Page 30 - Cyber Warnings
P. 30
The challenges of an Internet of Things analytics
By Milica D. Djekic
Through a history – we would notice the importance of good analytics in many areas of human
activities. For instance, many military strategists would deal with the intelligence before they
decide to make any move on. Today’s economy is also a place looking for the brilliant business
strategists who would use an analytics in order to produce some sort of findings that would offer
them a competitive advantage.
This new time would bring us many technological solutions that would deal with so many data.
The good example of such a new technology is the Internet of Things (IoT) that would offer us a
plenty of opportunities being in a correlation with our everyday’s lives and businesses. Through
this article – we intend to discuss some of the challenges coping with the IoT concept as well as
its analytics being a key pillar in understanding such collected data.
What is the IoT analytics?
Have you ever wondered how many data could produce some IoT device? For instance, we
would talk about the smart heating system being the part of much larger smart home solution or
further – smart grid advancement. That smart heating solution would rely on temperature
subsystem and humidity subsystem. These two subsystems would use the temperature and
humidity sensors that would deal with the temperature and humidity in such an environment and
send such an information to the control system that would adjust those two parameters to get as
desired. In other words, we
would talk about the control
systems dealing with the
feedback as illustrated in a
Figure being down on the right.
Many experts would suggest
that it’s crucially important to
collect data from the IoT solution
being exactly where they are –
at their edge. Once gathered
data could serve in a better
understanding of their role in the
entire system and the next step
in such a case would be to
define your upcoming course of
action.
30 Cyber Warnings E-Magazine – May 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide