConvergenceAhmed Banafa
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using BlockchainIRJET Journal
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutionsijtsrd
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
 
Eclipse M2M Industry Working Group
Eclipse M2M Industry Working GroupEclipse M2M Industry Working Group
Eclipse M2M Industry Working GroupBenjamin Cabé
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019Ahmed Banafa
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU Ahmed Banafa
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...IRJET Journal
 
IoT, AI and Blockchain: Catalysts for Digital Transformation
IoT, AI and Blockchain: Catalysts for Digital TransformationIoT, AI and Blockchain: Catalysts for Digital Transformation
IoT, AI and Blockchain: Catalysts for Digital TransformationAhmed Banafa
 
Trust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT DevicesTrust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT Devicesijtsrd
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceAltoros
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_AdamsJulius Adams
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...Lillie Coney
 
Top five emerging technology in industry
Top five emerging technology in industryTop five emerging technology in industry
Top five emerging technology in industryAgitAjey
 

Was ist angesagt? (19)

THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
 
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
 
Eclipse M2M Industry Working Group
Eclipse M2M Industry Working GroupEclipse M2M Industry Working Group
Eclipse M2M Industry Working Group
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
76 s201918
76 s20191876 s201918
76 s201918
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
 
IoT, AI and Blockchain: Catalysts for Digital Transformation
IoT, AI and Blockchain: Catalysts for Digital TransformationIoT, AI and Blockchain: Catalysts for Digital Transformation
IoT, AI and Blockchain: Catalysts for Digital Transformation
 
Trust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT DevicesTrust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT Devices
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to Face
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
 
Top five emerging technology in industry
Top five emerging technology in industryTop five emerging technology in industry
Top five emerging technology in industry
 

Ähnlich wie VET4SBO Level 2 module 6 - unit 4 - v0.9 en

F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docxjeffevans62972
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docxodiliagilby
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyEricsson
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts#essaywriting
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.Pooja G N
 
Block chain for iot
Block chain for iotBlock chain for iot
Block chain for iotkalvi group
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture Symantec
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxvoversbyobersby
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperMartin Ruubel
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)Saurabh Yadav
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
Blockchain IoT Security Why do we need it.pdf
Blockchain IoT Security Why do we need it.pdfBlockchain IoT Security Why do we need it.pdf
Blockchain IoT Security Why do we need it.pdfRosalie Lauren
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptxinfosec train
 

Ähnlich wie VET4SBO Level 2 module 6 - unit 4 - v0.9 en (20)

Lecture 14
Lecture 14Lecture 14
Lecture 14
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked Society
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.
 
sample assignment
sample assignmentsample assignment
sample assignment
 
Block chain for iot
Block chain for iotBlock chain for iot
Block chain for iot
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
IoT in industry
IoT in industryIoT in industry
IoT in industry
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
Blockchain IoT Security Why do we need it.pdf
Blockchain IoT Security Why do we need it.pdfBlockchain IoT Security Why do we need it.pdf
Blockchain IoT Security Why do we need it.pdf
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
 

Mehr von Karel Van Isacker

DIGITOUR IO4: Manual for trainers GR
DIGITOUR IO4: Manual for trainers GRDIGITOUR IO4: Manual for trainers GR
DIGITOUR IO4: Manual for trainers GRKarel Van Isacker
 
DIGITOUR IO4: Manual for trainees GR
DIGITOUR IO4: Manual for trainees GRDIGITOUR IO4: Manual for trainees GR
DIGITOUR IO4: Manual for trainees GRKarel Van Isacker
 
DIGITOUR IO4: Manual for trainees ES
DIGITOUR IO4: Manual for trainees ESDIGITOUR IO4: Manual for trainees ES
DIGITOUR IO4: Manual for trainees ESKarel Van Isacker
 
DIGITOUR IO4: Manual for trainers ES
DIGITOUR IO4: Manual for trainers ESDIGITOUR IO4: Manual for trainers ES
DIGITOUR IO4: Manual for trainers ESKarel Van Isacker
 
DIGITOUR IO4: Manual for trainees ES
DIGITOUR IO4: Manual for trainees ESDIGITOUR IO4: Manual for trainees ES
DIGITOUR IO4: Manual for trainees ESKarel Van Isacker
 
DIGITOUR IO4: Manual for trainers NL
DIGITOUR IO4: Manual for trainers NLDIGITOUR IO4: Manual for trainers NL
DIGITOUR IO4: Manual for trainers NLKarel Van Isacker
 
DIGITOUR IO4: Manual for trainees NL
DIGITOUR IO4: Manual for trainees NLDIGITOUR IO4: Manual for trainees NL
DIGITOUR IO4: Manual for trainees NLKarel Van Isacker
 
EcologyKM company presentation 2022 new
EcologyKM company presentation 2022 newEcologyKM company presentation 2022 new
EcologyKM company presentation 2022 newKarel Van Isacker
 
EcologyKM company presentation 2022
EcologyKM company presentation 2022EcologyKM company presentation 2022
EcologyKM company presentation 2022Karel Van Isacker
 
DIGITOUR IO4: Manual for trainees EN
DIGITOUR IO4: Manual for trainees ENDIGITOUR IO4: Manual for trainees EN
DIGITOUR IO4: Manual for trainees ENKarel Van Isacker
 
DIGITOUR IO4: Manual for trainers EN
DIGITOUR IO4: Manual for trainers ENDIGITOUR IO4: Manual for trainers EN
DIGITOUR IO4: Manual for trainers ENKarel Van Isacker
 
DIPCE How to use platform and mobile apps EL
DIPCE How to use platform and mobile apps ELDIPCE How to use platform and mobile apps EL
DIPCE How to use platform and mobile apps ELKarel Van Isacker
 
DIPCE IO3: How to use platform and mobile apps ES
DIPCE IO3: How to use platform and mobile apps ESDIPCE IO3: How to use platform and mobile apps ES
DIPCE IO3: How to use platform and mobile apps ESKarel Van Isacker
 
HIPPOTHERAPY and sensory processing BG
HIPPOTHERAPY and sensory processing BGHIPPOTHERAPY and sensory processing BG
HIPPOTHERAPY and sensory processing BGKarel Van Isacker
 
HIPPOTHERAPY and sensory processing TR
HIPPOTHERAPY and sensory processing TRHIPPOTHERAPY and sensory processing TR
HIPPOTHERAPY and sensory processing TRKarel Van Isacker
 
HIPPOTHERAPY and sensory processing EN
HIPPOTHERAPY and sensory processing ENHIPPOTHERAPY and sensory processing EN
HIPPOTHERAPY and sensory processing ENKarel Van Isacker
 

Mehr von Karel Van Isacker (20)

DIGITOUR IO4: Manual for trainers GR
DIGITOUR IO4: Manual for trainers GRDIGITOUR IO4: Manual for trainers GR
DIGITOUR IO4: Manual for trainers GR
 
DIGITOUR IO4: Manual for trainees GR
DIGITOUR IO4: Manual for trainees GRDIGITOUR IO4: Manual for trainees GR
DIGITOUR IO4: Manual for trainees GR
 
DIGITOUR IO4: Manual for trainees ES
DIGITOUR IO4: Manual for trainees ESDIGITOUR IO4: Manual for trainees ES
DIGITOUR IO4: Manual for trainees ES
 
DIGITOUR IO4: Manual for trainers ES
DIGITOUR IO4: Manual for trainers ESDIGITOUR IO4: Manual for trainers ES
DIGITOUR IO4: Manual for trainers ES
 
DIGITOUR IO4: Manual for trainees ES
DIGITOUR IO4: Manual for trainees ESDIGITOUR IO4: Manual for trainees ES
DIGITOUR IO4: Manual for trainees ES
 
DIGITOUR IO4: Manual for trainers NL
DIGITOUR IO4: Manual for trainers NLDIGITOUR IO4: Manual for trainers NL
DIGITOUR IO4: Manual for trainers NL
 
DIGITOUR IO4: Manual for trainees NL
DIGITOUR IO4: Manual for trainees NLDIGITOUR IO4: Manual for trainees NL
DIGITOUR IO4: Manual for trainees NL
 
EcologyKM company presentation 2022 new
EcologyKM company presentation 2022 newEcologyKM company presentation 2022 new
EcologyKM company presentation 2022 new
 
EcologyKM company presentation 2022
EcologyKM company presentation 2022EcologyKM company presentation 2022
EcologyKM company presentation 2022
 
DIGITOUR IO4: Manual for trainees EN
DIGITOUR IO4: Manual for trainees ENDIGITOUR IO4: Manual for trainees EN
DIGITOUR IO4: Manual for trainees EN
 
DIGITOUR IO4: Manual for trainers EN
DIGITOUR IO4: Manual for trainers ENDIGITOUR IO4: Manual for trainers EN
DIGITOUR IO4: Manual for trainers EN
 
DIPCE How to use platform and mobile apps EL
DIPCE How to use platform and mobile apps ELDIPCE How to use platform and mobile apps EL
DIPCE How to use platform and mobile apps EL
 
DIPCE IO3: How to use platform and mobile apps ES
DIPCE IO3: How to use platform and mobile apps ESDIPCE IO3: How to use platform and mobile apps ES
DIPCE IO3: How to use platform and mobile apps ES
 
HIPPOTHERAPY and sensory processing BG
HIPPOTHERAPY and sensory processing BGHIPPOTHERAPY and sensory processing BG
HIPPOTHERAPY and sensory processing BG
 
HIPPOTHERAPY and sensory processing TR
HIPPOTHERAPY and sensory processing TRHIPPOTHERAPY and sensory processing TR
HIPPOTHERAPY and sensory processing TR
 
HIPPOTHERAPY and sensory processing EN
HIPPOTHERAPY and sensory processing ENHIPPOTHERAPY and sensory processing EN
HIPPOTHERAPY and sensory processing EN
 
HIPPOTHERAPY MODULE 14 BG
HIPPOTHERAPY MODULE 14 BGHIPPOTHERAPY MODULE 14 BG
HIPPOTHERAPY MODULE 14 BG
 
HIPPOTHERAPY MODULE 13 BG
HIPPOTHERAPY MODULE 13 BGHIPPOTHERAPY MODULE 13 BG
HIPPOTHERAPY MODULE 13 BG
 
HIPPOTHERAPY MODULE 12 BG
HIPPOTHERAPY MODULE 12 BGHIPPOTHERAPY MODULE 12 BG
HIPPOTHERAPY MODULE 12 BG
 
HIPPOTHERAPY MODULE 11 BG
HIPPOTHERAPY MODULE 11 BGHIPPOTHERAPY MODULE 11 BG
HIPPOTHERAPY MODULE 11 BG
 

Kürzlich hochgeladen

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 

Kürzlich hochgeladen (20)

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

VET4SBO Level 2 module 6 - unit 4 - v0.9 en

  • 1. ECVET Training for Operatorsof IoT-enabledSmart Buildings (VET4SBO) 2018-1-RS01-KA202-000411 Level 2 Module 6: Enhanced automation and reduction of human intervention Unit 6.4: Limitations of automation solutions
  • 2. Outline 1. Limitations of IoT-enabled solutions, to avoid errors on the job 2. What not to expect from the IoT-enabled building automation solutions
  • 3. Main challenges faced by IoT The adoption of IoT is challenged by certain technological limitations, covering technologies needed to make IoT systems function smoothly. These technological challenges include: Security, Integration and Interoperability (Connectivity), Compatibility & Longevity, Communication Standards and Technologies related to the Intelligent Analysis & Decision Support for Actions
  • 4. (Cyber)-security and data privacy The more data and devices are connected to each other, the bigger the cybersecurity and data privacy concerns are. It is much easier for hackers to acquire access to building functions by exploiting vulnerabilities in individual devices from variety of manufacturers and through variety of communication protocols. There are many security measures that are taken to protect the data and information, however, there is an ongoing battle between security levels and hacking practices; there is always the possibility that the latter manage to break into a system and compromise data. For example, well-known groups of hackers, like Anonymous, hack into governmental and other sites and get access to confidential information.
  • 5. (Cyber)-security and data privacy Consider then the case where all our information and building operation details are stored on the internet, through IoT; it would reveal a great deal of details about personal living patterns. There is also the case of building management companies that may use the data and information inappropriately, as it happens with other types of data; there is a lot of value in that information. The concerns become bigger if one considers that the IoT industry is currently in its infancy state; during this phase, typically technology and functionality is the focus, in the hunt for customers and competition, while security is left behind.
  • 6. (Cyber)-security and data privacy With all these security and privacy concerns, there is an issue of who will be given the trust to control the IoT; and where would the data be stored? How is the data going to be encrypted during communication? How can one trust the automation systems when there is even a small possibility for a malicious third party to compromise the data? Imagine the case of appliances operating outside your will, products with malicious content being delivered after ordering, etc.
  • 7. (Cyber)-security and data privacy Furthermore, consider the potential hacking of baby monitors, smart fridges, thermostats, drug infusion pumps, cameras and even the radio in your car. There will be so many “attack vectors” offered to the hackers... If the IoT is exposed, then the organisationsrelying their processes on it are equally exposed to security holes.
  • 8. (Cyber)-security and data privacy Walled Internet: according to the World Economic Forum, the growing number of cross border attacks will start pushing national governments towards breaking up the internet in national, or even regional “walled gardens”. This will create major barriers to the flow of content and transactions.
  • 9. (Cyber)-security and data privacy Cloud attacks: it is likely that cloud providers will be one of the main targets of hackers. And cybersecurity is not as advanced as the other IoT technological and business trends. The World Economic Forum report states that “a takedown of a single cloud provider could cause $50 billion to $120 billion of economic damage — a loss somewhere between Hurricane Sandy and Hurricane Katrina”.
  • 10. (Cyber)-security and data privacy Security issues related to artificial intelligence (AI): taking a cloud provider’s infrastructure down, affects hundreds of businesses, government entities, critical infrastructures, and healthcare organisations. And this may become feasible when hackers start using artificial intelligence embedded in machines, to analyse the data and learn the internet security holes and patterns and create malicious software automatically. It has always been the case, for technology advances to be used in both good and bad ways.
  • 11. (Cyber)-security and data privacy Botnet-related issues: it is expected that small, cheap, consumer devices will not be that protected in terms of avoiding attacks. There is a risk for this distributed network of devices to open big security holes to whole building networks and even utilities (through the utility measurements)and city infrastructure. It is thereforenecessary to secure devices with anomaly detection solutions, to recognise the events of devices showing abnormal behaviour. It also helps to have clear communication standards with bounds on what data devices are allowed to send or how often they're allowed to send it.
  • 12. (Cyber)-security and data privacy Lack of confidence: Reports (e.g. State of IoT Security research report) state that 90% of consumers lack confidence in the security of IoT devices. As high as 96% of businesses and 90% of consumers believe there should be IoT security regulations. Only 14% of consumers believe that they are knowledgeable on IoT device security. Around 60% percent of consumers are concerned about data being leaked. Jason Hart, CTO of Data Protection at Gemalto company in The Netherlands, said: "It's clear that both consumers and businesses have serious concerns around IoT security and little confidence that IoT service providers and device manufacturers will be able to protect IoT devices and more importantly the integrity of the data created, stored and transmitted by these devices…Until there is confidence in IoT amongst businesses and consumers, [IoT] won't see mainstream adoption…”
  • 13. Integration and interoperability Despite the technological advancements and the existence of certain open protocols like BACnet, Lonworks, ModBus, etc., there is still lack of widely adopted industry standards, which acts as a barrier to wide adoption of IoT-enabled buildings. Many legacy BMSs use their own data representation and communication standards, leading to inability to achieve vendor- and technology-independent integration. The result is to have multiple protocols enabled in a single building simultaneously, creating unnecessary installation, configuration and maintenance costs.
  • 14. Integration and interoperability Integration of devices across building functions has not been the industry priority in building constructionperiod. Lack of scalability beyond the physical boundaries of the building to enable remote controlling and monitoring over the internet and cloud.
  • 15. Integration and interoperability Compatibility challenges: as devices from different manufacturers will be interconnected, the issue of compatibility in data formatting and communicating becomes bigger. It is unlikely that all vendors will agree to a single common standard in the foreseeable future (consider non- unified cloud services, lack of standardized M2M protocols and diversities in firmware and operating systems among IoT devices). These issues may result in consumers being locked to specific devices’ vendors, thus preventing the real wide adoption of the IoT and seriously limiting its foreseen value. And many of the adopted technologies will eventually become obsolete in the next few years, causing major costs to consumers that will invest on them; who would like their IoT appliances (such as smart fridges or TVs) to require replacement in 2-5 years?
  • 16. Integration and interoperability Connectivity challenges: connecting so many devices will be a challenge for current communication models and technologies. For instance the server/client authentication/authorisation mechanisms will suffer from the volume of devices requiring to be securely connected. What will happen when billions and hundreds of billions of devices will ask to join existing networks? Entire systems can go down, if the servers’ infrastructure becomes unavailable. It is expected that the future of IoT will be the decentralised networks. Moving much data processing and analysis to the edge, with devices taking some mission-critical operations locally, may help smoothing a little bit the connectivity problem. There can also be solutions adopting peer-to-peer authentication/authorisation models, without the need of a centralised broker; consider the possible merging of IoT technologies with Blockchain distributed trust infrastructure.
  • 17. Integration and interoperability Standards: Technology standards which include network protocols, communication protocols and data-aggregation formats are defining ways to handle, process and store the data collected from the IoT devices. There are certain challenges related to handling unstructured data: While structured data are stored in relational databases and queried through (standard) SQL, unstructured data are stored in different types of NoSQL databases, where there are no standard querying approaches.
  • 18. Scalability limitations Even smart BMS data, still today, suffer from their inherent lack of scalability. It was impractical in the past and it still is impractical in the new IoT era to have buildings installing only compatible equipment from specific vendors, using specific communication protocols and so on. Usually vendors are reluctant to adopt open protocols; especially the “strong” players in the market, tend to push their own proprietary data communication protocols, which closes the door to any third- party integrations, thus killing scalability.
  • 19. Data capturing and processing limitations According to scientists and engineers, analysing and visualising the dense BMS data, will offer to building operators the means to produce the ideal environment for occupants, in a more energy and cost effective way. However, there currently exist practical limitations with the data that can be captured by building managementsystems, as well as limitations on the extent to which BMS data can be used to achieve the aforementioned goal. As of today, it is still expensive to capture and maintain data. Although the cost of sensors has considerably dropped in recent years, the cost of a complete deployment of a BMS solution is still high. Even the cheapest options have a cost of around €5 per square meter. And this is even for solving individual problems, such as basic lighting controls. [1] Evans, D. (2011) The Internet of Things: How the Next Evolution of the Internet Is Changing Everything. http://www.cisco.com/web/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf
  • 20. Data capturing and processing limitations In addition, there is a cost related to using the data. There is a need for expert and dedicated building engineers to be analysing the data and adjusting set points and configurations to derive value. This is time consuming and costly. Even in the case of using a software to analyse and visualise the data, there are additional costsinvolved with the product or service used for that. Phone service suppliers such as Verizon and AT&T are no longer offering unlimited data usage for mobile phones because it is too costly, yet by 2020 it is expected that 50 billion devices will be connected,collecting and storing data. [1] [1] Evans, D. (2011) The Internet of Things: How the Next Evolution of the Internet Is Changing Everything. http://www.cisco.com/web/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf
  • 21. Data value limitations Data alone have no or little value; what carries value is the decision-making information that hides within the datasets. In the case of buildings, relevant decisions include equipment schedules, set points, system configuration optimisations, etc. For instance, one can reduce the operation costs of a building by simply turning off certain devices/functions (e.g. heating, lights), when nobody benefits from them.
  • 22. Data value limitations However, the benefit is much prominent in certain types of buildings, such as hotels or big office complexes,which have a very dynamic profile of usage patterns. There is not much space for optimisation, and subsequently for savings, when it comes to residential or long-rented office buildings with consistentusage patterns. Would it be worth the investment of data capturing and visualisations if the optimisation space appears to be small?
  • 23. Data value limitations Intelligent data analysis and actionable decisions In many cases, data analysis is driven by cognitive technologies and the accompanying models that facilitate the use of cognitive technologies. Artificial intelligence models can be trained and improved with large data sets, which will be available through cloud providers of services to smart buildings. New algorithms and improvements in existing ones will become available through the increased data availability. However, there is always the chance of inaccurate analysis due to flaws in the data and/or the models describing the data, thus exposing various algorithmic limitations. This is coupled with the fact that most IoT interactions generate unstructured data and there are no widely adopted ways of managing these data.
  • 24. Data value limitations Intelligent data analysis and actionable decisions Moreover, traditional analytics software are not yet ready to analyse real-time data streams, considering the volume, velocity and variety of information captured. The challenges are summarised as: • slow emergence of technologies to handle real-time data and analyse them • machines’ actions in unpredictable situations • mean-reverting human behaviour
  • 25. Over-reliance on technology Imagine scenarios where • Your fridge can identify that you have run out of milk; it contactsthe supermarket and orders the quantity you usually need, and also informs you by sending a message on your phone • Your alarm rings at 6:30 am; you wake up and switch it off. As soon as you switch off your alarm, it conveys to the geyser to heat water at a temperature you prefer and also the coffee maker starts brewing coffee!
  • 26. Over-reliance on technology It becomes obvious that, like it did happen with the internet and the mobile devices, our lives will be increasingly controlled by and depend on technology. We need to make an early clear decision on how much of our daily lives we are willing to let be controlled by technology. We need to understand that no machine system is robust and fault-free. The more we entrust and the more dependent we are on the IoT, could lead to a potentially catastrophic event if things collapse. The IoT systems will be complex, thus creating more opportunities of failure. Imagine scenarios where a bug in the software ends up automatically turning on and off the air- conditioning system and lights every few minutes.
  • 27. Potential loss of jobs There is a big concern that reliance on the IoT and offering of advanced automation will eventually result in the loss of jobs. The impact is expected to be higher on the less-educated workers. For example, people who manage inventories will lose their jobs, because devices can not only communicate between each other, but transmit that information to the owner. There are already jobs being lost to automated machines, such as the checkout line in supermarkets and even ATM’s.
  • 28. Potential loss of jobs It results to a decrease in employment of menial staff! The unskilled workers and helpers may end up losing their jobs in the effect of automation of daily activities. This can lead to (at least temporary) unemployment issues in the society. The answer is education. There will be tremendous need for highly-educatedstaff to manage the automated systems, train the AI algorithms and maintain them.
  • 29. Business-related issues If businesses start investing in IoT without sound plans, then the model will fail. It is expected that end-to-end solution providers operating in vertical industries and delivering services using cloud analytics will be the most successful at monetizing a large portion of the value in IoT.
  • 30. Business-related issues IoT can be divided into 3 categories, based on usage and clients base: • Consumer IoT includes the connected devices such as smart cars, phones, watches, laptops, connected appliances and entertainment systems. • Commercial IoT includes things like inventory controls, device trackers and connected medical devices. • Industrial IoT covers things such as connected electric meters, waste water systems, flow gauges, pipeline monitors, manufacturing robots and other types of connected industrial devices and systems.
  • 31. Business-related issues Devices without IoT capabilities may be more expensive in the future, since they will lack data that can be utilised by manufacturers. Missing regulatory standards: But, regulatory standards for all these IoT and data markets need to be in place; need to regulate companies that sell data collected from various sources. There is a lack of transparency about who gets access to data and how those data are used to develop products or services and sold to advertisers and third parties. There is a need for clear guidelines on the retention, use and security of the data including metadata (the data that describe other data).
  • 32. Society-related issues Understanding IoT from the customersand regulators perspective is not an easy task for the following reasons: • Customer demands and requirements change dynamically • New uses for devices—as well as new devices— emerge • Inventing and reintegrating must-have features and capabilities are expensive and take time and resources • The uses for IoT technology are also expanding dynamically
  • 33. Society-related issues Consumer confidence: The above may limit the will of consumers to adopt IoT and connecting their lives to the internet. This challenge becomes bigger with the lack of understanding or education by consumers of best practices for IoT devices security to help in improving privacy. Beyond data privacy: consider integrating devices into our environments without us consciously using them, e.g. tracking devices for phones and cars, as well as smart televisions with voice recognition or vision features that can continuously listen to conversations or watch for activity and selectively transmit that data to a cloud service for processing, which sometimes includes a third party. In addition, there are IoT scenarios that involve cross-national and cross-cultural deployments, thus increasing the interoperability challenges related to societal issue. Privacy of people and data need to consider not only technological dimensions, but also cultural and societal.
  • 34. Technological limitations related to the IoT leverage The Web of Things role in the IoT [2] There are currently no clear boundaries to what the IoT is or is not. The Internet extends into the physical world. As discussed, “the Internet of Things (IoT) is a system of physical objects that can be discovered, monitored, controlled or interacted with by electronic devices which communicate over various networking interfaces, and eventually can be connected to the wider Internet”. Scenarios where physical objects feel the world through sensors and then analyse, store and exchange information are becoming reality. These objects are typically called: smart things. Such Things go beyond the physical objects, accompanied by information stored digitally and describing the Thing, which can be sensors, actuators, computation components, communication interfaces. [2] https://www.manning.com/books/building-the-web-of-things?a_bid=16f48f14&a_aid=wot
  • 35. Technological limitations related to the IoT leverage The physical world is extended in various ways, through a range of technologies that started with the use of tags of objects (QR codes, RFID Tags), then emerged with devices like Arduino and Raspberry Pi, continued with machines like all those smart sensors and smart cars and is emerging with automating whole environments like buildings and cities.
  • 36. Technological limitations related to the IoT leverage The Internet part of IoT, enables the Thing (i.e. its associated data and services, inputs/outputs) to be accessed and processed by third-party applications through the existing Internet infrastructure. This means that the Thing can exist on the Internet even in the cases where it is not physically connected to the Internet. As of today, there are no unique and universal data formatting, data communication and application protocols for IoT. This means that the IoT of today is a collection of isolated Intranets of Things that are not able to interact with each other. Milis, George, Panayiotou, Christos, & Polycarpou, Marios. (2017). SEMIoTICS: Semantically-enhanced IoT-enabled Intelligent Control Systems. IEEE Internet of Things Journal, (Special Issue IoT Feedback Control). http://doi.org/10.5281/zenodo.1053854
  • 37. Technological limitations related to the IoT leverage For all these Things to communicate seamlessly, a common “language” would be necessary, for devices and applications to understand each other, regardless of their physical technology particularities. Technology is already there, yet still not utilised in its full. It’s been more than 20 years that Web technologies exist to make data and services interoperable. Such technologies are related to the Semantic Web, which is about Things on the internet and widely adopted Web protocols and standards that make data and services offered by objects more accessible to a larger pool of (Web) developers. [3] Milis, George, Panayiotou, Christos, & Polycarpou, Marios. (2017). SEMIoTICS: Semantically-enhanced IoT-enabled Intelligent Control Systems. IEEE Internet of Things Journal, (Special Issue IoT Feedback Control). http://doi.org/10.5281/zenodo.1053854
  • 38. Technological limitations related to the IoT leverage The limitations of the IoT become obvious when one wants to integrate devices from various manufacturers into a single application or system. Building cross-functionality applications in buildings would require smart lights from vendor A, HVAC system from vendor B, air quality sensors from vendor C, and so on. Making these devices and systems talk and work with each other will require lots of custom system integration work.
  • 39. Technological limitations related to the IoT leverage Building this type of interoperability in custom hard-coding projects, will end up having systems with zero robustness and big potential maintenance costs; not to mention the lack of scalability and extensibility, security, configurability. In an ideal scenario, any device should be able to seamlessly integrate and talk to other devices, having its data consumed by any application from any vendor, regardless of the networking protocols used by those devices. This is exactly where the Semantic Web would come into play.
  • 40. Technological limitations related to the IoT leverage It would be beneficial for the IoT to reuse the technology that enables Web services like Facebook or Google to scale to millions of concurrent users, without compromising on security or performance. Until today, the IoT communities have been working mostly on devices and networking issues. The Semantic Web, on the other hand, has been focusing for decades on the application layer and the interoperability between data and services. Properly mapping the devices into the Web layer, makes immediately all Things agnostic to the physical and transport layer protocols used by the underline devices. What is needed is only a set of “semantic web drivers”, which will hold a part of the information associated with a Thing and its virtual existence on the Internet.
  • 41. Technological limitations related to the IoT leverage The Web has already become the global integration platform for distributed applications over the Internet. Therefore,this can be extended to the integration of the physical world applications and services, by hiding the complexity and differences between various transport protocols used in the IoT. Developers of IoT applications should focus on the logic of their applications, without having to deal with the underline technicalities. If there is no single language to be spoken by all devices, then we need a transparent translator that will make the interactions seamless. Having such a “semantic layer” (see Units of Level 3) would minimise the effort requiredto maintain the system each time a device or service is added, removed, or updated.
  • 42. Technological limitations related to the IoT leverage Such a step is realistic today, since devices can have embedded Web servers with advanced features at low cost. Combining this with the JavaScript advances, data processing for the language translations maintenance can happen on the client devices or on cloud services, thus saving computation power of servers on embedded devices. When Things are connected on the Web, they will use the same standards and techniques as traditional Web services. This means that developers will be able to write IoT applications that interact with embedded devices in exactly the same way as they write applications to interact with any RESTful services over Web APIs.
  • 43. Technological limitations related to the IoT leverage REST is an architectural style for developing distributed applications and is the basis upon which the modern Web is built. The essence of REST is to focus on creating loosely coupled services that can be easily reused, which is implemented using URIs, HTTP and standardized media types. Abstracting the services from their application-specific semantics thanks to a uniform interface (HTTP verbs and response codes) makes it easy to build loosely coupled services, as it provides a simple mechanism for clients to select the best possible representations for interactions. This makes the Web the ideal substrate for building a “universal” architecture and Application Programming Interface (API) to interact with Things.
  • 44. Technological limitations related to the IoT leverage • In practice, this means developers can start interacting with Things via Web browsers. Real-time data collected from distributed sensors can then be easily retrieved, processed and displayed on the Web, using HTML, CSS and JavaScript technologies. This is particularly interesting because it enables anyone with basic Web programming skills to build Web sites and applications with real-time data from the physical world.
  • 45. Technological limitations related to the IoT leverage It must be clarified that the Web technologies for the Things can work equally well in local internets, e.g. in single buildings or groups of buildings. In some cases, it would make sense for Things to have a public URL and be openly accessible over the Web. For example, traffic or pollution sensors in a city operated by the public authorities would be useful information in an air quality applicationof a building in that city.
  • 46. Technological limitations related to the IoT leverage Web-connected objects can also become active and participate to the Web as other users, by publishing their own blogs or talk to each other using the APIs of services such as Twitter. Leveraging the IoT into the Web represents a natural and very promising evolution of the IoT, that would overcome a set of today’s technologicallimitations.
  • 47. Resources • https://www.enertiv.com/resources/blog/4-limitations-bms-data • https://sites.google.com/a/cortland.edu/the-internet-of-things/disadvantages • https://www.linkedin.com/pulse/advantages-disadvantages-internet-things-iot- tommy-quek/ • https://www.manning.com/books/building-the-web-of- things?a_bid=16f48f14&a_aid=wot • https://iot.ieee.org/newsletter/march-2017/three-major-challenges-facing- iot.html • https://www.cmswire.com/cms/internet-of-things/7-big-problems-with-the- internet-of-things-024571.php • https://dzone.com/articles/problems-with-internet-of-things-you-need-to-know
  • 48. Disclaimer For further information, relatedto the VET4SBO project, please visit the project’swebsite at https://smart-building- operator.euor visit us at https://www.facebook.com/Vet4sbo. Downloadour mobile app at https://play.google.com/store/apps/details?id=com.vet4sbo.mobile. This project (2018-1-RS01-KA202-000411) has been funded with support from the European Commission (Erasmus+ Programme). Thispublicationreflects the views only of the author, and the Commission cannot be held responsible for any use which may be made of the informationcontainedtherein.