Image from Google Jackets

IoT product design and development : best practices for industrial, consumer, and business applications / Ahmad Fattahi

By: Material type: TextTextLanguage: İngilizce Publisher: Hoboken, NJ : John Wiley & Sons, Inc., 2023Copyright date: ©2023Description: 1 online resource (xiii, 183 pages) : illustrations (some color)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781119787662
  • 1119787661
  • 9781119787679
  • 111978767X
  • 9781119787686
  • 1119787688
Other title:
  • Internet of things product design and development
Subject(s): Genre/Form: LOC classification:
  • TK5105.8857 .F384 2023
Online resources:
Contents:
Who is this book for? -- What is Covered? -- Introduction to IoT -- What is IoT? -- Why is IoT important? -- Why now? -- IoT and Digital Transformation -- The role of IoT in modern businesses -- Opportunities -- Risks -- It's an integration process: the human aspects of digital transformation -- IT-OT Integration -- Building trust is key -- Business Models and Market analysis -- Business and industrial market -- The Shift to Software-based PLCs -- Example: improve cost and reliability of a power distribution system with IoT -- Example: enhance safety, security, and carbon footprint in an airport using IoT -- Consumer market -- Sources of Cost -- Sources of Revenue -- Matter, Formerly Known As Project Connected Home over IP (CHIP) -- Example: improve quality of life and energy efficiency by smart thermostats -- Connectivity choice and its impact on RoI -- Climate Change and Performance per Watt -- Data by-products beyond the original IoT application -- Services and device management -- Peripheral businesses -- Marketing -- Data Management -- Analytics and AI -- Developers -- Security and safety -- Security -- Encryption techniques -- Symmetric Encryption Algorithms -- Asymmetric Encryption Algorithms -- Software and Firmware Update Techniques -- Random Key Generation -- Software and Firmware Update Process -- Key Management and Protection Against Known Threats -- Security Attacks and Chain of Trust -- Security Attacks -- Chain of Trust -- Incident Response -- Blockchain -- Summary of Best Security Practices for IoT Systems -- Networking Concepts -- Proxy -- VPN -- Firewall -- DMZ -- IoT Security Standards and Certificates -- ioXT -- UL -- Matter, Formerly Known As Project Home over IP (CHIP) -- Governmental Regulations and Other General Guidelines -- IoT System Design Process and Main Components -- Design and Deployment Process -- Roles, Responsibilities, and Team Structure -- Process -- A Deeper Look -- Sensors -- Common Sensors -- General Sensor Concepts -- Filtering the Sensor Output -- File Systems -- Data in Motion vs. Data at Rest -- Machine Learning -- History and Background -- Categories of Learning Algorithms -- General Machine Learning Concepts -- How a Machine Learning Model is Built -- Overfitting -- Dataset, Explainability, and Supervised Concepts -- What is and what is not machine learning? -- Machine Learning Architecture -- Networking and Communication System, Product Lifecycle, Device Management -- IoT System Architecture: Edge, Cloud, and Fog -- Networking -- Network Functions Virtualization and Software Defined Networks -- Wireless Communication Protocols -- Short range Wireless Protocols -- Long range wireless protocols -- Examples -- Smart Video Doorbell -- Energy Efficient Office -- IoT Systems Life Cycle -- The Process of Building a Data Product -- What personas do you need on your team? -- Business Understanding -- Data Understanding -- Data Preparation -- Modeling -- Evaluation -- Deployment -- The cycle repeats -- CRISP-DM
Summary: "This book will set up the foundation for the successful process of going about the IoT product design and management while offering specific practical and tried recommendations before, during, and after execution. It also offers a practical recipe for the endeavor by offering technological and human-related best practices and pitfalls based on numerous real-world examples. While high level technology, data, and business principles will be discussed, this book is not a deep technical guide that covers technological solutions in detail. Rather we cover the breadth of the technologies related to IoT at a high level. As an analogy, imagine that you are trying to design a few guided tours in 2 states in the United States. This book would be the equivalent of zooming out on the whole 50 states' geographical characteristics, how the federal and state regulations apply, how the seasons work in the United States, and how tours generally fail or succeed in this country. You will be able to understand who you need to connect with and understand the interests of tour guides, hikers, caterers, state park rangers, and the wildlife regulations. You may not become a restaurant owner but you would learn enough to be able to hire them and ask them the right questions. In the opposite direction, if you are a restaurant owner and like to engage with tours you can learn about their business and be more successful at negotiating a better deal. Equivalently, the reader of this book will have a much better likelihood of a successful product design and development after applying the principles in the book. You will know what aspects will be needed, what questions to ask, where to dig more deeply, and what kind of skills set you up for success. Also if you are deep into any one of the pillars of IoT products such as product development, security, hardware, software, data science, or other related fields you will gain a valuable understanding of other skills in the ecosystem and how you can best connect with them"-- Provided by publisher
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Call number Status Notes Date due Barcode
E-Book E-Book Merkez Kütüphane Merkez Kütüphane E-Kitap Koleksiyonu TK5105.8857 .F384 2023EBK (Browse shelf(Opens below)) Geçerli değil-e-Kitap / Not applicable-e-Book MAK EBK01528

Includes bibliographical references and index.

Who is this book for? -- What is Covered? -- Introduction to IoT -- What is IoT? -- Why is IoT important? -- Why now? -- IoT and Digital Transformation -- The role of IoT in modern businesses -- Opportunities -- Risks -- It's an integration process: the human aspects of digital transformation -- IT-OT Integration -- Building trust is key -- Business Models and Market analysis -- Business and industrial market -- The Shift to Software-based PLCs -- Example: improve cost and reliability of a power distribution system with IoT -- Example: enhance safety, security, and carbon footprint in an airport using IoT -- Consumer market -- Sources of Cost -- Sources of Revenue -- Matter, Formerly Known As Project Connected Home over IP (CHIP) -- Example: improve quality of life and energy efficiency by smart thermostats -- Connectivity choice and its impact on RoI -- Climate Change and Performance per Watt -- Data by-products beyond the original IoT application -- Services and device management -- Peripheral businesses -- Marketing -- Data Management -- Analytics and AI -- Developers -- Security and safety -- Security -- Encryption techniques -- Symmetric Encryption Algorithms -- Asymmetric Encryption Algorithms -- Software and Firmware Update Techniques -- Random Key Generation -- Software and Firmware Update Process -- Key Management and Protection Against Known Threats -- Security Attacks and Chain of Trust -- Security Attacks -- Chain of Trust -- Incident Response -- Blockchain -- Summary of Best Security Practices for IoT Systems -- Networking Concepts -- Proxy -- VPN -- Firewall -- DMZ -- IoT Security Standards and Certificates -- ioXT -- UL -- Matter, Formerly Known As Project Home over IP (CHIP) -- Governmental Regulations and Other General Guidelines -- IoT System Design Process and Main Components -- Design and Deployment Process -- Roles, Responsibilities, and Team Structure -- Process -- A Deeper Look -- Sensors -- Common Sensors -- General Sensor Concepts -- Filtering the Sensor Output -- File Systems -- Data in Motion vs. Data at Rest -- Machine Learning -- History and Background -- Categories of Learning Algorithms -- General Machine Learning Concepts -- How a Machine Learning Model is Built -- Overfitting -- Dataset, Explainability, and Supervised Concepts -- What is and what is not machine learning? -- Machine Learning Architecture -- Networking and Communication System, Product Lifecycle, Device Management -- IoT System Architecture: Edge, Cloud, and Fog -- Networking -- Network Functions Virtualization and Software Defined Networks -- Wireless Communication Protocols -- Short range Wireless Protocols -- Long range wireless protocols -- Examples -- Smart Video Doorbell -- Energy Efficient Office -- IoT Systems Life Cycle -- The Process of Building a Data Product -- What personas do you need on your team? -- Business Understanding -- Data Understanding -- Data Preparation -- Modeling -- Evaluation -- Deployment -- The cycle repeats -- CRISP-DM

"This book will set up the foundation for the successful process of going about the IoT product design and management while offering specific practical and tried recommendations before, during, and after execution. It also offers a practical recipe for the endeavor by offering technological and human-related best practices and pitfalls based on numerous real-world examples. While high level technology, data, and business principles will be discussed, this book is not a deep technical guide that covers technological solutions in detail. Rather we cover the breadth of the technologies related to IoT at a high level. As an analogy, imagine that you are trying to design a few guided tours in 2 states in the United States. This book would be the equivalent of zooming out on the whole 50 states' geographical characteristics, how the federal and state regulations apply, how the seasons work in the United States, and how tours generally fail or succeed in this country. You will be able to understand who you need to connect with and understand the interests of tour guides, hikers, caterers, state park rangers, and the wildlife regulations. You may not become a restaurant owner but you would learn enough to be able to hire them and ask them the right questions. In the opposite direction, if you are a restaurant owner and like to engage with tours you can learn about their business and be more successful at negotiating a better deal. Equivalently, the reader of this book will have a much better likelihood of a successful product design and development after applying the principles in the book. You will know what aspects will be needed, what questions to ask, where to dig more deeply, and what kind of skills set you up for success. Also if you are deep into any one of the pillars of IoT products such as product development, security, hardware, software, data science, or other related fields you will gain a valuable understanding of other skills in the ecosystem and how you can best connect with them"-- Provided by publisher

There are no comments on this title.

to post a comment.
Devinim Yazılım Eğitim Danışmanlık tarafından Koha'nın orjinal sürümü uyarlanarak geliştirilip kurulmuştur.