What is IoT



IoT Challenges
Fragmented experiences, no unified control
Difficult to control the many different smart devices in the environment
No affordance for multi-user environments
Most consumer IoT controls are inflexible, mobile app only and not pervasive
Current automated systems are a complicated process involving some level of tech jargon

Isolated single-task recipes do not reflect real-world situations that are multi-conditional,

Recipes should focused on the experience, not the specific tasks


将来的需求
Contextual Awareness

   Exploits contextual and situational information from the environment and other devices.


Anticipatory &Adaptive

    Learns and predicts the needs of individuals and collectively in the household.


Personalized

   Enables behaviors to be tailored by the user, for the user

Unobtrusive 

   Recedes into the background of daily life.

Transparent

    Communicates and behaves  understandably

Human-focused

    Create service-based  actions curated specific to experience rather than tasks.

Ease of Entry 

    Lower barriers to entry into Internet of Things for mass market consumers


http://www.eetimes.com/document.asp?doc_id=1320045


Fog computing is a term for an alternative to cloud computing that puts some kinds of transactions and resources at the edge of a network, rather than establishing channels for cloud storage and utilization. Proponents of fog computing argue that it can reduce the need for bandwidth by not sending every bit of information over cloud channels, and instead aggregating it at certain access points, such as routers. This allows for a more strategic compilation of data that may not be needed in cloud storage right away, if at all. By using this kind of distributed strategy, project managers can lower costs and improve efficiencies

Cisco describes this cloud computing design as "resulting in superior user experience" and using "wide geographical distribution" to handle real-time big data sets. For example, some experts use the example of a high performance piece of equipment that generates a lot of data about its performance and use. When this data does not need to be sent to the cloud, it can be sent to fog computing systems that will aggregate it somewhere near the edge of the network. Fog computing also has particular applications related to the Internet of things (IoT), which describes systems in which more and more appliances and pieces of equipment are connected to the global Internet.


http://designswarm.com/blog/2014/04/a-litmus-test-for-the-internet-of-things/


MOBILE IOT  

Pros
• Basic IoT experience users are already familiar with!
• Remote access of IoT devices, goes with the user!

Cons!
• Mobile experiences of recipes are still difficult !
• Small screen on mobile does not allow for full view of
home devices!
• Individual user control of IoT for entire home!
• Fragmented app-centric model




SMART TV IOT

Pros!
• Larger screen real estate for viewing all home devices and
offer different method for creating recipes!
• Naturally shared device, home-centric!

Cons!
• Users are generally not comfortable with configuring and
input information on TV
(However, creating and configuring recipes only requires
very little text input. Text input can be automated,
predictive and preloaded.)!
• Stationary device, not movable, and stays at home


Technically, authentication methods between Smart Things Hub and Smart TV must be seamless.


Maestro 


Consumer Perceptions of IoT

Top barriers to mass adoption of IoT technology:
Lack of awareness
64% were unaware that items like smart fridges and smoke detectors are available for purchase
Lack of perceived value
92% say it’s very difficult to pinpoint what they’d want from smart objects
58 % feel strongly that they won’t upgrade to smart products unless they offer real value
41% feel strongly that the smart products they’ve heard about have just been gimmicky
Price
Consumers worry about a “slippery slope” of costs, with more money being required over time
to set up the product or to add related products to the network.
Privacy concerns
53% are concerned that their data might be shared without their knowledge or approval
51% are concerned that their data could be hacked by other users


IoT Experience Pain Points

. Fragmented experiences, no unified experience
• No cross-feature, cross-platform, interoperability, unnecessary configuration
• No affordance for multi-user family environments
• No streamlined transition between spaces/environments
• Does not grow, learn, and adapt with the users
• Fragmented communities of IoT ecosystem
• No transparency or feedback of system actions
• Too much technology jargon, common users avoid complicated set up


Consumer Expectations

48% said they’d be much more interested in a “total solution” with one app to
control them all, rather than purchasing items with no cross-compatibility

53% expressed interest in being able to access or control objects remotely to quell
anxiety when away from home

65% cited their top-ranked benefit of IoT was saving money

Consumers are more likely to pay a premium for a smart home device that offers
safety over novelty

Parents are more likely to purchase IoT than other segments


当前很多仍停留在Home Automation,提供Remote Control能力,controls the home
appliances/products both in and out of the home(seperate control) , the technology is currently available, Current home solutions are fragmented

But A SmartHome  should provides Intelligent & Personalized 能力,Home appliances/devices can understand my behavior patterns

So it should includes intelligence and do not need me to intervene


TV watching patterns are fairly routine. With the triggers and actions accessible to IoT and the users, controlling the TV can be
automated and be more delightful. Facilitate scheduled information and entertainment to user based on their habits and their use patterns.

for example  Jake is watching two TV shows “Big Bang Theory” and “Modern Family” on Hulu and started watching the show “Jericho” on Netflix.
He generally starts to watch TV every night at 9pm. (Option 1) He creates a recipe so that the TV always turns on at 9pm. (Option 2) Maestro
learns that every day at 9pm (except for Thursdays when he has piano lessons), Jake likes to watch one of these three shows, and suggests
making a recipe out of that event. (Option 3) Maestro automatically turns on the TV, tunes to “Big Bang Theory” at 9pm because it has already
learned that Jake is home, is sitting in front of the TV, and will probably watch that show at 9pm.



a truly Smarter World doesn’t simply try to optimize itself against one criteria. A citizen of a smart city cannot be expected to live their lives trying to make one particular metric go in the recommended direction. City dwelling humans are not containers in a supply chain: they have individual needs, and individual criteria to optimize their lives by.


http://www.mckinsey.com/insights/high_tech_telecoms_internet/the_internet_of_things

http://www.libelium.com/products/meshlium/smartphone-detection/      Vehicle Traffic Monitoring


http://zh-cn.ptc.com/liveworx?utm_source=linkedin&utm_medium=social&utm_campaign=TWX_LiveWorx&utm_content=TWX_LiveWorx-linkedin-social-LiveWorx_Landing_Page_-_LLA_-_LI-WW-742&cl1=TWX_LiveWorx-linkedin-social-LiveWorx_Landing_Page_-_LLA_-_LI-WW-742


http://www.hubwiz.com/     nodejs study

http://nodeapi.ucdok.com/#/api/util.html


The Internet of Things provides a host of opportuni-
ties for enterprises to introduce and integrate
innovative connected devices, advanced analytics,
and new cross-platform applications with enterprise
systems. These innovations offer enterprises new and
exciting capabilities to design and launch products
with value-added services. Consequently, this creates
further opportunities for enterprises to develop new
business models, customer engagement structures and
revenue streams. The broad-ranging impact of
Enterprise IoT is set to change the rules of the game.


http://www.open-open.com/lib/view/1392611872538   nodejs


http://www.cisco.com/c/en/us/solutions/service-provider/iot-cloud-connect/index.html


http://www.zigbee.org/zigbee-for-developers/zigbee3-0/


http://www.zigbee.org/the-latest/


Sensing(7次)
Sensing
Message Queue
Ontology
Web IoT
IOT安全标准调研
ZigBee
Zwave
培训 (4次)
Tizen Platform (3)
Java Script


https://cnodejs.org/topic/551200e6d792542a29789a43  nodeje



Traditionally, the main focus of device manufacturers was to deliver a physical product with the respective functionality and to maintain this product throughout its life-cycle. But times have changed.

1. New Business Models: How hardware manufacturers manage the transition to a combined Hardware/Software approach

2. Establishing digital supply chains in addition to traditional physical supply chains

3. Protection of Embedded Software with a ring of Defence: Resistance, Obfuscation and Detection

4. Monetise your embedded software by using a standard solution (licensing and entitlement management)

5. Increase customer satisfaction and minimise support cost with remote diagnostics, configuration, updates and functionality management

Connectivity becomes more important and creates completely new use cases. Instead of physically tying functionality to hardware devices, software becomes the main differentiator. In order to be successful in this market, device manufacturers are changing their business models and focusing on embedded software as key to customer satisfaction and sustainability. To do so successfully, every device manufacturer needs to know exactly what their customers are entitled to and what they are really using. This includes the ability to communicate with customers and update functionality remotely.

Device Manufacturers also need to adapt quickly to different monetisation, licensing and pricing models as customer expectations mature. This Webinar gives an overview on changing business models, along with details and examples what is expected from Intelligent Device Manufacturers and where companies are especially successful in the IoT world.


http://www.infoq.com/cn/news/2011/09/nodejs-async-code

http://www.ibm.com/developerworks/linux/library/l-async/

http://open.163.com/movie/2010/12/2/E/M6UTT5U0I_M6V2T4T2E.html   麻省理工课程


The Identity of Things (IDoT) is an area of endeavor that involves assigning unique identifiers(UID) with associatedmetadata to devices and objects (things),enabling them to connect and communicate effectively with other entities over the Internet.

The metadata associated with the UID collectively defines the identity of an endpoint. Identityof things is an essential component of the Internet of Things (IoT), in which almostanything imaginable can be addressed and networked for exchange of data online. In thiscontext, athing can be anyentity -- including both physical and logical objects -- that has a unique identifier and theability to transfer data over a network. 

Addressability makes itpossible for things to be targeted and found. To be addressable for the Internet of Things, anentity must be globally uniquely identifiable, which means that it must be associated withsomething -- typically an alphanumeric string -- that is notassociated with anything else. 

To make communication among things effective and secure, however, it's crucial to make moreinformation about their identities available to other things. Following are some of the essentialconsiderations for identities of IoT things: 

Lifecycle: Some IoT entities can have quite extensive life spans. An individual's electronicmedical record (EMR), for example,is a logical object that maintains its identity through the person's life. On the other hand someother entities have very brief lifecycles. A parcel, for example, only exists as an entity from thetime it is shipped until the time it is received. 

Relationships: It's important to know how an IoT entity is related to other entities, includingnot only other things but also external entities such as owners, administrators and otherresponsible parties.

Context-awareness: Identity and access management (IAM) for IoTentities must have the capacity to be context-dependent. It may be appropriate, for example, for anentity to access another entity or system under certain circumstances and inappropriate -- or evendangerous -- for it to be granted access otherwise. 

Authentication: Multifactorauthentication is effective to validate humans but less so for IoT things because many methods--biometricverification, for example -- are not relevant. It's necessary to find other means of securelyauthenticating IoTidentities.



http://zh-cn.ptc.com/about/manufacturing-transformation/internet-of-things   


http://ptcvideo.icax.org/PTCvideo/video/

http://zh-cn.ptc.com/axeda


http://www.cnblogs.com/kkun/archive/2011/11/23/2260312.html 排序算法



需要链接的博文

http://blog.csdn.net/wallance82/article/details/43573931      SDT(software-defined Things)?软件定义的物件

http://blog.csdn.net/wallance82/article/details/45625895      实现SDT(software-defined Things)的IOT案例(3)

http://blog.csdn.net/wallance82/article/details/44133235      实现SDT(software-defined Things)的IOT案例(2)

http://blog.csdn.net/wallance82/article/details/43855411      实现SDT(software-defined Things)的一个IOT案例

http://blog.csdn.net/wallance82/article/details/45913475     Why I am less optimistic about SmartThings solution for IoT

http://blog.csdn.net/wallance82/article/details/45666475     Why SmartCar maybe easier implement than SmartHome

http://blog.csdn.net/wallance82/article/details/45439745     How should we prepare for IoT?

http://blog.csdn.net/wallance82/article/details/45245077      IoT drives cyber security to radical change

http://blog.csdn.net/wallance82/article/details/44959501     IoT is a vulnerable black-hole to attacks

http://blog.csdn.net/wallance82/article/details/43971831    基于Web服务的物联网-WoT(Web of Things)

http://blog.csdn.net/wallance82/article/details/44424717     发表一点本人对IoT的个人看法(英)


http://blog.csdn.net/wallance82/article/details/43731105     针对BMW 联网驾驶 漏洞的改进方案

Samsung SRCN MLT Strategy TF(中长期) 战略(Task Force)成员 (IoT方向)


http://www.csdn.net/article/2015-06-10/2824924    

物联网技术上面临的基本问题和操作系统设计

http://www.oiotc.cc/     LiteOS

http://tech.163.com/15/0531/09/AQUCHMAR000915BD.html  

详解没在谷歌I/O大会上展示的Brillo和Weave细节






AllSeen与OIC均在订立一个互通性的框架,遵循此框架可让应用程式、作业系统、通讯技术与协定、硬体装置等各层次互通,避免不相容的问题及重复开发的浪费等。OIC与AllSeen相同,也将采开放原码方式发展,但OIC有意推行认证测试,但细节尚未公布。

AllSeen与OIC确实定位相近,但Thread则与AllSeen、OIC没有冲突。

Thread技术方面,Thread是一种新的物联网无线网路,与Wi-Fi、Bluetooth等属相同层次,相对的,AllSeen与OIC追求广泛支援各种网路技术,不仅支援Wi-Fi、Bluetooth,也支援ZigBee、Z-Wave、ANT+等。

Thread技术与ZigBee技术最相近,然已有ZigBee为何还需要Thread?估在于ZigBee的支援面太广,ZigBee在网路层就分成ZigBee/ZigBee PRO、RF4CE、ZigBee IP等三大类,在三大类之上又有10种以上的应用型态(Application Profile),虽已有偏智慧家庭层面的应用型态,如ZHA(ZigBee Home Automation)、ZLL(ZigBee Light Link)、ZRC(ZigBee Remote Control),但也要兼顾产业用、零售用等发展,家用物联网恐难全心投入。


http://www.usatoday.com/story/driveon/2013/10/08/ford-driverless-car-parking/2941361/#   福特无人驾驶

http://www.ge.com/careers/opportunities?keyword=&country=China&state=ShangHai&func=TG_SEARCH_ALL&business=TG_SEARCH_ALL&business_segment=TG_SEARCH_ALL



Comparison of Divide and Conquer and Dynamic programming

1)Divide and Conquer
Divide the problem into unassociated subproblems .
Solve the subproblem recursively.
Combine the solutionsof subproblems .
Example: Merge sort,quick sort
2)DP
Cannot be appliedwhen subproblems are not associated,i.e., subproblems share smaller subproblems .
Every subproblem in calculated just once and then the result is stored for reuse.
Calculation is performed again when subproblems like Divide and Conquer appear.
Example:Fibonacci number and the shortest path

Divideand Conquer approaches in top down way, andDPin bottom up

DP shouldcomply with the following requirements ----Optimal substructure

Principle of optimality is that,when a solution to a certain problem is optimal, then the solutions of small problems constituting the solution should be also optimal.


http://nerds.airbnb.com/mysql-in-the-cloud-at-airbnb/



amazon 帐号  mczhou82@hotmail.com   99147130

261746154500    ZhouMingchun   99147130


http://aws.amazon.com/solutions/    AWS solution

http://aws.amazon.com/websites/getting-started/ 

http://docs.aws.amazon.com/gettingstarted/latest/wah-linux/web-app-hosting-intro.html

http://aws.amazon.com/websites/getting-started/start-your-project/

http://aws.amazon.com/solutions/case-studies/expedia/

http://aws.amazon.com/solutions/case-studies/kellogg-company/

http://aws.amazon.com/solutions/case-studies/mortar-data/



http://docs.aws.amazon.com/zh_cn/AmazonRDS/latest/UserGuide/UsingWithRDS.SSL.html  

http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/MigrateS3ToCloudFront.html

http://docs.aws.amazon.com/zh_cn/AWSCloudFormation/latest/UserGuide/sample-templates-applications-us-west-2.html

http://docs.aws.amazon.com/zh_cn/AmazonVPC/latest/UserGuide/VPC_Scenario2.html

http://docs.aws.amazon.com/zh_cn/AmazonVPC/latest/UserGuide/VPC_Subnets.html#vpc-subnet-diagram

http://docs.aws.amazon.com/zh_cn/AmazonVPC/latest/UserGuide/VPC_Internet_Gateway.html

http://docs.amazonaws.cn/AmazonVPC/latest/GettingStartedGuide/Wizard.html





Cloud robotics is the use of remote computing resources to enable greater memory, computational power, collective learning and interconnectivity for robotics applications.

When computational or storage demands exceed the on-board capacity of a robot, they are offloaded to thecloud, where the massive resources of a datacenter can supplement their limited local resources. Cloud robotics also represent a significant advance for robot learning. Where it might take one robot 150 hours to learn a task using its own individual artificial intelligence (AI) resources,  the collaborative effort of 150 robots learning different parts of a task might complete the task in an hour.

With a Wi-Fi connection to cloud-based resources, a robot can access a vast library of known objects to  identify things in its environment. Object recognition helps a robot to better perform tasks like sorting, cleaning and using appliances. Relying on the cloud for resources also means that the robot itself can be simpler, eliminating costly compute power and the associated cooling and electrical power draw. Due to this offloading, cloud connected robots have lower battery requirements and are overall lighter and less expensive. Cloud robotics are typically used for tasks that don't require real-time execution, preserving local resources for applications with demanding time constraints.

The connection to the cloud eliminates the need for a robot to learn a task any other connected robot has: It can download the necessary information instead of having to feel out or observe how to do a task. This interconnectedness can help robots work together more smoothly too, coordinating their tasks automatically.

Google’s self-driving cars are one type of cloud-connected robot. The autonomous cars access data from Google Maps and images stored in the cloud to recognize their surroundings. They also gather information about road and traffic conditions and send that information back to the cloud.

Another example is Romo, an inexpensive ($150) cloud-connectable robot that moves on a treaded base housing a battery. AniPhone provides computational power and its camera, microphone and speakers. The cloud compute factor makes the robot better able to recognize its environment. Romos can be used to play games or can be used fortelepresence, which allows a human operator to be virtually present in a remote location.


评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值