Internet Of Things ‘IOT’

what exactly is the Internet of things!

2. How IoT works ? main concepts:

  • Hardware : From the engineering perspective, the Internet of Things is an embedded microprocessor controlled system connected directly or indirectly to the web. The smart devices use embedded systems to collect, send data to the cloud using a wifi module that they acquire from their environments. Basically, it means that you can turn your embedded device into an IoT device by simply giving it Internet access. in the Iot , everything that is being connected can be put into three categories:
  1. Things that collect information and then send it.
  2. Things that receive information and then act on it.
  3. Things that do both
  • Data analytics : Devices and objects with built in sensors are connected to an Internet of Things platform, which integrates data from the different devices and applies analytics to share the most valuable information and what can safely be ignored. This information can be used to detect patterns, make recommendations, and detect possible problems before they occur.
  • Securing the Internet of Things : Unfortunately, as the number of connected devices increases and more information is shared between devices, the potential that a hacker could steal confidential information also increases. Hackers aren’t the only threat to the internet of things; privacy is also center of interest for IoT users. For that reason security, data protection, and privacy have become the top concern amongst businesses and consumers. Several tech companies are focused on cyber security to ensure the privacy and safety of all it’s data. Salesforce has proven to be ready with flexible APIs that are enabled to receive information from whatever wherever, while providing security.
  • Some disadvantages of IoT :




Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Ebay sends critics live roaches and a bloody pig mask — EASTWEST Public Relations

{UPDATE} Poker Blind Timer Hack Free Resources Generator

{UPDATE} Perfect Earth: Avonturen Hack Free Resources Generator

Better safe than sorry

Authentication Patterns and Best Practices For SPAs

Authentication Patterns and Best Practices for Single-Page Apps

{UPDATE} Hidden Folks Hack Free Resources Generator

{UPDATE} Rigtig By Car Traffic Racing-sportsvogn Challenge Hack Free Resources Generator

Cyber Warfare and The future of Cyber Security

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Eya Nani

Eya Nani

More from Medium

Is Canada Immigration Services trustable?

Post 4: Am I doing film school right?

Monthly essay: Phase 1 “Reset”

Comparison of GPU’s