1 of 25

Slide Notes

DownloadGo Live

Practical Integration

Published on Jun 25, 2019

No Description

PRESENTATION OUTLINE

Practical Integration

Data Continuity, Management, and Security

Data Continuity

Hardware, Languages, and Communications
Photo by qthomasbower

Hardware

Data needs somewhere to live. 
Photo by Louis Reed

The race is always won in the implementation.

Photo by Alex Holyoake

Internet of Things (IoT)

"There will be over an estimated 20 billion connected devices by 2020." Gartner
Photo by Dan LeFebvre

Communications Technologies

Photo by Markus Spiske

Telemetry Data: Radar, Lidar, Accelerometer, Gyroscope, Magnometers

Networking: GPS, CAN, 3G/4G Cellular, Wi-Fi, Bluetooth

Additional Data Inputs: Facial Recognition, Image Segmentation, Object Detection, Emotion Detection, Body Pose Estimation, Voice Control, Infotainment Interface, Command Interface

Photo by ed and eddie

Consolidating programming languages

Photo by Yu. Samoilov

dATA MANAGEMENT

mODULARIZED DATA FLOWS, WORK FLOWS, AND MEMORY
Photo by Taylor Vick

DATA HANDLING METHODS


1. Find, clean, and organize data pre-model.

2. Retrieve and Analyze essential data, post-model.
3. Redeploy new model, refine.

Photo by washingtonydc

cASE sTUDY

DECENTRALIZED AUTONOMOUS VEHICLE (DAV) NETWORK
Photo by swanksalot

MEMORY MANAGEMENT

ON THE EDGE
Photo by Tolbxela

DATA OVERLOAD
AV's create roughly 11TB of memory per day.

Photo by Banter Snaps

Overnight Uploads/Updates

of 15 TB can be transferred over 10Gbps Ethernet, in 3 hours 39 minutes.

Photo by el-meister

SENSOR INPUTS:

Inputs are processed on the EDGE.

Photo by EU2017EE

SENSOR FUSION:

Collective sensory inputs are consolidated.

Photo by adafruit

DATA COMPRESSION:
30 TB of SDD Memory creates 48 hours of memory for "overflow management and analysis".

Photo by Markus Spiske

Vulnerability ID & Assessment
1) Catalogue Assets, Assign Value
2) Identify Weak points
3) Mitigate or Eliminate

Photo by Yu. Samoilov

No mans land

The "Unhackable"

In 2016, using Ethereum, an attacker stole more than $60 million worth of cryptocurrency by exploiting a flaw in the code.

Asset defense

A good defense is a good offense

Black Box
Randomized Encryption
Overnight Ethernet Updates
Rootkit Hunters & IDS's/IPS's
Firewalls
Social Engineering Awareness

SECURITY SOLUTIONS
a. Intranet
b. Internet Bridge
c. Completely off-network w/ Nightly Updates

Photo by Matthew Henry

DATA SET BIAS

ONLY IF YOU LOVE INACCURATE DATA