TEACHERS
GALLERY
PRICING
SIGN IN
TRY ZURU
GET STARTED
Loop
Audio
Interval:
5s
10s
15s
20s
60s
Play
1 of 25
Slide Notes
Download
Go Live
New! Free Haiku Deck for PowerPoint Add-In
Practical Integration
Share
Copy
Download
1
3
Published on Jun 25, 2019
No Description
View Outline
MORE DECKS TO EXPLORE
PRESENTATION OUTLINE
1.
Practical Integration
Data Continuity, Management, and Security
Photo by
Smart Chicago Collaborative
2.
Data Continuity
Hardware, Languages, and Communications
Photo by
qthomasbower
3.
Hardware
Data needs somewhere to live.
Photo by
Louis Reed
4.
The race is always won in the implementation.
Photo by
Alex Holyoake
5.
Internet of Things (IoT)
"There will be over an estimated 20 billion connected devices by 2020." Gartner
Photo by
Dan LeFebvre
6.
Communications Technologies
Photo by
Markus Spiske
7.
Telemetry Data: Radar, Lidar, Accelerometer, Gyroscope, Magnometers
Networking: GPS, CAN, 3G/4G Cellular, Wi-Fi, Bluetooth
Additional Data Inputs: Facial Recognition, Image Segmentation, Object Detection, Emotion Detection, Body Pose Estimation, Voice Control, Infotainment Interface, Command Interface
Photo by
ed and eddie
8.
Consolidating programming languages
Photo by
Yu. Samoilov
9.
dATA MANAGEMENT
mODULARIZED DATA FLOWS, WORK FLOWS, AND MEMORY
Photo by
Taylor Vick
10.
DATA HANDLING METHODS
1. Find, clean, and organize data pre-model.
2. Retrieve and Analyze essential data, post-model.
3. Redeploy new model, refine.
Photo by
washingtonydc
11.
cASE sTUDY
DECENTRALIZED AUTONOMOUS VEHICLE (DAV) NETWORK
Photo by
swanksalot
12.
MEMORY MANAGEMENT
ON THE EDGE
Photo by
Tolbxela
13.
DATA OVERLOAD
AV's create roughly 11TB of memory per day.
Photo by
Banter Snaps
14.
Overnight Uploads/Updates
of 15 TB can be transferred over 10Gbps Ethernet, in 3 hours 39 minutes.
Photo by
el-meister
15.
SENSOR INPUTS:
Inputs are processed on the EDGE.
Photo by
EU2017EE
16.
SENSOR FUSION:
Collective sensory inputs are consolidated.
Photo by
adafruit
17.
DATA COMPRESSION:
30 TB of SDD Memory creates 48 hours of memory for "overflow management and analysis".
Photo by
Markus Spiske
18.
Vulnerability ID & Assessment
1) Catalogue Assets, Assign Value
2) Identify Weak points
3) Mitigate or Eliminate
Photo by
Yu. Samoilov
19.
No mans land
Photo by
SmartSignBrooklyn
20.
The "Unhackable"
Photo by
André François McKenzie
21.
In 2016, using Ethereum, an attacker stole more than $60 million worth of cryptocurrency by exploiting a flaw in the code.
Photo by
Tim Reckmann | a59.de
22.
Asset defense
A good defense is a good offense
Photo by
Keith Johnston
23.
Black Box
Randomized Encryption
Overnight Ethernet Updates
Rootkit Hunters & IDS's/IPS's
Firewalls
Social Engineering Awareness
Photo by
CarbonNYC [in SF!]
24.
SECURITY SOLUTIONS
a. Intranet
b. Internet Bridge
c. Completely off-network w/ Nightly Updates
Photo by
Matthew Henry
25.
DATA SET BIAS
ONLY IF YOU LOVE INACCURATE DATA
Photo by
Fran Simó ( I dreamed about a human being )
Ean Mikale
×
Error!