SlideShare une entreprise Scribd logo
1  sur  33
Session title
1
Devising a Practical Approach
To the Internet of Things
Gordon Haff
@ghaff
ghaff@redhat.com
10 February 2015
Session title
2
IoT's
expected
impact
Source: The Economist Intelligence Unit
Session title
3
What does the market look like?
How is it developing?
How do you architect for IoT?
HOW SHOULD WE THINK ABOUT IOT?
Session title
4
Session title
5
Session title
6
IT MAY BE WORTH REMEMBERING
There is no reason for any
individual to have a
computer in his home.
Ken Olsen, DEC, 1977
Session title
7
Session title
8
THE RISE OF THE
PERVASIVE SENSOR
Credit: Eric Fischer
Complete set: https://www.flickr.com/photos/walkingsf/sets/72157624209158632/
San
Francisco
Session title
9
Session title
10
SOME FACETS TO CONSIDER
• Consumer vs. Industrial
• No IP address vs. IP address
• How heavy is the client?
• How is the client connected?
• What does the client connect to?
• How and where is data processed?
Session title
11
Session title
12
Internet of Things Ecosystem and Trends
Source: IDC, Internet of Things Ecosystem and Trends, #IDC_P24793
Session title
13
GARTNER
HYPE CYCLE
FOR
INTERNET OF
THINGS
Session title
14
• Connected things not new, but…
• Value from greater connectivity options and
how data used to improve process
capabilities and automate decisions
• Integration with existing IT nascent
• High potential value—but also requires high
process and culture change
GARTNER: INTERNET OF THINGS FOR
MANUFACTURING OPERATIONS
Session title
15
THE INDUSTRIAL IOT
“We need the IT side to understand the
business value and priorities of control
integration, and to take more of a
leadership role. The controls side needs to
understand the need to partner and work
more closely with IT to take advantage of
these technologies.”
--Dan McGrath, Panduit
Session title
16
The growth of data
Session title
17
DATA = $$ ?
Session title
18
IS IT USEFUL?
Useful 34%
Tagged 7%
Analyzed 1%
Source: KPCB
Session title
19
Flickr/cc by Amy Barr
https://www.flickr.com/photos/anaxila/367953499
vs.
Session title
20
• The Thread Group
• IoT-GSI Open Interconnect Consortium
• The AllSeen Alliance
• HyperCat
• HomeKit
• Industrial Internet Consortium *
• OASIS IoT/M2M
• Weightless
MANY STANDARDS ORGS WITH DIFFERENT GOALS
Much overlapping membership
Session title
21
Apple
Cisco
Symantec
Accenture
ARM
Dell
Google
IBM
Intel
Microsoft
PTC
Samsung
Source: Rachel Chalmers,
Ignition Partners
Session title
22
SOME IOT MESSAGING PROTOCOLS: NEW HTTP?
Message Queue Telemetry Transport (MQTT)
• Pub/sub over TCP (one-to-one, one-to-many and many-to-one)
• Lightweight M2M
• Originally IBM—open standard
Constrained Application Protocol (CoAP)
• Document transfer protocol (like HTTP) but designed for constrained devices
• Built on UDP
• Primarily one-to-one (client/server)
XMPP (Jabber)
• Mostly data is going between distant, mostly unrelated points (like IM)
• Tends to be for consumer apps
Session title
23
MORE IOT MESSAGING PROTOCOLS
Data Distribution Service (DDS)
• Direct device-to-device bus communication
• Data-centric middleware standard with roots in high-
performance defense, industrial, and embedded applications.
• Can efficiently deliver millions of messages per second to many
simultaneous receivers
Advanced Message Queuing Protocol (AMQP)
• Strictly reliable point-to-point messages between servers using
TCP
• The standard for high-performance messaging in finance
• In IoT context, AMQP most appropriate for the control tier or
server-based analysis functions
Session title
24
IOT: STRINGENT TECH CHALLENGES FOR IT
Scalability
• IDC expects the global installed base of IoT endpoints to reach 212
billion connected devices by 2020 (Source: Worldwide Internet of Things
(IoT) 2013–2020 Forecast: Billions of Things, Trillions of Dollars, IDC,
October 2013)
• An individual intelligent system might gather and analyze billions of data
objects from millions of distinct endpoints
Session title
25
IOT: STRINGENT TECH CHALLENGES FOR IT
Reliability
• Many intelligent systems will be employed for mission-critical applications
where system downtime can result in diminished productivity, dissatisfied
customers, or lost revenue
• Some intelligent systems will be used in safety-critical applications where
system downtime can lead to loss of life or property or cause significant
environmental or health hazards
• Examples: emergency services, process control, real-time systems
control, health applications
Session title
26
IOT: STRINGENT TECH CHALLENGES FOR IT
Security
• Inherent exposure to public cloud and network services
• Security systems and practices must be extended to protect
against data loss, service theft, and increasingly sophisticated
denial-of-service attacks in a scalable manner
• Support cohesive authentication, authorization, and auditing
capabilities to establish trust, govern access to resources, and
ensure compliance
• Strong encryption often needed
Session title
27
THREE TIER ARCHITECTURE FOR IOT: DEVICE
• Wide variety of intelligent endpoints
(including relatively traditional client
computers/OSs)
• Standards-based wired and wireless
networking protocols for connectivity
• Standards-based data transport and
messaging mechanisms are used to forward
raw data and exchange control information
• Up to 100s of thousands or even millions
Session title
28
THREE TIER ARCHITECTURE FOR IOT: CONTROLLER
• Intermediary that facilitates communications,
offloads processing functions, and drives
action
• Analyzes tactical data and executes business
rules and issues control information
downstream
• Collects, summarizes, and stores device data
and forwards it upstream
• Consider “data gravity” and network
bandwidth/latency effects
• Thousands of instances
Session title
29
THREE TIER IOT ARCHITECTURE IOT: DATACENTER/CLOUD
• Large-scale data computation and repository
for data storage and strategic analysis
• Virtual environment for instantiating
applications, storing data, and executing
complex event processing, distributed
computing, and business analytics functions
• Collects and examines aggregated data from
the control tier and disseminates business
rules downstream
• Hundreds of instances
Session title
30
THREE-TIER ARCHITECTURE FOR IOT
Session title
31
SUMMING UP
• IOT isn’t a single thing and the details vary a
lot
• Different IOT examples are at different
maturity points
• Some may never mature—technology, use
case, cost
• Data architectures and approaches matter
• Intelligent systems architectures matter
Session title
32
ABOUT ME
• Red Hat Cloud Product Strategy
• Twitter: @ghaff
• Google+: Gordon Haff
• Email: ghaff@redhat.com
• Blog: http://bitmason.blogspot.com
• Formerly: Illuminata (industry analyst), Data
General (minicomputers/Unix/NUMA/etc.)
Session title
33
Questions?
Gordon Haff
@ghaff
ghaff@redhat.com

Contenu connexe

Tendances

Anonymous Individual Integration for IoT
Anonymous Individual Integration for IoTAnonymous Individual Integration for IoT
Anonymous Individual Integration for IoTPaul Fremantle
 
Internet of Things Architecture / Topology
Internet of Things Architecture / TopologyInternet of Things Architecture / Topology
Internet of Things Architecture / TopologyNEEVEE Technologies
 
Internet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads ConferenceInternet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads ConferenceIndicThreads
 
IoT introduction
IoT introductionIoT introduction
IoT introductionAnssi Soinu
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of thingsMonika Keerthi
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesAhmed Banafa
 
IoT-The Internet of Things
IoT-The Internet of ThingsIoT-The Internet of Things
IoT-The Internet of ThingsTushar Sharma
 
Introduction To The IBM IoT Foundation
Introduction To The IBM IoT FoundationIntroduction To The IBM IoT Foundation
Introduction To The IBM IoT Foundationpetecrocker
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoTVishnupriya T H
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns John Mathon
 
NDC Minnesota 2019 - Fundamentals of Azure IoT
NDC Minnesota 2019 - Fundamentals of Azure IoTNDC Minnesota 2019 - Fundamentals of Azure IoT
NDC Minnesota 2019 - Fundamentals of Azure IoTJustin Grammens
 
A Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of ThingsA Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of ThingsRick G. Garibay
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsGeorge Fletcher
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecturePaul Fremantle
 

Tendances (20)

Anonymous Individual Integration for IoT
Anonymous Individual Integration for IoTAnonymous Individual Integration for IoT
Anonymous Individual Integration for IoT
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
Internet of Things Architecture / Topology
Internet of Things Architecture / TopologyInternet of Things Architecture / Topology
Internet of Things Architecture / Topology
 
Internet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads ConferenceInternet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads Conference
 
IoT introduction
IoT introductionIoT introduction
IoT introduction
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
IoT-The Internet of Things
IoT-The Internet of ThingsIoT-The Internet of Things
IoT-The Internet of Things
 
Introduction To The IBM IoT Foundation
Introduction To The IBM IoT FoundationIntroduction To The IBM IoT Foundation
Introduction To The IBM IoT Foundation
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns
 
NDC Minnesota 2019 - Fundamentals of Azure IoT
NDC Minnesota 2019 - Fundamentals of Azure IoTNDC Minnesota 2019 - Fundamentals of Azure IoT
NDC Minnesota 2019 - Fundamentals of Azure IoT
 
Iot and ethics
Iot and ethicsIot and ethics
Iot and ethics
 
Iot Overview
Iot Overview Iot Overview
Iot Overview
 
A Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of ThingsA Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of Things
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open Standards
 
Enterprise, Architecture and IoT
Enterprise, Architecture and IoTEnterprise, Architecture and IoT
Enterprise, Architecture and IoT
 
How AI connect dots for IoT
How AI connect dots for IoTHow AI connect dots for IoT
How AI connect dots for IoT
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
 

Similaire à Devising a practical approach to the Internet of Things

Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaCodeOps Technologies LLP
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M
 
Atal io t introduction
Atal io t introductionAtal io t introduction
Atal io t introductionYadvendra bedi
 
Chapter 1-it-im introduction
Chapter 1-it-im introductionChapter 1-it-im introduction
Chapter 1-it-im introductionPrakash Patil
 
The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...Adam Doyle
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...Rick G. Garibay
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesThe IOT Academy
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachSUSE
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdfRupesh930637
 
Building Converged Plantwide Ethernet
Building Converged Plantwide EthernetBuilding Converged Plantwide Ethernet
Building Converged Plantwide EthernetRockwell Automation
 
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...Eurotech
 
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...Infosys
 
How Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITHow Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITPeter HJ van Eijk
 

Similaire à Devising a practical approach to the Internet of Things (20)

Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Digital transformation and AI @Edge
Digital transformation and AI @EdgeDigital transformation and AI @Edge
Digital transformation and AI @Edge
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 Primer
 
Atal io t introduction
Atal io t introductionAtal io t introduction
Atal io t introduction
 
Chapter 1-it-im introduction
Chapter 1-it-im introductionChapter 1-it-im introduction
Chapter 1-it-im introduction
 
The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
 
Profinet and the Industrial Internet of Things (IIoT) - Peter Thomas - Sept ...
Profinet and the Industrial Internet of Things (IIoT) -  Peter Thomas - Sept ...Profinet and the Industrial Internet of Things (IIoT) -  Peter Thomas - Sept ...
Profinet and the Industrial Internet of Things (IIoT) - Peter Thomas - Sept ...
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your Reach
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
Building Converged Plantwide Ethernet
Building Converged Plantwide EthernetBuilding Converged Plantwide Ethernet
Building Converged Plantwide Ethernet
 
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
 
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
 
How Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITHow Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run IT
 
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
 

Plus de Gordon Haff

Artificial Intelligence: Beyond Machine Learning
Artificial Intelligence: Beyond Machine LearningArtificial Intelligence: Beyond Machine Learning
Artificial Intelligence: Beyond Machine LearningGordon Haff
 
Blockchains for Business 101
Blockchains for Business 101Blockchains for Business 101
Blockchains for Business 101Gordon Haff
 
Preserving privacy while sharing data
Preserving privacy while sharing dataPreserving privacy while sharing data
Preserving privacy while sharing dataGordon Haff
 
Lightning Talk: Using Data without Compromising Privacy
Lightning Talk: Using Data without Compromising PrivacyLightning Talk: Using Data without Compromising Privacy
Lightning Talk: Using Data without Compromising PrivacyGordon Haff
 
Free and Open:An Historical Perspective
Free and Open:An Historical PerspectiveFree and Open:An Historical Perspective
Free and Open:An Historical PerspectiveGordon Haff
 
Why do we contribute (to open source)?
Why do we contribute (to open source)?Why do we contribute (to open source)?
Why do we contribute (to open source)?Gordon Haff
 
How do you get started in AI?
How do you get started in AI?How do you get started in AI?
How do you get started in AI?Gordon Haff
 
The good the bad and the ugly: Getting started doing AI
The good the bad and the ugly: Getting started doing AIThe good the bad and the ugly: Getting started doing AI
The good the bad and the ugly: Getting started doing AIGordon Haff
 
Cloud-Native: A New Ecosystem for Putting Containers into Production
Cloud-Native:  A New Ecosystem for Putting Containers into ProductionCloud-Native:  A New Ecosystem for Putting Containers into Production
Cloud-Native: A New Ecosystem for Putting Containers into ProductionGordon Haff
 
Containers: Don't Skeu Them Up
Containers: Don't Skeu Them UpContainers: Don't Skeu Them Up
Containers: Don't Skeu Them UpGordon Haff
 
Cloud-Native: A New Ecosystem for Putting Containers into Production
Cloud-Native: A New Ecosystem for Putting Containers into ProductionCloud-Native: A New Ecosystem for Putting Containers into Production
Cloud-Native: A New Ecosystem for Putting Containers into ProductionGordon Haff
 
DevSecOps: The Open Source Way for CloudExpo 2018
DevSecOps: The Open Source Way for CloudExpo 2018DevSecOps: The Open Source Way for CloudExpo 2018
DevSecOps: The Open Source Way for CloudExpo 2018Gordon Haff
 
AI: The Good, the Bad, and the Practical for CloudExpo 2018
AI: The Good, the Bad, and the Practical for CloudExpo 2018AI: The Good, the Bad, and the Practical for CloudExpo 2018
AI: The Good, the Bad, and the Practical for CloudExpo 2018Gordon Haff
 
DevSecOps: The Open Source Way
DevSecOps: The Open Source WayDevSecOps: The Open Source Way
DevSecOps: The Open Source WayGordon Haff
 
Ten layers of container security for CloudCamp Nov 2017
Ten layers of container security  for CloudCamp Nov 2017Ten layers of container security  for CloudCamp Nov 2017
Ten layers of container security for CloudCamp Nov 2017Gordon Haff
 
That's not a metric! Data for cloud-native success
That's not a metric! Data for cloud-native successThat's not a metric! Data for cloud-native success
That's not a metric! Data for cloud-native successGordon Haff
 
The Interesting IoT: Digitizing Operations
The Interesting IoT: Digitizing OperationsThe Interesting IoT: Digitizing Operations
The Interesting IoT: Digitizing OperationsGordon Haff
 
A short history of packaging (Monkigras 2017)
A short history of packaging (Monkigras 2017)A short history of packaging (Monkigras 2017)
A short history of packaging (Monkigras 2017)Gordon Haff
 
Optimizing the Ops in DevOps
Optimizing the Ops in DevOpsOptimizing the Ops in DevOps
Optimizing the Ops in DevOpsGordon Haff
 
Containers: Don't Skeu Them Up. Use Microservices Instead.
Containers: Don't Skeu Them Up. Use Microservices Instead.Containers: Don't Skeu Them Up. Use Microservices Instead.
Containers: Don't Skeu Them Up. Use Microservices Instead.Gordon Haff
 

Plus de Gordon Haff (20)

Artificial Intelligence: Beyond Machine Learning
Artificial Intelligence: Beyond Machine LearningArtificial Intelligence: Beyond Machine Learning
Artificial Intelligence: Beyond Machine Learning
 
Blockchains for Business 101
Blockchains for Business 101Blockchains for Business 101
Blockchains for Business 101
 
Preserving privacy while sharing data
Preserving privacy while sharing dataPreserving privacy while sharing data
Preserving privacy while sharing data
 
Lightning Talk: Using Data without Compromising Privacy
Lightning Talk: Using Data without Compromising PrivacyLightning Talk: Using Data without Compromising Privacy
Lightning Talk: Using Data without Compromising Privacy
 
Free and Open:An Historical Perspective
Free and Open:An Historical PerspectiveFree and Open:An Historical Perspective
Free and Open:An Historical Perspective
 
Why do we contribute (to open source)?
Why do we contribute (to open source)?Why do we contribute (to open source)?
Why do we contribute (to open source)?
 
How do you get started in AI?
How do you get started in AI?How do you get started in AI?
How do you get started in AI?
 
The good the bad and the ugly: Getting started doing AI
The good the bad and the ugly: Getting started doing AIThe good the bad and the ugly: Getting started doing AI
The good the bad and the ugly: Getting started doing AI
 
Cloud-Native: A New Ecosystem for Putting Containers into Production
Cloud-Native:  A New Ecosystem for Putting Containers into ProductionCloud-Native:  A New Ecosystem for Putting Containers into Production
Cloud-Native: A New Ecosystem for Putting Containers into Production
 
Containers: Don't Skeu Them Up
Containers: Don't Skeu Them UpContainers: Don't Skeu Them Up
Containers: Don't Skeu Them Up
 
Cloud-Native: A New Ecosystem for Putting Containers into Production
Cloud-Native: A New Ecosystem for Putting Containers into ProductionCloud-Native: A New Ecosystem for Putting Containers into Production
Cloud-Native: A New Ecosystem for Putting Containers into Production
 
DevSecOps: The Open Source Way for CloudExpo 2018
DevSecOps: The Open Source Way for CloudExpo 2018DevSecOps: The Open Source Way for CloudExpo 2018
DevSecOps: The Open Source Way for CloudExpo 2018
 
AI: The Good, the Bad, and the Practical for CloudExpo 2018
AI: The Good, the Bad, and the Practical for CloudExpo 2018AI: The Good, the Bad, and the Practical for CloudExpo 2018
AI: The Good, the Bad, and the Practical for CloudExpo 2018
 
DevSecOps: The Open Source Way
DevSecOps: The Open Source WayDevSecOps: The Open Source Way
DevSecOps: The Open Source Way
 
Ten layers of container security for CloudCamp Nov 2017
Ten layers of container security  for CloudCamp Nov 2017Ten layers of container security  for CloudCamp Nov 2017
Ten layers of container security for CloudCamp Nov 2017
 
That's not a metric! Data for cloud-native success
That's not a metric! Data for cloud-native successThat's not a metric! Data for cloud-native success
That's not a metric! Data for cloud-native success
 
The Interesting IoT: Digitizing Operations
The Interesting IoT: Digitizing OperationsThe Interesting IoT: Digitizing Operations
The Interesting IoT: Digitizing Operations
 
A short history of packaging (Monkigras 2017)
A short history of packaging (Monkigras 2017)A short history of packaging (Monkigras 2017)
A short history of packaging (Monkigras 2017)
 
Optimizing the Ops in DevOps
Optimizing the Ops in DevOpsOptimizing the Ops in DevOps
Optimizing the Ops in DevOps
 
Containers: Don't Skeu Them Up. Use Microservices Instead.
Containers: Don't Skeu Them Up. Use Microservices Instead.Containers: Don't Skeu Them Up. Use Microservices Instead.
Containers: Don't Skeu Them Up. Use Microservices Instead.
 

Dernier

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Dernier (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Devising a practical approach to the Internet of Things

  • 1. Session title 1 Devising a Practical Approach To the Internet of Things Gordon Haff @ghaff ghaff@redhat.com 10 February 2015
  • 3. Session title 3 What does the market look like? How is it developing? How do you architect for IoT? HOW SHOULD WE THINK ABOUT IOT?
  • 6. Session title 6 IT MAY BE WORTH REMEMBERING There is no reason for any individual to have a computer in his home. Ken Olsen, DEC, 1977
  • 8. Session title 8 THE RISE OF THE PERVASIVE SENSOR Credit: Eric Fischer Complete set: https://www.flickr.com/photos/walkingsf/sets/72157624209158632/ San Francisco
  • 10. Session title 10 SOME FACETS TO CONSIDER • Consumer vs. Industrial • No IP address vs. IP address • How heavy is the client? • How is the client connected? • What does the client connect to? • How and where is data processed?
  • 12. Session title 12 Internet of Things Ecosystem and Trends Source: IDC, Internet of Things Ecosystem and Trends, #IDC_P24793
  • 14. Session title 14 • Connected things not new, but… • Value from greater connectivity options and how data used to improve process capabilities and automate decisions • Integration with existing IT nascent • High potential value—but also requires high process and culture change GARTNER: INTERNET OF THINGS FOR MANUFACTURING OPERATIONS
  • 15. Session title 15 THE INDUSTRIAL IOT “We need the IT side to understand the business value and priorities of control integration, and to take more of a leadership role. The controls side needs to understand the need to partner and work more closely with IT to take advantage of these technologies.” --Dan McGrath, Panduit
  • 18. Session title 18 IS IT USEFUL? Useful 34% Tagged 7% Analyzed 1% Source: KPCB
  • 19. Session title 19 Flickr/cc by Amy Barr https://www.flickr.com/photos/anaxila/367953499 vs.
  • 20. Session title 20 • The Thread Group • IoT-GSI Open Interconnect Consortium • The AllSeen Alliance • HyperCat • HomeKit • Industrial Internet Consortium * • OASIS IoT/M2M • Weightless MANY STANDARDS ORGS WITH DIFFERENT GOALS Much overlapping membership
  • 22. Session title 22 SOME IOT MESSAGING PROTOCOLS: NEW HTTP? Message Queue Telemetry Transport (MQTT) • Pub/sub over TCP (one-to-one, one-to-many and many-to-one) • Lightweight M2M • Originally IBM—open standard Constrained Application Protocol (CoAP) • Document transfer protocol (like HTTP) but designed for constrained devices • Built on UDP • Primarily one-to-one (client/server) XMPP (Jabber) • Mostly data is going between distant, mostly unrelated points (like IM) • Tends to be for consumer apps
  • 23. Session title 23 MORE IOT MESSAGING PROTOCOLS Data Distribution Service (DDS) • Direct device-to-device bus communication • Data-centric middleware standard with roots in high- performance defense, industrial, and embedded applications. • Can efficiently deliver millions of messages per second to many simultaneous receivers Advanced Message Queuing Protocol (AMQP) • Strictly reliable point-to-point messages between servers using TCP • The standard for high-performance messaging in finance • In IoT context, AMQP most appropriate for the control tier or server-based analysis functions
  • 24. Session title 24 IOT: STRINGENT TECH CHALLENGES FOR IT Scalability • IDC expects the global installed base of IoT endpoints to reach 212 billion connected devices by 2020 (Source: Worldwide Internet of Things (IoT) 2013–2020 Forecast: Billions of Things, Trillions of Dollars, IDC, October 2013) • An individual intelligent system might gather and analyze billions of data objects from millions of distinct endpoints
  • 25. Session title 25 IOT: STRINGENT TECH CHALLENGES FOR IT Reliability • Many intelligent systems will be employed for mission-critical applications where system downtime can result in diminished productivity, dissatisfied customers, or lost revenue • Some intelligent systems will be used in safety-critical applications where system downtime can lead to loss of life or property or cause significant environmental or health hazards • Examples: emergency services, process control, real-time systems control, health applications
  • 26. Session title 26 IOT: STRINGENT TECH CHALLENGES FOR IT Security • Inherent exposure to public cloud and network services • Security systems and practices must be extended to protect against data loss, service theft, and increasingly sophisticated denial-of-service attacks in a scalable manner • Support cohesive authentication, authorization, and auditing capabilities to establish trust, govern access to resources, and ensure compliance • Strong encryption often needed
  • 27. Session title 27 THREE TIER ARCHITECTURE FOR IOT: DEVICE • Wide variety of intelligent endpoints (including relatively traditional client computers/OSs) • Standards-based wired and wireless networking protocols for connectivity • Standards-based data transport and messaging mechanisms are used to forward raw data and exchange control information • Up to 100s of thousands or even millions
  • 28. Session title 28 THREE TIER ARCHITECTURE FOR IOT: CONTROLLER • Intermediary that facilitates communications, offloads processing functions, and drives action • Analyzes tactical data and executes business rules and issues control information downstream • Collects, summarizes, and stores device data and forwards it upstream • Consider “data gravity” and network bandwidth/latency effects • Thousands of instances
  • 29. Session title 29 THREE TIER IOT ARCHITECTURE IOT: DATACENTER/CLOUD • Large-scale data computation and repository for data storage and strategic analysis • Virtual environment for instantiating applications, storing data, and executing complex event processing, distributed computing, and business analytics functions • Collects and examines aggregated data from the control tier and disseminates business rules downstream • Hundreds of instances
  • 31. Session title 31 SUMMING UP • IOT isn’t a single thing and the details vary a lot • Different IOT examples are at different maturity points • Some may never mature—technology, use case, cost • Data architectures and approaches matter • Intelligent systems architectures matter
  • 32. Session title 32 ABOUT ME • Red Hat Cloud Product Strategy • Twitter: @ghaff • Google+: Gordon Haff • Email: ghaff@redhat.com • Blog: http://bitmason.blogspot.com • Formerly: Illuminata (industry analyst), Data General (minicomputers/Unix/NUMA/etc.)

Notes de l'éditeur

  1. Ignition Partners’ Rachel Chalmers argues this is the most important