有个足球雷竞技app网络世界史蒂芬最大帕特森 //m.amiribrahem.com EN-US 孙,2020年6月28日15点22分18秒-0700 孙,2020年6月28日15点22分18秒-0700 https://idge.staticworld.net/nww/networkworld510x510.png 有个足球雷竞技app m.amiribrahem.com 510 510 https://idge.staticworld.net/nww/networkworld798x288.png 有个足球雷竞技app m.amiribrahem.com 796 288 如何SAP正在转向工业物联网 星期三,2017年11月8日六点18分00秒-0800 史蒂芬最大帕特森 史蒂芬最大帕特森 <文章> <节类=“页”>

事物的工业因特网(IOT)的数十亿连接的智能系统分心从其真正作用传感器的视图:数字化改造。在庞大的任务,使所有这些连接,可靠,安全的投资,是没有意义的,除非有一个稳固的业务理由 - 有两个非常好的

2倍的原因厂家投资于物联网

第一个原因大公司投资于物联网是他们担心由特斯拉,尤伯杯,或在所属行业中的未来的Airbnb进行数字破坏 - 破坏或者被破坏

第二个原因:一。company’s slowing growth and the need for increased productivity. BCG’s Olivier Scalabre explained that driver during a 2016 TED Talk.

To read this article in full, please click here

//m.amiribrahem.com/article/3236555/how-sap-is-making-the-shift-to-industrial-iot.html 思科如何推动其产业物联网业务发展 周三,2017年11月1日9点27分〇〇秒-0700 史蒂芬最大帕特森 史蒂芬最大帕特森

Industrial Internet of Things (IoT) does not have the explosive growth of the consumer internet. It’s a nitty-gritty, complicated, and sometimes downright boring business. It is too complex and diverse for explosive growth like the narrowly defined, one-size-fits-all iPhone. That said, the promise of rich returns on investment from new business models that are possible with IoT is very compelling.

The only way to cut through the venture-driven IoT hype cycle is with conversations with builders and implementers at companies investing in IoT, such as Cisco’s co-innovation center chief, Maciej Kranz.

To read this article in full, please click here

//m.amiribrahem.com/article/3235659/how-cisco-drives-its-industrial-iot-business-forward.html
反驳Daring Fireball的:FreeBSD中,英特尔和微软并没有保存在Mac 周四,二零一七年十月十九日十三点31分00秒-0700 史蒂芬最大帕特森 史蒂芬最大帕特森 <本文> <节课= “页面”>

我的博客文章的要点, “的What the IoT industry can learn from Apple’s revival of the Mac," was to use Apple’s pivot to the Intel platform and compliance with the Open Group’s Unix standards as an example of the importance of a large vibrant ecosystem (created by Intel and Microsoft) is for the IoT industry to follow.

Without the PC ecosystem, the Mac would be an obsolete machine exhibited in the Computer History Museum. The PC ecosystem eliminated much redundant development, letting component and product companies focus on their products’ differentiation. The IoT industry would benefit if it had a robust ecosystem the eliminated redundant development. 

To read this article in full, please click here

//m.amiribrahem.com/article/3234506/rebuttal-to-daring-fireball-freebsd-intel-and-microsoft-did-save-the-mac.html
如何健全的互联网消除了数十亿物联网传感器 2017年10月19日星期四09:57:00 -0700 史蒂芬最大帕特森 史蒂芬最大帕特森 <本文> <节课=“页面”>

事情的肮脏的小秘密的互联网部署的成本。例如,添加一种低成本运动传感器和无线电到一个交通灯来计数通过的车辆离开前的工厂是容易且廉价。部署的增量成本几乎为零,特别是低功耗的广域网(LPWAN)覆盖或其他低成本的通信覆盖是可用的。但改造传感器和无线电红绿灯将耗资市政府公共工程卡车辊,工作人员,电工和交警细节。改造是昂贵的 <一边类= “fakesidebar”> 同时在网络世界:物联网标准之争可能会导致混乱

在改造世界物联网是一个数据科学和传感器的工程任务,研究物联网问题,并找出获取数据的最简单方法。对数据科学家的问题是什么最小数据分辨率将提供所需的结果:多少个传感器每单位面积的多少读数每个时间间隔是解决问题的必要吗?工程师必须权衡传感器成本,无线电的成本和网络的可用性,并且功耗与可用电源。 阅读这篇文章完全,请点击这里 //m.amiribrahem.com/article/3234331/how-the-internet-of-sound-eliminates-billions-of-iot-sensors.html 如何构建低成本的物联网传感器网络 2017年10月16日星期一07:11:00 -0700 史蒂芬最大帕特森 史蒂芬最大帕特森 <文章> <节类=“网页”>

传感器融合公共空间利用率监测在智能城市(PDF)简直就是物联网产品的设计者,开发者和实施者最好看的。它步骤通过在一个城市设计一个系统,以测量空间利用率 - 在传感器选择和校准,电源选择,网络设计,数据所作的折衷清洁和归一化,和数据处理。该方法可以概括为设计的任何物联网网络。纸张比约如何构建网络的IoT一个完美的案例研究也不少。 <一边类=“fakesidebar”> 相关:8个提示用于构建具有成本效益的IoT传感器网络

这是比利·碧云沥刘Nipun Wijerathne和技术的新加坡大学洲源设计和科廷大学的本尼启Kiat的伍纸的最有趣的方面是他们如何匹配传感器在合适的分辨率估计空间利用率获取数据,并且建立了一个试验台,减少了广泛的实现问题。为了测量空间利用率,意味着如何填充的空间是在多个时间间隔,他们选择的声音和运动传感器和两个的融合。本文所采用的方法可以适用于其它类型的传感器。 阅读这篇文章完全,请点击这里 //m.amiribrahem.com/article/3233309/how-to-build-low-cost-iot-sensor-networks.html 什么是物联网产业可以从Mac苹果的复兴学习 周四,2017年10月12日7点51分零零秒-0700 史蒂芬最大帕特森 史蒂芬最大帕特森

Update: In response to a post on Daring Fireball saying I had incorrectly stated things about the Mac, I have written a reply — Rebuttal to Daring Fireball: FreeBSD, Intel and Microsoft did save the Mac — which includes a correction and clarifications.

---------------------------------- 

This post is an excerpt from a talk I gave at the Reality Virtually Hackathon that makes a similar comparison between virtual reality and augmented reality and the Mac. It holds true for the Internet of Things (IoT) and every emerging technology.

To read this article in full, please click here

//m.amiribrahem.com/article/3232984/what-the-iot-industry-can-learn-from-apples-revival-of-the-mac.html
机器学习能拯救企业服务器业务吗? 2017年10月2日星期一13:02:00 -0700 史蒂芬最大帕特森 史蒂芬最大帕特森 <本文> <节课= “页面”>

Nvidia和服务器制造商戴尔EMC,HPE,IBM和超微宣布企业服务器采用的Nvidia’s Tesla V100 GPU. The question is, can servers designed for machine learning stem the erosion of enterprise server purchases as companies shift to PaaS, IaaS, and cloud services? The recent introduction of hardened industrial servers for IoT may indicate that server makers are looking for growth in vertical markets.

There are very compelling reasons for moving enterprise workloads to Amazon, Google, IBM and other hosted infrastructures. The scalability of on-demand resources, operating efficiency at cloud-scale and security are just three of many reasons. For instance, Google has 90 engineers working on just security where most enterprises are understaffed.

To read this article in full, please click here

//m.amiribrahem.com/article/3229860/will-machine-learning-save-the-enterprise-server-business.html
pub / sub模型可以连接物联网设备,而运营商网络 星期一,2017年9月25日8点39分00秒-0700 史蒂芬最大帕特森 史蒂芬最大帕特森

Three characteristics of the Internet of Things (IoT) differentiate it from industrial automation.

  1. IoT devices are inexpensive.
  2. IoT devices can be ubiquitously connected everyplace and anyplace.
  3. IoT devices have inexpensive or zero-cost deployment.

It explains why we see so few IoT networks and why most of the industrial IoT forecasts are measurements of industrial automation that we have had for decades.

The first one, with the exception of the issue of strong security, is easy. The second two, though, in New Jersey parlance — says easy does hard.

Ubiquitous connectivity is talked about, and there is a glimmer of hope presented by Low-Power Wide-Area Networks (LPWAN) such as Senet that focus on both low-cost technology and a business model for entrepreneurial partners to deploy networks. But waiting for carriers to perfect and deploy 5G networks to build IoT solutions will delay innovators and prevent early adopters from building proof-of-concept and prototype networks essential for the iterative learning of technical methods, business cases and making financial projections of the benefits of IoT.

To read this article in full, please click here

//m.amiribrahem.com/article/3228164/pubsub-model-could-connect-iot-devices-without-carrier-networks.html
微软如何自我飙升滑翔机提高了物联网,数字助理 星期四,2017年9月14日9点52分零零秒-0700 史蒂芬最大帕特森 史蒂芬最大帕特森 <本文> <节课=“页面”>

一个机器学习项目,以建立一个自主滑翔机剩下的高高的热电流是令人印象深刻的就够了。但是,微软的研究人员安德烈Kolobov和伊恩Guilliard开展的工作也将提高物联网设备,个人助理和自主汽车的决策和可信度。

限制重量和空间的计算资源的局限造成由滑翔机的机身增加了相关性普适计算的许多新的发展。自主滑翔机是由160MHz的的ARM Cortex M4的RAM 256KB和闪存上监视传感器,运行自动驾驶仪和控制伺服电机,以使研究人员增加了机器学习模型,不断学习如何使用电池运行的60KB控制自主地骑热电流。 阅读这篇文章完全,请点击这里 //m.amiribrahem.com/article/3225304/how-microsofts-self-soaring-sailplane-improves-iot-digital-assistants.html 5个原因,设备制造商不能保证物联网平台 星期一,2017年9月11日11:11:00 -0700 史蒂芬最大帕特森 史蒂芬最大帕特森

If Akamai, Cisco and Google’s post-platform security and privacy machine learning security systems protecting the web and mobile platforms are indicative of the future, IoT device makers will only be part of a larger security ecosystem. That’s because they will not have the data to train the AI machine learning models.  

As a result, IoT post-platform security and privacy will become a layer on top of IoT device security. These five factors are why that will happen.

1. Product developers underestimated IoT security

In their race to market, product developers building for new platforms will underestimate the security and privacy features that should be built into their products. In some cases, this will be an act of commission, but most will be an act of omission because it is difficult to anticipate the vulnerabilities until the products reach the market at scale. Windows and mobile devices experienced something similar. They have been hardened, but earlier in their evolution they were an easy target for cyber criminals.

To read this article in full, please click here

//m.amiribrahem.com/article/3223952/5-reasons-why-device-makers-cannot-secure-the-iot-platform.html
物联网隐私:30点的方式来建立一个安全文化 星期四,2017年8月31日6时50分00秒-0700 史蒂芬最大帕特森 史蒂芬最大帕特森 <本文> <节课=“页面”>

但是仍有许多工作物联网工业和市政联网(IoT)之前完成成为广泛采用创新的圈外。一个场,隐私,通过在云中,PC和移动的上下文中,公共和私人部门很好理解,在适应的的IoT的早期阶段

数据的绝对数量,这将是collected and the new more granular architecture of the IoT present new privacy concerns that need to be resolved on an equal scale as the platform’s forecasted growth.

A demonstration of this new aspect of privacy and compliance is the Privacy Guidelines for Internet of Things: Cheat Sheet, Technical Report (pdf) by Charith Perera, researcher at the Newcastle University in the U.K. The nine-page report details 30 points about implementing strong privacy protections. This report is summarized below.

To read this article in full, please click here

//m.amiribrahem.com/article/3221474/30-ways-to-improve-iot-privacy.html
使用物联网,以保持山。华盛顿远足安全,预测天气 星期三,2017年8月30日12:34:00 -0700 史蒂芬最大帕特森 史蒂芬最大帕特森

Weather on Mount Washington in New Hampshire can be biblical. On one occasion, I started an early-morning April ascent with fresh snow at the base. Mid-day we stripped to our base layer of clothing when the bright sun warmed the temperature to 60°F. At the peak elevation of 6,288 feet, dark clouds closed in, the temperature dropped and the wind picked up. We ran for cover from lightning that had a very short distance to travel between the low clouds and the high peak to travel.

After hiking the mountain a half-dozen times, in all seasons and all conditions, it’s interesting to learn how the Mount Washington Weather Observatory on the peak uses IoT to update weather conditions on this frequent hiker destination.

To read this article in full, please click here

//m.amiribrahem.com/article/3221246/using-iot-to-keep-mt-washington-hikers-safe-predict-weather.html
Mirai恶意软件疫苗可以保护不安全的物联网设备 星期五,2017年8月25日九点33分00秒-0700 史蒂芬最大帕特森 史蒂芬最大帕特森 <本文> <节课=“页面”>

物联网(IOT)设备淳朴和固定互联网不良的危险来到前与去年的未来DDoS攻击,涉及近百万机器人。许多这些设备仍然是一个威胁

研究人员提出了一个原始的解决问题的办法:使用这些设备的漏洞注入白色蠕虫,确保了设备。It is an epidemiological approach that creates immunity with a vaccine by exposing the immune system to a weakened form of the disease.

+ Also on Network World: How to improve IoT security +

These devices are still a threat because some cannot be fixed because they have hard-coded back doors. Other insecure devices have software or firmware vulnerabilities that cannot be fixed because product designers did not include a software updates mechanism.

To read this article in full, please click here

//m.amiribrahem.com/article/3219851/this-mirai-malware-vaccine-could-protect-insecure-iot-devices.html
这本Linux工具可以提高物联网设备的安全 星期四,2017年8月24日7时33分零零秒-0700 史蒂芬最大帕特森 史蒂芬最大帕特森

The first rule of building a secure and feature-rich ecosystem is software management — push and pull software updates and software discovery through an app store mechanism from a trusted source.

In the go-to-market IoT race, though, that often doesn’t happen. Many Internet of Things (IoT) product developers have ignored the traumatic early history of Microsoft Windows, Android and web platforms, and expoits of IoT devices — because software updates have not been designed in — are regularly reported.

+ Also on Network World: How to improve IoT security +

Those earlier platforms have been hardened, updates have been automated, and the app discovery and installation have been made trustworthy. IoT developers need to follow their lead. 

To read this article in full, please click here

//m.amiribrahem.com/article/3219725/this-linux-tool-could-improve-the-security-of-iot-devices.html
如何提高物联网安全 星期一,2017年8月21日04:00:00 -0700 史蒂芬最大帕特森 史蒂芬最大帕特森 <本文> <节课=“页面”>

在海啸大小的趋势与传感器和执行器和连接设备,设备和家电互联网的姿势安全和隐私风险加智力。

证据来自名为破解的物联网研究人员在丹麦,丹麦技术大学(PDF);厄勒布鲁大学,瑞典;和Innopolis大学,俄罗斯工业和学术研究报告,在医疗和智能家居使用,并认定智能设备联合会编译建筑物造成令人生畏的风险。

作者量化物联网的风险(IOT)设备: 阅读这篇文章完全,请点击这里 //m.amiribrahem.com/article/3217664/how-to-improve-iot-security.html