Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Journey to the Internet Of Things

Similar presentations


Presentation on theme: "The Journey to the Internet Of Things"— Presentation transcript:

1 The Journey to the Internet Of Things
Portfolio Accreditation Course Design Guidance and Training Template Rev The Journey to the Internet Of Things Ion Padilla – HP Innovation Centers HP Restricted

2 Portfolio Accreditation Course Design Guidance and Training Template
Rev Challenges 2 Why is IOT important? 1 3 HP Strategy IOT as an Innovation Enabler 4 HP Restricted

3 2013 1982 1968 Internet of Things Personal Computing/ Business
Devices, sensors, embedded, wereable Personal Computing/ Business 1982 Personal, mobile Academics/Government Mainframes 1968 Academic / Government

4 ‘Connecting products to the web will be the 21st century electrification. ‘
Electrification, in the begining there was not infrastructure for electrical machines, they were plugging the things directly to the bulbs, short of the same story for IOT without a consolidate platform Matt Webb, CEO of BERG Cloud

5 Truck example with connected cars and transports
Crops monitoring with drones Food chain monitoring, GS1 example from 40 days to 4 hours (product recall)

6 $30B fuel cost saving in aviation industry
$66B fuel cost saving in gas powered fleets $63B productivity improvement in healthcare $90B reduction in Cap X in oil & gas exploration and development $27B productivity improvement in rail industry 1% savings from efficient Industrial Internet solutions could save billions in operational costs Savings and growth opportunities across every industry / 14,4 Trillion dollar business in the next decade 21 percentage growth of profit expected by 2022 14,4T Profit value $ 21% Growth * Projected savings are based on 1% efficiencies/savings Source: Industrial Internet: Pushing the Boundaries of Minds and Machines, Peter C. Evans and Marco Annunziata, November 26, 2012

7

8 Security Smart Tech Aggregate Sensors Nano
Stay Connected Identify and track the data of things. Security Secure different devices. Small device encryption. Unlocking a device should only risk that device. Sensors Collect and process the data to detect the changes in the physical status of things. Radio powered by the messages that receives, Standford University Nano Make the smaller and smaller things have the ability to connect and interact. Smart Tech Enhance the power of the network by devolving processing capabilities to different part of the network. Aggregate Interfaces that allow the user to interact with different devices. Sensors Nano

9 The quantified self douglas rushkoff Program or be programmed and the dilemma of giving away yoiur personal data -Could connect people feel othe people via wearebles

10 We are leaving some digital footprints behind us.
QuantifyingSELF, has some sownpoints, with reverse engineering we could identify somebody by the footprints they leave in the cloud. Fitbits now tell us the amount of steps we do, our diet, weight, heart rate… Tons of different information tan can be used to extract the data and identify the owner of this footprints. Some studies show that the heart beat of somebody could be the perfect identification.

11 Program or be programmed
Nutrition Sports Sleep Health douglas rushkoff Program or be programmed and the dilemma of giving away yoiur personal data -Could connect people feel othe people via wearebles

12 80% Insecure Authorization 80% Lacks privacy control
IOT Security Issues 80% Insecure Authorization 70% Unencrypted communication HP Study Reveals 70% of Internet of Things (IoT) Devices Vulnerable to Attack HP Fortify study devices averaged 25 vulnerabilities per product, indicating expanding attack surface for adversaries Top 10 security problems with (IoT) devices Insecure web interface Insufficient authentication 3. Insecure network services 4. Lack of transport encryptions 5. Privacy concerns 6. Insecure cloud interface 7. Insecure mobile interface 8. Insufficient security configurability 9. Insecure software 10. Poor physical security Vulnerability Description Privacy 80% raised privacy concerns regarding the collection of data such as name, address, home address, date of birth, credit card credentials, and health Information Authorization 80% failed to require passwords of sufficient complexity and length, with most devices allowing passwords such as “1234” or “5678” Encryption 70% did not encrypt communications to the internet and local network, while 50% of their mobile applications performed unencrypted communications to the cloud, internet or local network Web Interface 60% raised security concerns with their user interfaces such as persistent XSS, poor session management, weak default credentials and credentials transmitted in clear text Software Software 60% did not use encryption when downloading software updates—some downloads could even be intercepted, extracted and mounted, allowing the full code to be viewed or modified 60% Insecure Web Interface 80% Lacks privacy control

13 HP strategic initiatives: Enabling the business of innovation
Big Data Infrastructure adoption: Storage, processing, network! Battery life? Security Cloud Mobility Security

14 IOT as an Innovation enabler
Waze, it only communicates with one asset -> movement! Imagine the posibilities if we can add more information to it We spend 1.2h in average per day in the car Waze bought by google, more tan 50 million users Automobile-as-a-Service Upgrade the car 350 horsepower and speakers 350 stallion joyride for the weekend.  Connected GPS navigates you through traffic. Your car knows your toll account is empty and uses your credit card to replenish your iPass account on the go.  The car reads you reviews of trivago, yelp while you are going around the city. Open Table, estimates your time of arrival, and makes the reservation for you.  Your car guides you to an empty spot

15 Thank you Ion Padilla – HP Innovation Centers


Download ppt "The Journey to the Internet Of Things"

Similar presentations


Ads by Google