Data Science
41.7K subscribers
1.67K photos
3 videos
47 files
2.06K links
DS
По всем вопросам- @haarrp

@ai_machinelearning_big_data - machine learning

@pythonl - Python

@itchannels_telegram - 🔥 best it channels

@ArtificialIntelligencedl - AI

@pythonlbooks-📚

@programming_books_it -📚

Реестр РКН: https://clck.ru/3Fk3zS
Download Telegram
First steps to built your own factory within IoT technology
https://www.youtube.com/watch?v=coSKAvh49Fk
What it MQTT and «how to»
https://en.wikipedia.org/wiki/MQTT
If you want to know MQTT more deeply, there is a book PDF from IBM
https://www.redbooks.ibm.com/redbooks/pdfs/sg248054.pdf
Channel name was changed to «IoT (Internet of Things)»
Data Science pinned Deleted message
Data Science pinned Deleted message
IoTers it's a invite to our group
​​IoT adoption perceived as risky, as failures plague 64% of users worldwide

A new study from Dynatrace suggests that IoT adoption could be severely impacted by concerns over the consequences of IoT device failures.

New research suggests that the IoT market risks being undermined by device failures. According to Dynatrace, if device manufacturers, service providers, and platform creators don’t take steps to minimise the risk of IoT, they will harm their business.

Around 52% of consumers worldwide are now using IoT devices, yet 64% of those have already encountered performance issues – according to an independent global survey of 10,000 consumers.

On average, consumers experience 1.5 digital performance problems every day while 62% of people fear the number of issues they encounter, and the frequency will increase due to the rise of IoT.

For CTOs and IT leaders with products or services on the market that utilise IoT, this research is worth noting.

According to Dave Anderson, CMO of Dynatrace: “The delivery chain behind every connected device is extremely complex. Businesses are already struggling with cloud complexity, but IoT magnifies this a thousand times with sensors, masses of new data and dynamic containerised workloads.”

“Consumers are already reporting problems with everything from medical applications, smart meters, car door locks and virtual personal assistants, to smart thermostats and fridges. Their patience is at an all-time low, and they simply won’t tolerate a poor experience. Yet, we haven’t even seen the era of IoT take off to its full potential – it’s just getting started. The imperative is on companies to find ways to process, analyse and manage the IoT delivery chain holistically, and with deep insight, so they know exactly what’s happening and where issues are arising in real time. This is not an easy task.”

Key Findings

According to the report, 85% of respondents said they are concerned that self-driving cars will malfunction – leading to high-speed collisions.

When it comes to healthcare, 62% of consumers stated they would not trust IoT devices to administer medication; this sentiment is strongest in the 55+ age range, with 74% expressing distrust.

“The reality is IoT glitches could be fatal. Consumers are understandably concerned, and that’s why it will be important for the industry to demonstrate it’s taking a new, more robust approach to ensure software doesn’t compromise our safety,” added Anderson.

As well as the automotive and healthcare industry, the home is also set to be transformed by the IoT. However, the research revealed 83% of consumers are concerned about losing control of their smart home due to digital performance problems.

Managing IoT

According to Anderson: “The old ways of managing IT and software simply don’t work against this extremely convoluted IT environment. IoT creates many blind spots and an additional layer of complexity.”

A separate report from Veeam shows that downtime costs enterprise-sized organisations an average of $16 million annually.

According to Anderson: “The old ways of managing IT and software simply don’t work against this extremely convoluted IT environment. IoT creates many blind spots and an additional layer of complexity. That’s why the early, successful IoT adopters take the view that AI is the answer; to make sense of the complexity, map the IT environment end-to-end, pick up problems immediately and with precision, and offer up answers for fast resolution. That’s the only way to master the IoT era, which is already upon us. Consumers want perfect IoT experiences. Become masters of this new IT universe, or you’ll miss out on the opportunity IoT presents.”
Forwarded from Deleted Account
Can any one know how to use GSM module and arduino together to transfer data like Bluetooth module? Is it possible? If yes please send any reference document.
Question in our chat😉
Data Science pinned Deleted message
​​Five IoT Predictions For 2019
(Part 1)


I don’t need to tell you that the IoT is growing at an exponential rate. Vehicles, wearable gadgets, RFID sensors and software are advancing past basic function and the network is growing to include even more advancements each day. I have more connected gadgets in my home this year than I did last and I'm sure I'm not alone. I'd also bet that these advancements will be even more commonplace in our homes, businesses and on the road in 2019. Let’s take a look at five IoT predictions for the coming year and how we can anticipate their impact.

IoT Prediction 1: Overall Growth Across the Board

When you look up IoT market and connectivity statistics you get a range of numbers all mostly in the billions. According to IT Pro, this year alone, around 3.6 billion devices that are connected to the Internet are used for daily tasks. Meaning total number of connected devices is bigger than that.

This means more data and more traffic on an already congested connected internet. In 2019, there will likely be a bigger push for 5G connectivity —adding a lane the congested web highway to handle the increase in devices. I also believe there will be a bigger push for edge computing. Data from IoT devices will be stored closer to the source—stealing business from data centers. To combat this, data centers and edge computing will need to work in harmony. More connected devices means change. Are you ready?

IoT Prediction 2: Deeper Penetration in the Manufacturing and Healthcare Industries

The IoT is a key driver of digital transformation in several industries, specifically manufacturing. Sensors, RFID tags, and smart beacons have already started the next industrial revolution. Market analysts predict the number of connected devices in the manufacturing industry will double between 2017 and 2020.

These devices are a total game changer for the industry disrupting every part of the production process from development to supply chain management. Manufacturers will be able to prevent delays, improve production performance, reduce equipment downtime and manage inventory. But it is not the only industry that will see a deeper penetration.
It’s been said by 2019 that 87% of healthcare organizations will have adopted IoT technology. The possibilities are endless for healthcare organizations and the IoT—smart pills, smart home care, personal healthcare management, electronic health records, managing sensitive data, and an overall higher degree of patient care.
​​Five IoT Predictions For 2019(Part2)

IoT Prediction 3: Increased Security at End Points

I’ll keep it simple: IoT devices leave you vulnerable to hacks and security issues. Think about it, how many IoT devices do you have? Do you know how they’re all secured? By 2019, I think we will increased security at all endpoints.

Hardware manufacturers like Cisco, HPE, Dell and more are building specific infrastructure for the edge deigned to be more physically rugged and secure, and security vendors will start to offer endpoint security solutions to their existing services to prevent data loss, give insights into network health and threat protection, include privileged user control and application whitelisting and control.

IoT Prediction 4: Smart Common Areas in Cities Around the World

Smart cities have been in a bit of a holding pattern recently. Sure we’ve mastered smart buildings and smart homes, but fully smart cities haven’t been come to fruition just yet. I think in 2019 we will start to see smart areas or neighborhoods within cities.

Sidewalk Labs, an Alphabet endeavor, is building a smart neighborhood in Toronto from the ground up. Smart sensors around the neighborhood will record everything from walking routes, shared car use, building occupancy, sewage flow, and temperature choice 24/7 with the goal of creating a place that’s comfortable, convenient, safe, and clean for those who live there. Once the model is perfected, it could be the model for other smart neighborhoods and eventually smart cities.

IoT Prediction 5: Increased Market Penetration of Connected Smart Cars

Even as a tech industry analyst, when I recently went car shopping, I was blown away by all of the IoT upgrades and how this has found its way into vehicles at every price point. While self-driving cars might be a normal occurrence in the next few years, I think that there are more possibilities with IoT inside the car for 2019.

Now tons of vehicles have a connected app that shows up to date diagnostic information about the car. This is done with IoT technology, which is the heart oft he connected vehicle. The ability to check tire pressure, oil level, fuel consumption and so many other things about a car and get the info sent to the palm of your hand. Also how it alerts the vehicle owner (or whomever you choose) when something is wrong with the engine. I can’t believe we ever lived without something like this.

Diagnostic information is not the only IoT advancement that we will see in the next year or so. Connected apps, voice search, and current traffic information are a few other things that will change the way we drive. Is it time to buy a new car? I think so. At the very least it is safe to say that IoT is changing the way we experience our automobiles.

These are only a few IoT predictions for 2019 and the years to come. There will likely be more advancements that we have only dreamt about until now. I personally can’t wait to see how the IoT continues to shake things up in industries everywhere.
Hi, guys! Who want a FREE Casual SmartWatch? Only Today! Pay only for shipping! https://bit.ly/2PzbPfE
How Cryptojacking Can Corrupt the Internet of Things

Cyber criminals shut down parts of the Web in October 2016 by attacking the computers that serve as the internet’s switchboard. Their weapon of choice? Poorly secured Web cameras and other internet-connected gadgets that have collectively come to be known as the Internet of Things (IoT). The attack created a minor panic among people trying to visit Sony PlayStation Network, Twitter, GitHub and Spotify’s Web sites, but it had little long-term effect on internet use or the hijacked devices. Less than two years later, however, security experts are sounding the alarm over a new and possibly more nefarious type of IoT attack that “cryptojacks” smart devices, surreptitiously stealing their computing power to help cyber criminals make digital money.

Cryptocurrencies—so called because they use cryptography to secure transactions and mint new virtual coins—are generated when computers loaded with “cryptomining” software perform complex mathematical calculations. The calculations themselves serve no practical purpose, but the faster the computers complete them the more electronic money they make. Cryptojacking (a mashup of the words “cryptocurrency” and “hijacking”) occurs anytime someone uses another person’s internet-connected device without permission to “mine” Ethereum, Monero or some other virtual cash. (Bitcoins are a lot more valuable, but this well-known cryptocurrency is more likely to be created using warehouses of servers rather than someone’s stolen processing power).

Cyber criminals steal that power by sneaking malicious software containing cryptomining code onto PCs, smartphones and other internet-connected devices that, once infected, divert some of their processors’ capacity into solving the aforementioned calculations. Another type of cryptojacking attack occurs when internet users are tricked into visiting Web sites containing code that grabs part of their device’s processing power for as long as they visit the site. To entice people to stay, those sites tend to offer free pornography or pirated content. Victims usually have no idea their device has been coopted—although they might wonder why their batteries drain so quickly.

“When mining for gold, the person who works hardest with their pickaxe makes the most money,” says Richard Enbody, an associate computer science and engineering professor at Michigan State University. “In cryptomining, the pickaxe is an algorithm. The more complex the calculations it performs, the more processing power and energy it uses and the more money it earns.”

The latest trend is for criminals to infect appliances and other internet-connected devices with unwanted cryptomining software, Sherri Davidoff, CEO of cyber security firm LMG Security, said during a recent IoT cryptojacking webinar. “Many of these devices are unmonitored and highly vulnerable to simple attacks that exploit weak passwords and unpatched vulnerabilities,” Davidoff said. Nearly every case LMG is currently investigating has turned up cryptomining software, in addition to whatever other malware criminals installed on their victims’ computers, she added.

To test IoT devices’ susceptibility to having their processors hijacked to make cryptocurrency, Davidoff and her colleagues hacked into a Web camera in their lab and installed cryptomining software. After a day of calculating the camera managed to produce about three-quarters of a penny’s worth of Monero. Not exactly the motherlode, but those almost-pennies add up over time—especially if an attacker takes over thousands of Web cameras and leaves the software in place for a while, Davidoff said. Security cameras are a prime target because they connect to mostly unsecured public networks and are fairly generic—the same malware can be used to infect many different brands. In some cases these devices do not allow users to change their default security passwords.
​​“For financially-motivated cybercriminals, cryptojacking a large number of inadequately protected IoT devices could be highly lucrative,” says Pranshu Bajpai, a PhD candidate in Michigan State University’s Department of Computer Science and Engineering. “It can be argued that gaining an initial foothold into IoT devices is relatively easier than a computer or a phone, which normally have better protections.” Given that many IoT devices lack updated antivirus software or an intrusion detection system, the malware is more likely to remain undetected longer.

In addition to degrading battery life, cryptojacking can strain or possibly burn out a device’s processor. In an extreme case LMG investigated, one of the client’s employees requested an extremely powerful computer—ostensibly for work—only to inform the client within a couple of months that the computer had caught fire. A few weeks later the client discovered that the employee had been using his new work computer for cryptomining. Most cryptominers and hackers avoid overtaxing their machines, or the machines they hijack, for fear of killing a (digital) cash cow. Still, even if cryptojacking does not destroy a device it will slow it down considerably.

Not all remote cryptomining is done on the sly or for malicious purposes. In February lifestyle magazine Salon employed the practice to help make up for the advertising revenue they lose when readers use ad-blocking software. Salon began asking online readers to help support the publication financially, either by shutting off ad blockers or allowing Salon to borrow users’ devices for Monero mining while they read. UNICEF Australia encourages people to donate their computers’ processing power to the charity for digital fundraising. Cryptojacking, however, is increasingly being recognized as a crime. A Japanese court earlier this month sentenced a man to a year in prison for illegally cryptomining $45 in Monero on victims’ computers.

People can protect their devices primarily by keeping their operating systems and software up to date, Bajpai says. They can also install programs called “extensions,” which block mining software, in their Web browsers. Consumers typically must rely on the companies that make internet routers, Web cameras and other connected devices to keep that technology secure and up to date. If those companies do not ship their products with secure software and update it frequently to fight malware, the IoT could be in for a bumpy ride—and it is expected to grow from about 23 billion devices this year to more than 75 billion by 2025.
​​The Industrial Internet of Things to Transform Supply Chains by 2023

The Industrial Internet of Things (IIoT) is set to make a sizeable contribution to the global economy by 2023. This is according to a new study released by Inmarsat, the world mobile satellite communications company based in London.

According to researchers, supply chain managers expect IIoT to be increasing their annual revenues by 10 per cent within 5 years.

The report – “IIoT on Land and at Sea” – was compiled by the market research firm, Vanson Bourne, which surveyed 750 businesses with a combined turnover of $1.16 trillion annually. Respondents were drawn from a wide range of industries, including the agriculture, energy, maritime, mining and transport sectors.

Access to reliable and resilient connectivity, particularly in remote regions or at sea, where terrestrial networks are not available but satellite communications are available, will be essential to the success of many IIoT deployments.

“IIoT is emerging as a major force in the modern enterprise and it’s clear that businesses are prioritizing satellite technology to transform their operations and achieve competitive advantage,” said Paul Gudonis, President, Inmarsat Enterprise.

He added that Data generated by IIoT infrastructure is expected particularly to bring greater transparency to the global supply chain, allowing businesses to automate processes, reduce operational waste and speed up rate of production, leading to higher revenues and lower costs.”

“However, many businesses are struggling with security, skills and connectivity challenges in large scale IIoT deployments,” Gudonis cautioned.

Director of Transport at Inmarsat Enterprise, told SCMR in an interview that some supply chains might also become vulnerable if proper procedures are not introduced.

“With hackers, activists and hostile state actors ever more intent on disrupting elements of the global supply chain, such as energy supplies or transport networks, IIoT devices and sensors may present a backdoor for destructive cyber-attacks on crucial operations,” he said. “As the global supply chain becomes ever-more connected, this could lead to subsequent elements of the supply chain being at risk of further cyber-attack with potentially damaging consequences.”

But Holdsworth stressed that it is here that satellite connectivity can play a critical role.

Mike Holdsworth, “By offering highly secure networks and integration with communications technology such LoRaWAN, it can ensure secure end-to-end data transmission,” he said. “In addition, to mitigate the risk of a loss of connectivity, satellite connectivity can offer logistics businesses a global communications network, guaranteeing constant secure and reliable data transmission wherever their IIoT infrastructure is located.”
Can Blockchain Strengthen IoT Device Security?

In spite of the potential of the Internet of Things (IoT), development seems to be dragging. The hype is huge, but the current state of IoT (to the consumer) does not seem to extend far beyond toying with lights, cameras, or household appliances from smartphone apps. In a world where the term Big Data carries so much weight, one would expect more from what is a goldmine of information.

A large part of the problem stems from security. The consequences of a breach of a central repository of data collected by IoT devices could be disastrous. Compromising such a database could give a hacker incredibly in-depth information about an individual, gleaned from the various sensors set up around their home, or on a grander scale, sensitive data pertaining to stock levels and shipping schedules of a wholesaler or agglomerations of confidential medical records from hospitals.

Research revealed that 90% of consumers believe that such connected devices are going to be a major security issue, a statistic which may be deterring the adoption of IoT by companies and individuals alike. It’s perhaps wise, then, to consider, in these early stages, how to prevent shaping a future that will lead to such single points of failure (as time goes on and the networks are deployed, it will become exponentially harder to tweak the underlying architecture). The answer seems apparent: avoid building such vulnerable platforms altogether.

Changing the Architecture of IoT

The very raison d’être of blockchain technology is to disrupt such structures. Distributed ledgers expunge the notion of centralisation, instead spreading multiple copies of a database across nodes in a network.

From a security standpoint, this dwarfs incumbent platforms: should one wish to attack the network, it is no longer a case of gaining access to a server. Successfully ‘hacking’ a blockchain requires a Sybil attack, whereby the malicious actor owns 51% of nodes and can falsify transactions or data – anything less will simply mismatch with the majority’s records, and get rejected. For properly engineered Proof-of-Work or Proof-of-Stake blockchains, the feasibility of such an attack is logistically impossible. From a logistical perspective, this p2p (or most likely machine-to-machine) approach for sharing data between devices further reduces attack vectors like man-in-the-middle attacks, since the information being transferred does not pass through a central hub.

This distributed method of managing the flow of data is also vital to the long-term scalability of IoT networks: as IoT devices proliferate in homes and in businesses, we’re going to see a strain on the network, leading to congestion as more and more are connected and routed through a centralised server.

Syncing With the Blockchain

The caveat we’ve seen thus far in the use of blockchains in IoT has been the requirement for nodes to store full copies of the ledger. Take the Bitcoin blockchain, for instance: to run a full node, the user needs to download a 200+ GB database of previous transactions. If smart devices are to interface seriously with a blockchain, there need to be efficient methods of doing so that don’t involve dedicating memory and bandwidth to syncing incoming blocks.

Bitcoin’s UTXO model allows for the creation of SPV (or Simple Payment Verification) wallets – instead of storing copies of the blockchain, they can make calls to full nodes that do, and obtain the information pertaining only to the wallet in question. These so-called light walletscan be run on lower-spec devices, and do not require nearly as many resources to operate.

For IoT use-cases, wherein one would want devices to not only verify transactions but to execute smart contracts, a light wallet would be highly desirable. They can allow even relatively simplistic sensors to sync with the blockchain, and then provide improved security through decentralised storage as outlined above.

Making Blockchain-Supported IoT a Reality

It would be unrealistic to say we’re there already, though.
​​Blockchain technology remains to be perfected, and has yet to solve certain issues that would prevent it from handling a fully-functional IoT infrastructure:

Blockchain is still an incredibly nascent field, and its energy consumption needs to be tackled before we can see real adoption (Proof-of-Stake is currently being explored, which may remedy this)There’s a further question with regards to privacy of the data being shared: by definition, a blockchain is a public database. Second-layer solutions for the storage and transmission of information (that don’t compromise its privacy) are needed to cater to use cases where this must be kept confidentialAnother major issue facing blockchain tech is scalability: for IoT purposes, it is crucial that transactions are as close to instant as possible – if you’re dealing with a high-throughput of data, it needs to constantly stream. Consider the importance of, for instance, monitoring vital signs of a hospitalised patientThere is yet to be a blockchain iteration that can handle a large amount of transactions per second – one need only look to Ethereum’s gridlock in the wake of CryptoKitties’ release to see this. That said, a number of solutions are being worked on around the globe to combat this issue (Sharding/Plasma on Ethereum or the Lightning Network on Bitcoin are just a few examples)

But, as the technology matures, the future looks bright for IoT and blockchain technologies, which could clearly be highly complementary. In one corner is an increasing amount of sophisticated devices that can collect and relay information to a server, and in the other is a secure network eliminating traditional attack vectors associated with centralised databases. The merging of the two domains, once the kinks are ironed out, promises to revolutionise an innumerable amount of industries.