IoT Challenges
Fragmented experiences, no unified control
Difficult to control the many different smart devices in the environment
No affordance for multi-user environments
Most consumer IoT controls are inflexible, mobile app only and not pervasive
Current automated systems are a complicated process involving some level of tech jargon
Isolated single-task recipes do not reflect real-world situations that are multi-conditional,
Recipes should focused on the experience, not the specific tasks
将来的需求
Contextual Awareness
Exploits contextual and situational information from the environment and other devices.
Anticipatory &Adaptive
Learns and predicts the needs of individuals and collectively in the household.
Personalized
Enables behaviors to be tailored by the user, for the user
Unobtrusive
Recedes into the background of daily life.
Transparent
Communicates and behaves understandably
Human-focused
Create service-based actions curated specific to experience rather than tasks.
Ease of Entry
Lower barriers to entry into Internet of Things for mass market consumers
http://www.eetimes.com/document.asp?doc_id=1320045
Fog computing is a term for an alternative to cloud computing that puts some kinds of transactions and resources at the edge of a network, rather than establishing channels for cloud storage and utilization. Proponents of fog computing argue that it can reduce the need for bandwidth by not sending every bit of information over cloud channels, and instead aggregating it at certain access points, such as routers. This allows for a more strategic compilation of data that may not be needed in cloud storage right away, if at all. By using this kind of distributed strategy, project managers can lower costs and improve efficiencies
Cisco describes this cloud computing design as "resulting in superior user experience" and using "wide geographical distribution" to handle real-time big data sets. For example, some experts use the example of a high performance piece of equipment that generates a lot of data about its performance and use. When this data does not need to be sent to the cloud, it can be sent to fog computing systems that will aggregate it somewhere near the edge of the network. Fog computing also has particular applications related to the Internet of things (IoT), which describes systems in which more and more appliances and pieces of equipment are connected to the global Internet.
http://designswarm.com/blog/2014/04/a-litmus-test-for-the-internet-of-things/
MOBILE IOT
Pros
• Basic IoT experience users are already familiar with!
• Remote access of IoT devices, goes with the user!
Cons!
• Mobile experiences of recipes are still difficult !
• Small screen on mobile does not allow for full view of
home devices!
• Individual user control of IoT for entire home!
• Fragmented app-centric model
SMART TV IOT
Pros!
• Larger screen real estate for viewing all home devices and
offer different method for creating recipes!
• Naturally shared device, home-centric!
Cons!
• Users are generally not comfortable with configuring and
input information on TV
(However, creating and configuring recipes only requires
very little text input. Text input can be automated,
predictive and preloaded.)!
• Stationary device, not movable, and stays at home
Technically, authentication methods between Smart Things Hub and Smart TV must be seamless.
Maestro
Consumer Perceptions of IoT
Top barriers to mass adoption of IoT technology:
Lack of awareness
64% were unaware that items like smart fridges and smoke detectors are available for purchase
Lack of perceived value
92% say it’s very difficult to pinpoint what they’d want from smart objects
58 % feel strongly that they won’t upgrade to smart products unless they offer real value
41% feel strongly that the smart products they’ve heard about have just been gimmicky
Price
Consumers worry about a “slippery slope” of costs, with more money being required over time
to set up the product or to add related products to the network.
Privacy concerns
53% are concerned that their data might be shared without their knowledge or approval
51% are concerned that their data could be hacked by other users
IoT Experience Pain Points
. Fragmented experiences, no unified experience
• No cross-feature, cross-platform, interoperability, unnecessary configuration
• No affordance for multi-user family environments
• No streamlined transition between spaces/environments
• Does not grow, learn, and adapt with the users
• Fragmented communities of IoT ecosystem
• No transparency or feedback of system actions
• Too much technology jargon, common users avoid complicated set up
Consumer Expectations
48% said they’d be much more interested in a “total solution” with one app to
control them all, rather than purchasing items with no cross-compatibility
53% expressed interest in being able to access or control objects remotely to quell
anxiety when away from home
65% cited their top-ranked benefit of IoT was saving money
Consumers are more likely to pay a premium for a smart home device that offers
safety over novelty
Parents are more likely to purchase IoT than other segments
当前很多仍停留在Home Automation,提供Remote Control能力,controls the home
appliances/products both in and out of the home(seperate control) , the technology is currently available, Current home solutions are fragmented
But A SmartHome should provides Intelligent & Personalized 能力,Home appliances/devices can understand my behavior patterns
So it should includes intelligence and do not need me to intervene
TV watching patterns are fairly routine. With the triggers and actions accessible to IoT and the users, controlling the TV can be
automated and be more delightful. Facilitate scheduled information and entertainment to user based on their habits and their use patterns.
for example Jake is watching two TV shows “Big Bang Theory” and “Modern Family” on Hulu and started watching the show “Jericho” on Netflix.
He generally starts to watch TV every night at 9pm. (Option 1) He creates a recipe so that the TV always turns on at 9pm. (Option 2) Maestro
learns that every day at 9pm (except for Thursdays when he has piano lessons), Jake likes to watch one of these three shows, and suggests
making a recipe out of that event. (Option 3) Maestro automatically turns on the TV, tunes to “Big Bang Theory” at 9pm because it has already
learned that Jake is home, is sitting in front of the TV, and will probably watch that show at 9pm.
a truly Smarter World doesn’t simply try to optimize itself against one criteria. A citizen of a smart city cannot be expected to live their lives trying to make one particular metric go in the recommended direction. City dwelling humans are not containers in a supply chain: they have individual needs, and individual criteria to optimize their lives by.
http://www.mckinsey.com/insights/high_tech_telecoms_internet/the_internet_of_things
http://www.libelium.com/products/meshlium/smartphone-detection/ Vehicle Traffic Monitoring
http://zh-cn.ptc.com/liveworx?utm_source=linkedin&utm_medium=social&utm_campaign=TWX_LiveWorx&utm_content=TWX_LiveWorx-linkedin-social-LiveWorx_Landing_Page_-_LLA_-_LI-WW-742&cl1=TWX_LiveWorx-linkedin-social-LiveWorx_Landing_Page_-_LLA_-_LI-WW-742
http://www.hubwiz.com/ nodejs study
http://nodeapi.ucdok.com/#/api/util.html
The Internet of Things provides a host of opportuni-
ties for enterprises to introduce and integrate
innovative connected devices, advanced analytics,
and new cross-platform applications with enterprise
systems. These innovations offer enterprises new and
exciting capabilities to design and launch products
with value-added services. Consequently, this creates
further opportunities for enterprises to develop new
business models, customer engagement structures and
revenue streams. The broad-ranging impact of
Enterprise IoT is set to change the rules of the game.
http://www.open-open.com/lib/view/1392611872538 nodejs
http://www.cisco.com/c/en/us/solutions/service-provider/iot-cloud-connect/index.html
http://www.zigbee.org/zigbee-for-developers/zigbee3-0/
http://www.zigbee.org/the-latest/
Sensing(7次)
Sensing
Message Queue
Ontology
Web IoT
IOT安全标准调研
ZigBee
Zwave
培训 (4次)
Tizen Platform (3)
Java Script
https://cnodejs.org/topic/551200e6d792542a29789a43 nodeje
Traditionally, the main focus of device manufacturers was to deliver a physical product with the respective functionality and to maintain this product throughout its life-cycle. But times have changed.
1. New Business Models: How hardware manufacturers manage the transition to a combined Hardware/Software approach
2. Establishing digital supply chains in addition to traditional physical supply chains
3. Protection of Embedded Software with a ring of Defence: Resistance, Obfuscation and Detection
4. Monetise your embedded software by using a standard solution (licensing and entitlement management)
5. Increase customer satisfaction and minimise support cost with remote diagnostics, configuration, updates and functionality management
Connectivity becomes more important and creates completely new use cases. Instead of physically tying functionality to hardware devices, software becomes the main differentiator. In order to be successful in this market, device manufacturers are changing their business models and focusing on embedded software as key to customer satisfaction and sustainability. To do so successfully, every device manufacturer needs to know exactly what their customers are entitled to and what they are really using. This includes the ability to communicate with customers and update functionality remotely.
Device Manufacturers also need to adapt quickly to different monetisation, licensing and pricing models as customer expectations mature. This Webinar gives an overview on changing business models, along with details and examples what is expected from Intelligent Device Manufacturers and where companies are especially successful in the IoT world.
http://www.infoq.com/cn/news/2011/09/nodejs-async-code
http://www.ibm.com/developerworks/linux/library/l-async/
http://open.163.com/movie/2010/12/2/E/M6UTT5U0I_M6V2T4T2E.html 麻省理工课程
The Identity of Things (IDoT) is an area of endeavor that involves assigning unique identifiers(UID) with associatedmetadata to devices and objects (things),enabling them to connect and communicate effectively with other entities over the Internet.
The metadata associated with the UID collectively defines the identity of an endpoint. Identityof things is an essential component of the Internet of Things (IoT), in which almostanything imaginable can be addressed and networked for exchange of data online. In thiscontext, athing can be anyentity -- including both physical and logical objects -- that has a unique identifier and theability to transfer data over a network.
Addressability makes itpossible for things to be targeted and found. To be addressable for the Internet of Things, anentity must be globally uniquely identifiable, which means that it must be associated withsomething -- typically an alphanumeric string -- that is notassociated with anything else.
To make communication among things effective and secure, however, it's crucial to make moreinformation about their identities available to other things. Following are some of the essentialconsiderations for identities of IoT things:
Lifecycle: Some IoT entities can have quite extensive life spans. An individual's electronicmedical record (EMR), for example,is a logical object that maintains its identity through the person's life. On the other hand someother entities have very brief lifecycles. A parcel, for example, only exists as an entity from thetime it is shipped until the time it is received.
Relationships: It's important to know how an IoT entity is related to other entities, includingnot only other things but also external entities such as owners, administrators and otherresponsible parties.
Context-awareness: Identity and access management (IAM) for IoTentities must have the capacity to be context-dependent. It may be appropriate, for example, for anentity to access another entity or system under certain circumstances and inappropriate -- or evendangerous -- for it to be granted access otherwise.
Authentication: Multifactorauthentication is effective to validate humans but less so for IoT things because many methods--biometricverification, for example -- are not relevant. It's necessary to find other means of securelyauthenticating IoTidentities.
http://zh-cn.ptc.com/about/manufacturing-transformation/internet-of-things
http://ptcvideo.icax.org/PTCvideo/video/
http://zh-cn.ptc.com/axeda
http://www.cnblogs.com/kkun/archive/2011/11/23/2260312.html 排序算法
需要链接的博文
http://blog.csdn.net/wallance82/article/details/43573931 SDT(software-defined Things)?软件定义的物件
http://blog.csdn.net/wallance82/article/details/45625895 实现SDT(software-defined Things)的IOT案例(3)
http://blog.csdn.net/wallance82/article/details/44133235 实现SDT(software-defined Things)的IOT案例(2)
http://blog.csdn.net/wallance82/article/details/43855411 实现SDT(software-defined Things)的一个IOT案例
http://blog.csdn.net/wallance82/article/details/45913475 Why I am less optimistic about SmartThings solution for IoT
http://blog.csdn.net/wallance82/article/details/45666475 Why SmartCar maybe easier implement than SmartHome
http://blog.csdn.net/wallance82/article/details/45439745 How should we prepare for IoT?
http://blog.csdn.net/wallance82/article/details/45245077 IoT drives cyber security to radical change
http://blog.csdn.net/wallance82/article/details/44959501 IoT is a vulnerable black-hole to attacks
http://blog.csdn.net/wallance82/article/details/43971831 基于Web服务的物联网-WoT(Web of Things)
http://blog.csdn.net/wallance82/article/details/44424717 发表一点本人对IoT的个人看法(英)
http://blog.csdn.net/wallance82/article/details/43731105 针对BMW 联网驾驶 漏洞的改进方案
Samsung SRCN MLT Strategy TF(中长期) 战略(Task Force)成员 (IoT方向)
http://www.csdn.net/article/2015-06-10/2824924
物联网技术上面临的基本问题和操作系统设计
http://www.oiotc.cc/ LiteOS
http://tech.163.com/15/0531/09/AQUCHMAR000915BD.html
详解没在谷歌I/O大会上展示的Brillo和Weave细节
AllSeen与OIC均在订立一个互通性的框架,遵循此框架可让应用程式、作业系统、通讯技术与协定、硬体装置等各层次互通,避免不相容的问题及重复开发的浪费等。OIC与AllSeen相同,也将采开放原码方式发展,但OIC有意推行认证测试,但细节尚未公布。
AllSeen与OIC确实定位相近,但Thread则与AllSeen、OIC没有冲突。
Thread技术方面,Thread是一种新的物联网无线网路,与Wi-Fi、Bluetooth等属相同层次,相对的,AllSeen与OIC追求广泛支援各种网路技术,不仅支援Wi-Fi、Bluetooth,也支援ZigBee、Z-Wave、ANT+等。
Thread技术与ZigBee技术最相近,然已有ZigBee为何还需要Thread?估在于ZigBee的支援面太广,ZigBee在网路层就分成ZigBee/ZigBee PRO、RF4CE、ZigBee IP等三大类,在三大类之上又有10种以上的应用型态(Application Profile),虽已有偏智慧家庭层面的应用型态,如ZHA(ZigBee Home Automation)、ZLL(ZigBee Light Link)、ZRC(ZigBee Remote Control),但也要兼顾产业用、零售用等发展,家用物联网恐难全心投入。
http://www.usatoday.com/story/driveon/2013/10/08/ford-driverless-car-parking/2941361/# 福特无人驾驶
http://www.ge.com/careers/opportunities?keyword=&country=China&state=ShangHai&func=TG_SEARCH_ALL&business=TG_SEARCH_ALL&business_segment=TG_SEARCH_ALL
Comparison of Divide and Conquer and Dynamic programming
Example:Fibonacci number and the shortest path
Divideand Conquer approaches in top down way, andDPin bottom up
DP shouldcomply with the following requirements ----Optimal substructure
Principle of optimality is that,when a solution to a certain problem is optimal, then the solutions of small problems constituting the solution should be also optimal.
http://nerds.airbnb.com/mysql-in-the-cloud-at-airbnb/
amazon 帐号 mczhou82@hotmail.com 99147130
261746154500 ZhouMingchun 99147130
http://aws.amazon.com/solutions/ AWS solution
http://aws.amazon.com/websites/getting-started/
http://docs.aws.amazon.com/gettingstarted/latest/wah-linux/web-app-hosting-intro.html
http://aws.amazon.com/websites/getting-started/start-your-project/
http://aws.amazon.com/solutions/case-studies/expedia/
http://aws.amazon.com/solutions/case-studies/kellogg-company/
http://aws.amazon.com/solutions/case-studies/mortar-data/
http://docs.aws.amazon.com/zh_cn/AmazonRDS/latest/UserGuide/UsingWithRDS.SSL.html
http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/MigrateS3ToCloudFront.html
http://docs.aws.amazon.com/zh_cn/AWSCloudFormation/latest/UserGuide/sample-templates-applications-us-west-2.html
http://docs.aws.amazon.com/zh_cn/AmazonVPC/latest/UserGuide/VPC_Scenario2.html
http://docs.aws.amazon.com/zh_cn/AmazonVPC/latest/UserGuide/VPC_Subnets.html#vpc-subnet-diagram
http://docs.aws.amazon.com/zh_cn/AmazonVPC/latest/UserGuide/VPC_Internet_Gateway.html
http://docs.amazonaws.cn/AmazonVPC/latest/GettingStartedGuide/Wizard.html
Cloud robotics is the use of remote computing resources to enable greater memory, computational power, collective learning and interconnectivity for robotics applications.
When computational or storage demands exceed the on-board capacity of a robot, they are offloaded to thecloud, where the massive resources of a datacenter can supplement their limited local resources. Cloud robotics also represent a significant advance for robot learning. Where it might take one robot 150 hours to learn a task using its own individual artificial intelligence (AI) resources, the collaborative effort of 150 robots learning different parts of a task might complete the task in an hour.
With a Wi-Fi connection to cloud-based resources, a robot can access a vast library of known objects to identify things in its environment. Object recognition helps a robot to better perform tasks like sorting, cleaning and using appliances. Relying on the cloud for resources also means that the robot itself can be simpler, eliminating costly compute power and the associated cooling and electrical power draw. Due to this offloading, cloud connected robots have lower battery requirements and are overall lighter and less expensive. Cloud robotics are typically used for tasks that don't require real-time execution, preserving local resources for applications with demanding time constraints.
The connection to the cloud eliminates the need for a robot to learn a task any other connected robot has: It can download the necessary information instead of having to feel out or observe how to do a task. This interconnectedness can help robots work together more smoothly too, coordinating their tasks automatically.
Google’s self-driving cars are one type of cloud-connected robot. The autonomous cars access data from Google Maps and images stored in the cloud to recognize their surroundings. They also gather information about road and traffic conditions and send that information back to the cloud.
Another example is Romo, an inexpensive ($150) cloud-connectable robot that moves on a treaded base housing a battery. AniPhone provides computational power and its camera, microphone and speakers. The cloud compute factor makes the robot better able to recognize its environment. Romos can be used to play games or can be used fortelepresence, which allows a human operator to be virtually present in a remote location.