Вы находитесь на странице: 1из 3

The Internet of Things: How can it change your business?

The Internet of Things is reshaping the landscape of our business operations at a rapid pace. There are many applications that run on the devices that are connected through these networks and the prices for these apps have dropped considerably. They are also scalable.
The Internet of Things (IoT) is a network of physical objects that can be accessed through the internet, these objects have embedded technologies that interact with internal When states objects or can the external and Enter George Church and Sriram Kosuri, two

researchers from Harvard Universitys Wyss Institute and Yuan Gao, from Johns Hopkins. They have found a solution that might pave the way for the future. They have stored 700 terabytes of scanned data into a one gram of DNA. They treated the DNA as a digital storage device and they manipulated the DNA molecules so that it can store data. DNA is dense, stable, energy-efficient and works over a time span of 3.5 billion years. The researchers used binary code to preserve the text, images, and other formats of data. DNA is also stable at room temperature. However, reading and writing in DNA is slower than in other media, and this makes it better suited for archival storage of massive amounts of data, rather than for quick retrieval or data processing.

environment.

sense

communicate, it changes how and where decisions are made, and who makes them. As the number of applications, the devices that host them, and the networks that connect those devices increases, the data that will be generated will also rise exponentially. Cloud technology is a solution but clouds are prone to outages and the security of the cloud is also weak. Companies need to look out for alternative storage in the days to come.

4 grams of DNA can store data created by mankind in a year. Businesses need to capitalize on DNA as the next data storage technology. Storage of vast amounts of data is going to be a challenge in a very short time. Most data storage formats have reached

Virtual Security Module (VSM): emulates a virtual hardware security device attached to the clients VM. Secure Virtual Device forms a layer between the client VM and peripheral devices and encrypts all I/O data streams.

obsolescence quickly. VHS, DVDs, and Flash drives have all had very short lifespans and the DNA storage technology will be a very valuable alternative.

Networking Wearables
Major partnership opportunities exist with networking wearables and other consumer and lifestyle

technology in the IoT as well as in areas such as health and wellness etc

Security issues
Security will be another major challenge for the IoT Information stored on the clouds can be

Wearable

technology

can

process

data

and

communicate wirelessly with other external devices. the question being asked by IT professionals in 2014 is how workplace networks will cope with consumerdriven wearable gadgets. If smart wigs, watches, glasses and gloves become as commonplace as an iPhone or HTC are today, the impact on corporate IT must not be underestimated. These devices need to pair with an "original" device. Then there are security considerations. Google Glass They don't replace phones, tablets and computers; enables the wearer to record everything that he/she they are in addition. Smart wigs, shoes, handbags sees. Similarly, Smartwatches have cameras and and recording Although this seems very utopian, many otherfacilities. accessories will multiply the number of the reality is that discreetly transferring sensitive devices accessing the network. For those who found competitive information to a device outside the BYOD a challenge, expect the as wearable network could become as easy a flick oftechnology the wrist or revolution to be like BYOD x 100.

compromised and businesses have to come up with new standards to protect their data. To resolve the security issues, they have to enforce cryptographic primitives for resource constrained devices; key exchange mechanisms, access control, authentication, firewalls and intrusion detection for networks of smart objects. Cryptographic primitives are low-level cryptographic algorithms that are used to build computer security systems. As owners no longer physically possess their clouds, previous cryptographic primitives for the purpose of storage correctness protection cannot be adopted Cryptography-as-a-service empowers the client to be in control of their cryptographic operations and keys. They can leverage CaaS in two modes:

Firms

can

capitalize

on

this

opportunity

and

partnerships with the makers of wearable technology like Sony is a potential option.

Reference Architecture
Developing an effective cross-industry technology reference architecture that will allow for true

interoperability and ease of deployment. This might prove to be the toughest challenge of all as the firm has to come up with a massive and complex revamp of its existing architecture to accommodate the inflow of wearable and DNA storage technology. Interoperability is a hurdle as many of the devices are not platform independent. Apps that run on Windows will not work on an iOs and similarly apps developed from Linux will not seamlessly integrate on Windows platforms. Many IT corporations are trying to come up with a unified platform. So far, very few programming languages are able to provide the feature of portability. More Java based applications currently seem to be the only solution to this roadblock.

Вам также может понравиться