SlideShare une entreprise Scribd logo
1  sur  28
Télécharger pour lire hors ligne
Totem International Ltd   20-06-2011   2
    Provide corporate security consultancy in risk
    assessment, Intellectual Property, physical
    security, financial, forensics, accounting, cyber
    security, identity theft, corporate fraud,
    and brand protection.

   Facilitate global manufacturers / service providers
    to supply to police, army, and air force.

   Distribute Indian high technology security products/
    gadgets globally.

   Collect / collate database of security professionals.

                                    Totem International Ltd   20-06-2011   3
    Consulting services: Police & Fire services in
    areas of identification product / source.

   Training of staff for awareness sensitization on
    security issues.

   Cyber Security Training

   Integrated security solution for large infrastructure project
    including implementation with help of Totem
    Infrastructure Ltd


                                     Totem International Ltd   20-06-2011   4
   Police Equipment

   Physical Security Equipment

   Products for Traffic Police

   Protective police Gear

   Fire Uniforms and Equipment

   Uniform, Shoes & VHF HF Sets for SWAT/ERT

   Police Team.



                                    Totem International Ltd   20-06-2011   5
Totem International Ltd   20-06-2011   6
Totem International Ltd   20-06-2011   7
   “Cloud Computing is an emerging computing technology that uses the
    internet and central remote servers to maintain data and applications”.

   Cloud computing fundamentally allows for a functional separation
    between the resources used and the user's computer, usually residing
    outside the local network.

   The idea of Cloud Computing is that you can send and access the data
    from anywhere




                                            Totem International Ltd   20-06-2011   8
Totem International Ltd   20-06-2011   9
   Data & Software Availability

   Usage of multiple CPU’s can be eliminated

   Reduces the cost of software distribution

   Any computer connected to the network will have access to
    all the files.

   Use Software, Databases and store files even without
    knowing the physical location


                                     Totem International Ltd   20-06-2011   10
   Potential Cost Saving
   Business Agility
   Reduces Energy Consumption
   Reduces the IT staff
   Data is less likely to be lost
   Owners need not reproduce the Software and ship it out
   Holds more Storage than a personal computer
   Users need not update always
   Work can be carried as long as there is internet access
   On demand Self Service, Broad network access


                                  Totem International Ltd   20-06-2011   11
Back End
    Front End




     User, connecting device,           Servers, data storage devices ,
      minimum software                   Computers.




                                 Totem International Ltd   20-06-2011      12
   Aberdeen group in 2009 studied that cloud computing
    would result is 18% reduction in the IT budget
   16% Reduction in the data center Power Cost
   Since 2007 the trade mark fillings of cloud computing
    are increasing at an exponential rate
   2008-2009 cloud computing trade mark fillings have
    increased by 483%
   Approximately 500 such marks are filled during 2010




                                  Totem International Ltd   20-06-2011   13
   Companies like Yahoo ,Google, Microsoft are using
    Cloud Computing today.
   Amazon web Services revenue break ups through
    Cloud Computing according to the USB analyst is
   $ 500million in 2010
   Estimating a rise to $ 750 million in 2011
   Massive $ 2.5 billion in 2014
   Rack Space’s revenue generation through cloud
    computing is 2010.


                                 Totem International Ltd   20-06-2011   14
 By 2020 most people will acess data & software online.
 Will dominate desktop in the next12 decades.
 When a research was conducted On this 71% agreed
   to this and 27% disagreed.




                                  Totem International Ltd   20-06-2011   15
Totem International Ltd   20-06-2011   16
Wearable computers which give access to
any information without scarcity of mobility.
Features:
Hand’s free operation
In built GPS tracking

Range of communication capabilities
Include bluetooth
Long battery life
Radio Frequency
Identification(RFID)


           Totem International Ltd   20-06-2011   18
   RFID is an ADC technology that uses radio-frequency
    waves to transfer data between a reader and a movable
    item to identify, categorize, track...
   RFID is fast, reliable, and does not require physical
    sight or contact between reader/scanner and the tagged
    item

   Radio Frequency Identification (RFID) is an automatic
    identification method that stores and remotely retrieves
    data via an RFID tag or transponder.

                                   Totem International Ltd   20-06-2011   19
   One or more RF tags
   Two or more antennas
   One or more interrogators
   One or more host computers
   Appropriate software

                       Totem International Ltd   20-06-2011   20
RFID System Components
(block diagram)
                                  Antenna                         Reader

     Asset/Tag

           Asset
                                                                   Firmware

            Tag
             Insert


                                                 TCP/IP

                           Host
                                                                                    ~
                                                                                Power

                      Application
    Customer’s
                      Software               API
    MIS

                                        Totem International Ltd    20-06-2011           22
Sequence of Communication
• Host Manages Reader(s) and Issues Commands
• Reader and tag communicate via RF signal
• Carrier signal generated by the reader (upon request from the host
  application)
• Carrier signal sent out through the antennas
• Carrier signal hits tag(s)
• Tag receives and modifies carrier signal
    – “sends back” modulated signals.
• Antennas receive the modulated signal and send them to the
  Reader
• Reader decodes the data
    – Results returned to the host application


                                            Totem International Ltd   20-06-2011   23
Totem International Ltd   20-06-2011   24
Tags can be attached to almost anything




                        Totem International Ltd   20-06-2011   25
Cloud computing + RFID



            Totem International Ltd   20-06-2011   26
   Cloud computing utilizes the network as a means to
    connect the user to resources by using the data
    collected with Rfid which provides a cost effective
    technology and information solution.




                                   Totem International Ltd   20-06-2011   27
Rfid Tags
                     Computers
Readers
                     Data storage Systems
Computers For RFID
                     Services & Servers
data storage and
processing.
                     {Data filteration}
Applications which
                     Infrastructure
provide access to
cloud computing
                     Middleware
                     Cloud Computing




                       Totem International Ltd   20-06-2011   28
Thank you
       Email : firoze@totemint.com

+919618621234




                         Totem International Ltd   20-06-2011   29

Contenu connexe

Tendances

IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & EcosystemHarish Vadada
 
ATTOBahn NETWORK(part2)_Internet Protocals are the problem
ATTOBahn NETWORK(part2)_Internet Protocals are the problemATTOBahn NETWORK(part2)_Internet Protocals are the problem
ATTOBahn NETWORK(part2)_Internet Protocals are the problemDarryl Gray
 
Managed Data Centre
Managed Data CentreManaged Data Centre
Managed Data CentreSalmanSK
 
Ptcl Data Centre
Ptcl Data CentrePtcl Data Centre
Ptcl Data CentreSalmanSK
 
Data enrichment
Data enrichmentData enrichment
Data enrichmentFabMinds
 
NTSC ISDN to IP Video Conferencing Transition Recommendations
NTSC ISDN to IP Video Conferencing Transition RecommendationsNTSC ISDN to IP Video Conferencing Transition Recommendations
NTSC ISDN to IP Video Conferencing Transition RecommendationsVideoguy
 
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the RescueIndustrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the RescueEurotech
 
KazooCon 2014 - A Primer on Telecom Law
KazooCon 2014 - A Primer on Telecom LawKazooCon 2014 - A Primer on Telecom Law
KazooCon 2014 - A Primer on Telecom Law2600Hz
 
Introduction IOT/M2M
Introduction IOT/M2MIntroduction IOT/M2M
Introduction IOT/M2MLeKhanhAnh
 
12 vo ip-t-hutchinson-11feb2011
12 vo ip-t-hutchinson-11feb201112 vo ip-t-hutchinson-11feb2011
12 vo ip-t-hutchinson-11feb2011Alaa Al-saggaf
 
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...TELKOMNIKA JOURNAL
 
Byte lab Presentation
Byte lab Presentation Byte lab Presentation
Byte lab Presentation Byte Lab
 
7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless techHemant Nagwekar
 
Wireless Wan Customer Presentation (AT&T)
Wireless Wan Customer Presentation (AT&T)Wireless Wan Customer Presentation (AT&T)
Wireless Wan Customer Presentation (AT&T)NGINX at F5
 

Tendances (18)

IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & Ecosystem
 
Gtt Overview
Gtt OverviewGtt Overview
Gtt Overview
 
Customer pres 3 technical overviews_at&t mobility
Customer pres 3 technical overviews_at&t  mobilityCustomer pres 3 technical overviews_at&t  mobility
Customer pres 3 technical overviews_at&t mobility
 
ATTOBahn NETWORK(part2)_Internet Protocals are the problem
ATTOBahn NETWORK(part2)_Internet Protocals are the problemATTOBahn NETWORK(part2)_Internet Protocals are the problem
ATTOBahn NETWORK(part2)_Internet Protocals are the problem
 
Iot
IotIot
Iot
 
Managed Data Centre
Managed Data CentreManaged Data Centre
Managed Data Centre
 
Ptcl Data Centre
Ptcl Data CentrePtcl Data Centre
Ptcl Data Centre
 
Data enrichment
Data enrichmentData enrichment
Data enrichment
 
NTSC ISDN to IP Video Conferencing Transition Recommendations
NTSC ISDN to IP Video Conferencing Transition RecommendationsNTSC ISDN to IP Video Conferencing Transition Recommendations
NTSC ISDN to IP Video Conferencing Transition Recommendations
 
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the RescueIndustrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
 
KazooCon 2014 - A Primer on Telecom Law
KazooCon 2014 - A Primer on Telecom LawKazooCon 2014 - A Primer on Telecom Law
KazooCon 2014 - A Primer on Telecom Law
 
MWC 2010 DPI
MWC 2010 DPIMWC 2010 DPI
MWC 2010 DPI
 
Introduction IOT/M2M
Introduction IOT/M2MIntroduction IOT/M2M
Introduction IOT/M2M
 
12 vo ip-t-hutchinson-11feb2011
12 vo ip-t-hutchinson-11feb201112 vo ip-t-hutchinson-11feb2011
12 vo ip-t-hutchinson-11feb2011
 
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
 
Byte lab Presentation
Byte lab Presentation Byte lab Presentation
Byte lab Presentation
 
7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech
 
Wireless Wan Customer Presentation (AT&T)
Wireless Wan Customer Presentation (AT&T)Wireless Wan Customer Presentation (AT&T)
Wireless Wan Customer Presentation (AT&T)
 

En vedette

Cyberscout Corporate Security
Cyberscout   Corporate SecurityCyberscout   Corporate Security
Cyberscout Corporate SecurityFiroze Hussain
 
Fire Brigade Productsv General[1]
Fire Brigade Productsv   General[1]Fire Brigade Productsv   General[1]
Fire Brigade Productsv General[1]Firoze Hussain
 
Cyberscout Presentation
Cyberscout PresentationCyberscout Presentation
Cyberscout PresentationFiroze Hussain
 
24 6 2011 Port Security
24 6 2011 Port Security24 6 2011 Port Security
24 6 2011 Port SecurityFiroze Hussain
 
Totem Cloud Rfid Solutions (3)
Totem Cloud Rfid Solutions (3)Totem Cloud Rfid Solutions (3)
Totem Cloud Rfid Solutions (3)Firoze Hussain
 
PPE & Welding Accessories 2011
PPE & Welding Accessories 2011PPE & Welding Accessories 2011
PPE & Welding Accessories 2011Firoze Hussain
 
Introduction To Delma Tracking
Introduction To Delma TrackingIntroduction To Delma Tracking
Introduction To Delma TrackingFiroze Hussain
 

En vedette (7)

Cyberscout Corporate Security
Cyberscout   Corporate SecurityCyberscout   Corporate Security
Cyberscout Corporate Security
 
Fire Brigade Productsv General[1]
Fire Brigade Productsv   General[1]Fire Brigade Productsv   General[1]
Fire Brigade Productsv General[1]
 
Cyberscout Presentation
Cyberscout PresentationCyberscout Presentation
Cyberscout Presentation
 
24 6 2011 Port Security
24 6 2011 Port Security24 6 2011 Port Security
24 6 2011 Port Security
 
Totem Cloud Rfid Solutions (3)
Totem Cloud Rfid Solutions (3)Totem Cloud Rfid Solutions (3)
Totem Cloud Rfid Solutions (3)
 
PPE & Welding Accessories 2011
PPE & Welding Accessories 2011PPE & Welding Accessories 2011
PPE & Welding Accessories 2011
 
Introduction To Delma Tracking
Introduction To Delma TrackingIntroduction To Delma Tracking
Introduction To Delma Tracking
 

Similaire à Totem cloud rfid solutions (3)

Supelec m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.1)
Supelec   m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.1)Supelec   m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.1)
Supelec m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.1)Thierry Lestable
 
Effective IoT System on Openstack
Effective IoT System on OpenstackEffective IoT System on Openstack
Effective IoT System on OpenstackTakashi Kajinami
 
Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveChuck Petras
 
Edge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalersEdge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalersPatrick Lopez
 
IoT digest. March 2018
IoT digest. March 2018IoT digest. March 2018
IoT digest. March 2018ElifTech
 
The network and on premise edge
The network and on premise edgeThe network and on premise edge
The network and on premise edgeDESMOND YUEN
 
Fin fest 2014 - Internet of Things and APIs
Fin fest 2014 - Internet of Things and APIsFin fest 2014 - Internet of Things and APIs
Fin fest 2014 - Internet of Things and APIsRobert Greiner
 
IxorTalk IoT Convention 2018
IxorTalk IoT Convention 2018IxorTalk IoT Convention 2018
IxorTalk IoT Convention 2018Peter Defreyne
 
Meetup 4/2/2016 - Functionele en technische architectuur IoT
Meetup  4/2/2016 - Functionele en technische architectuur IoTMeetup  4/2/2016 - Functionele en technische architectuur IoT
Meetup 4/2/2016 - Functionele en technische architectuur IoTDigipolis Antwerpen
 
IT automation and application of IT systems in port infrastructure
IT automation and application of IT systems in port infrastructureIT automation and application of IT systems in port infrastructure
IT automation and application of IT systems in port infrastructureDevam Shah
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15Mark Goldstein
 
How to bootstrap your IoT project
How to bootstrap  your IoT projectHow to bootstrap  your IoT project
How to bootstrap your IoT projectEurotech
 
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE
 
IoT Platform Meetup - HP Enterprise
IoT Platform Meetup - HP EnterpriseIoT Platform Meetup - HP Enterprise
IoT Platform Meetup - HP EnterpriseFilip Kolář
 
Industrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M OverviewIndustrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M OverviewBryan Kester
 
IoT Solutions - Dashboarding Real-Time Data | Internet of Things | IoT Techno...
IoT Solutions - Dashboarding Real-Time Data | Internet of Things | IoT Techno...IoT Solutions - Dashboarding Real-Time Data | Internet of Things | IoT Techno...
IoT Solutions - Dashboarding Real-Time Data | Internet of Things | IoT Techno...Edureka!
 

Similaire à Totem cloud rfid solutions (3) (20)

Supelec m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.1)
Supelec   m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.1)Supelec   m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.1)
Supelec m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.1)
 
Effective IoT System on Openstack
Effective IoT System on OpenstackEffective IoT System on Openstack
Effective IoT System on Openstack
 
Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) Wave
 
Edge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalersEdge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalers
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
IoT digest. March 2018
IoT digest. March 2018IoT digest. March 2018
IoT digest. March 2018
 
The network and on premise edge
The network and on premise edgeThe network and on premise edge
The network and on premise edge
 
Fin fest 2014 - Internet of Things and APIs
Fin fest 2014 - Internet of Things and APIsFin fest 2014 - Internet of Things and APIs
Fin fest 2014 - Internet of Things and APIs
 
IxorTalk IoT Convention 2018
IxorTalk IoT Convention 2018IxorTalk IoT Convention 2018
IxorTalk IoT Convention 2018
 
Meetup 4/2/2016 - Functionele en technische architectuur IoT
Meetup  4/2/2016 - Functionele en technische architectuur IoTMeetup  4/2/2016 - Functionele en technische architectuur IoT
Meetup 4/2/2016 - Functionele en technische architectuur IoT
 
IT automation and application of IT systems in port infrastructure
IT automation and application of IT systems in port infrastructureIT automation and application of IT systems in port infrastructure
IT automation and application of IT systems in port infrastructure
 
Ibm iot overview
Ibm   iot overviewIbm   iot overview
Ibm iot overview
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
IEEE CS Phoenix - Internet of Things Innovations & Megatrends 12/2/15
 
How to bootstrap your IoT project
How to bootstrap  your IoT projectHow to bootstrap  your IoT project
How to bootstrap your IoT project
 
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
 
Introduction to IoT by Vectolabs
Introduction to IoT by VectolabsIntroduction to IoT by Vectolabs
Introduction to IoT by Vectolabs
 
IoT Platform Meetup - HP Enterprise
IoT Platform Meetup - HP EnterpriseIoT Platform Meetup - HP Enterprise
IoT Platform Meetup - HP Enterprise
 
Industrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M OverviewIndustrial Internet of Things and (Machine to Machine) M2M Overview
Industrial Internet of Things and (Machine to Machine) M2M Overview
 
IoT Solutions - Dashboarding Real-Time Data | Internet of Things | IoT Techno...
IoT Solutions - Dashboarding Real-Time Data | Internet of Things | IoT Techno...IoT Solutions - Dashboarding Real-Time Data | Internet of Things | IoT Techno...
IoT Solutions - Dashboarding Real-Time Data | Internet of Things | IoT Techno...
 

Plus de Firoze Hussain

Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013Firoze Hussain
 
totem Catalogue Sept 2012
totem Catalogue Sept 2012totem Catalogue Sept 2012
totem Catalogue Sept 2012Firoze Hussain
 
totem Catalogue Sept 2012 safety security
totem Catalogue Sept 2012 safety securitytotem Catalogue Sept 2012 safety security
totem Catalogue Sept 2012 safety securityFiroze Hussain
 
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...
Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...Firoze Hussain
 
Catalogue 2012 safety security and power quality management
Catalogue 2012 safety security and power quality managementCatalogue 2012 safety security and power quality management
Catalogue 2012 safety security and power quality managementFiroze Hussain
 
3rd Annual Cloud Computing Summit 2011
3rd Annual Cloud Computing Summit 20113rd Annual Cloud Computing Summit 2011
3rd Annual Cloud Computing Summit 2011Firoze Hussain
 
totem int Online Catalogue Sept11
totem int Online Catalogue Sept11totem int Online Catalogue Sept11
totem int Online Catalogue Sept11Firoze Hussain
 
Online Catalogue 9 July2011
Online Catalogue 9 July2011Online Catalogue 9 July2011
Online Catalogue 9 July2011Firoze Hussain
 
Africa 24 6 2011 Port Security Pdf
Africa 24 6 2011 Port Security PdfAfrica 24 6 2011 Port Security Pdf
Africa 24 6 2011 Port Security PdfFiroze Hussain
 
16 Page Catalogue 7 June11
16 Page Catalogue 7 June1116 Page Catalogue 7 June11
16 Page Catalogue 7 June11Firoze Hussain
 
Ecil totem coal ash moisture content monitor
Ecil totem coal ash moisture content monitorEcil totem coal ash moisture content monitor
Ecil totem coal ash moisture content monitorFiroze Hussain
 
Prps Presentation Ficci
Prps Presentation FicciPrps Presentation Ficci
Prps Presentation FicciFiroze Hussain
 
Abloy Company Profile 4pg
Abloy Company Profile 4pgAbloy Company Profile 4pg
Abloy Company Profile 4pgFiroze Hussain
 

Plus de Firoze Hussain (20)

Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013
 
Catalogue march 2013
Catalogue march 2013Catalogue march 2013
Catalogue march 2013
 
Homsec 2013
Homsec 2013Homsec 2013
Homsec 2013
 
totem Catalogue Sept 2012
totem Catalogue Sept 2012totem Catalogue Sept 2012
totem Catalogue Sept 2012
 
totem Catalogue Sept 2012 safety security
totem Catalogue Sept 2012 safety securitytotem Catalogue Sept 2012 safety security
totem Catalogue Sept 2012 safety security
 
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...
Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...
 
Catalogue 2012 safety security and power quality management
Catalogue 2012 safety security and power quality managementCatalogue 2012 safety security and power quality management
Catalogue 2012 safety security and power quality management
 
3rd Annual Cloud Computing Summit 2011
3rd Annual Cloud Computing Summit 20113rd Annual Cloud Computing Summit 2011
3rd Annual Cloud Computing Summit 2011
 
Catalogue 19 sept11
Catalogue 19 sept11Catalogue 19 sept11
Catalogue 19 sept11
 
totem int Online Catalogue Sept11
totem int Online Catalogue Sept11totem int Online Catalogue Sept11
totem int Online Catalogue Sept11
 
Online Catalogue 9 July2011
Online Catalogue 9 July2011Online Catalogue 9 July2011
Online Catalogue 9 July2011
 
Africa 24 6 2011 Port Security Pdf
Africa 24 6 2011 Port Security PdfAfrica 24 6 2011 Port Security Pdf
Africa 24 6 2011 Port Security Pdf
 
16 Page Catalogue 7 June11
16 Page Catalogue 7 June1116 Page Catalogue 7 June11
16 Page Catalogue 7 June11
 
Kerala Ti C 9.3.11
Kerala  Ti C 9.3.11Kerala  Ti C 9.3.11
Kerala Ti C 9.3.11
 
16 Catalogue 24 Mar11
16 Catalogue  24 Mar1116 Catalogue  24 Mar11
16 Catalogue 24 Mar11
 
Ecil totem coal ash moisture content monitor
Ecil totem coal ash moisture content monitorEcil totem coal ash moisture content monitor
Ecil totem coal ash moisture content monitor
 
Prps Presentation Ficci
Prps Presentation FicciPrps Presentation Ficci
Prps Presentation Ficci
 
totem security
totem securitytotem security
totem security
 
Abloy Company Profile 4pg
Abloy Company Profile 4pgAbloy Company Profile 4pg
Abloy Company Profile 4pg
 
Brochure
BrochureBrochure
Brochure
 

Dernier

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Dernier (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Totem cloud rfid solutions (3)

  • 1.
  • 2. Totem International Ltd 20-06-2011 2
  • 3. Provide corporate security consultancy in risk assessment, Intellectual Property, physical security, financial, forensics, accounting, cyber security, identity theft, corporate fraud, and brand protection.  Facilitate global manufacturers / service providers to supply to police, army, and air force.  Distribute Indian high technology security products/ gadgets globally.  Collect / collate database of security professionals. Totem International Ltd 20-06-2011 3
  • 4. Consulting services: Police & Fire services in areas of identification product / source.  Training of staff for awareness sensitization on security issues.  Cyber Security Training  Integrated security solution for large infrastructure project including implementation with help of Totem Infrastructure Ltd Totem International Ltd 20-06-2011 4
  • 5. Police Equipment  Physical Security Equipment  Products for Traffic Police  Protective police Gear  Fire Uniforms and Equipment  Uniform, Shoes & VHF HF Sets for SWAT/ERT  Police Team. Totem International Ltd 20-06-2011 5
  • 6. Totem International Ltd 20-06-2011 6
  • 7. Totem International Ltd 20-06-2011 7
  • 8. “Cloud Computing is an emerging computing technology that uses the internet and central remote servers to maintain data and applications”.  Cloud computing fundamentally allows for a functional separation between the resources used and the user's computer, usually residing outside the local network.  The idea of Cloud Computing is that you can send and access the data from anywhere Totem International Ltd 20-06-2011 8
  • 9. Totem International Ltd 20-06-2011 9
  • 10. Data & Software Availability  Usage of multiple CPU’s can be eliminated  Reduces the cost of software distribution  Any computer connected to the network will have access to all the files.  Use Software, Databases and store files even without knowing the physical location Totem International Ltd 20-06-2011 10
  • 11. Potential Cost Saving  Business Agility  Reduces Energy Consumption  Reduces the IT staff  Data is less likely to be lost  Owners need not reproduce the Software and ship it out  Holds more Storage than a personal computer  Users need not update always  Work can be carried as long as there is internet access  On demand Self Service, Broad network access Totem International Ltd 20-06-2011 11
  • 12. Back End Front End  User, connecting device, Servers, data storage devices , minimum software Computers. Totem International Ltd 20-06-2011 12
  • 13. Aberdeen group in 2009 studied that cloud computing would result is 18% reduction in the IT budget  16% Reduction in the data center Power Cost  Since 2007 the trade mark fillings of cloud computing are increasing at an exponential rate  2008-2009 cloud computing trade mark fillings have increased by 483%  Approximately 500 such marks are filled during 2010 Totem International Ltd 20-06-2011 13
  • 14. Companies like Yahoo ,Google, Microsoft are using Cloud Computing today.  Amazon web Services revenue break ups through Cloud Computing according to the USB analyst is  $ 500million in 2010  Estimating a rise to $ 750 million in 2011  Massive $ 2.5 billion in 2014  Rack Space’s revenue generation through cloud computing is 2010. Totem International Ltd 20-06-2011 14
  • 15.  By 2020 most people will acess data & software online.  Will dominate desktop in the next12 decades.  When a research was conducted On this 71% agreed to this and 27% disagreed. Totem International Ltd 20-06-2011 15
  • 16. Totem International Ltd 20-06-2011 16
  • 17. Wearable computers which give access to any information without scarcity of mobility. Features: Hand’s free operation In built GPS tracking Range of communication capabilities Include bluetooth Long battery life
  • 18. Radio Frequency Identification(RFID) Totem International Ltd 20-06-2011 18
  • 19. RFID is an ADC technology that uses radio-frequency waves to transfer data between a reader and a movable item to identify, categorize, track...  RFID is fast, reliable, and does not require physical sight or contact between reader/scanner and the tagged item  Radio Frequency Identification (RFID) is an automatic identification method that stores and remotely retrieves data via an RFID tag or transponder. Totem International Ltd 20-06-2011 19
  • 20. One or more RF tags  Two or more antennas  One or more interrogators  One or more host computers  Appropriate software Totem International Ltd 20-06-2011 20
  • 21. RFID System Components (block diagram) Antenna Reader Asset/Tag Asset Firmware Tag Insert TCP/IP Host ~ Power Application Customer’s Software API MIS Totem International Ltd 20-06-2011 22
  • 22. Sequence of Communication • Host Manages Reader(s) and Issues Commands • Reader and tag communicate via RF signal • Carrier signal generated by the reader (upon request from the host application) • Carrier signal sent out through the antennas • Carrier signal hits tag(s) • Tag receives and modifies carrier signal – “sends back” modulated signals. • Antennas receive the modulated signal and send them to the Reader • Reader decodes the data – Results returned to the host application Totem International Ltd 20-06-2011 23
  • 23. Totem International Ltd 20-06-2011 24
  • 24. Tags can be attached to almost anything Totem International Ltd 20-06-2011 25
  • 25. Cloud computing + RFID Totem International Ltd 20-06-2011 26
  • 26. Cloud computing utilizes the network as a means to connect the user to resources by using the data collected with Rfid which provides a cost effective technology and information solution. Totem International Ltd 20-06-2011 27
  • 27. Rfid Tags Computers Readers Data storage Systems Computers For RFID Services & Servers data storage and processing. {Data filteration} Applications which Infrastructure provide access to cloud computing Middleware Cloud Computing Totem International Ltd 20-06-2011 28
  • 28. Thank you Email : firoze@totemint.com +919618621234 Totem International Ltd 20-06-2011 29