SlideShare a Scribd company logo
1 of 27
Intro to IoT through
Hardware
Brett Hazen
• Senior II Consultant
• Email: brett.hazen@ilmservice.com
• Twitter: @BrettEHazen
WTF is IoT and Why Do I Care?
Making objects intelligent in a way that’s connected to
other devices
Successful IoT Based Businesses:
 Nest
 FitBit
 Parrot (drones, not birds)
Teaching coding
FUN!
tasty beer by MattHurst/ CC BY 2.0
Photo by StockMonkeys.com / CC BY
WifiEthernet
XBee GSMRF
Bluetooth (LE)
Original public domain image Photo by Canopus49 / CC BY-SA
Photo by SparkFunElectronics / CC BY
Original public domain image
Photo by Dmcole / CC BY-SA
Photo by RRZEicons / CC BY-SA
• Microcontroller • System on a Chip
• Small instruction set
• Small, read-only memory
• Designed for embedded
• Great at doing one thing
• Single-chip solution
• Other functionality built-in
• Run an OS
• Have some memory on-board
Microcontroller Examples
ArduinoPic
Photo by w:User:Acdx / CC BY-SA Photo by SparkFun Electronics / CC BY
Photo by oomlout / CC BY-SA
Microcontroller Examples
ArduinoPic
Photo by w:User:Acdx / CC BY-SA Photo by SparkFun Electronics / CC BY
Photo by JotaCartas / CC BY
Teensy Arduino Shield Adapter by SparkFunElectronics/ CC BY 2.0
System on a Chip Examples
Raspberry Pi Intel Edison
Photo by Lucasbosch / CC BY-SA Photo by SparkFunElectronics / CC BY
Other Examples
Littlebits
Photo by adafruit / CC BY-NC-SA
SAM
Couldn’t find picture
I could legally use 
Other Devices
• Particle (formerly Spark)
• BeagleBone
• MinnowBoard MAX
• Tessel
Photo by the mad LOLscientist / CC BY
Photo by oomlout / CC BY-SA
Photo by SparkFunElectronics / CC BY Photo by SparkFunElectronics / CC BY
Photo by SparkFunElectronics / CC BY-NC-SA
Photo by SparkFunElectronics / CC BYOriginal public domain image
Photo by SparkFunElectronics / CC BY Photo by SparkFunElectronics / CC BY
Photo by oomlout / CC BY-SA Photo by Lucky Larry / CC BY-NC
Photo by SparkFunElectronics / CC BY
Photo by Matt Biddulph / CC BY-SA
Azure IoT Hub
Device
Azure Iot Hub
Azure Stream Analytics Azure Service Bus Queue
Azure Logic App
Notification
OWASP 2014 IoT Top 10 – Developer
Focus
1.Insecure Web Interface
2.Insufficient Authentication/Authorization
3.Insecure Network Services
4.Lack of Transport Encryption
5.“Privacy Concerns” (quotes mine)
6.Insecure Cloud Interface
7.Insecure Mobile Interface
8.Insufficient Security Configurability
9.Insecure Software/Firmware
10.Poor Physical Security
• Places to Buy Things
• SparkFun (sparkfun.com)
• AdaFruit (adafruit.com)
• Amazon
• Resources of Projects
• Hackaday.io
• Arduino (arduino.cc)
• Raspberry Pi Foundation (raspberrypi.org)
• General Learning Resources
• March is for Makers
• SparkFun
• Azure IoT Hub Starter Kits
Questions?
Brett Hazen
Senior II Consultant
Email: brett.hazen@ilmservice.com
Twitter: @BrettEHazen
Slideshare: http://slideshare.net/NorseDisc/iot-through-hardware
Demo Code: https://github.com/bhazen/beer-monitor

More Related Content

Viewers also liked

Intro to six sigma s depoe.ppt
Intro to six sigma s depoe.pptIntro to six sigma s depoe.ppt
Intro to six sigma s depoe.pptStephen Depoe
 
[Mercado Boi Gordo] Principais Indicadores 16-dez-2011
[Mercado Boi Gordo] Principais Indicadores 16-dez-2011[Mercado Boi Gordo] Principais Indicadores 16-dez-2011
[Mercado Boi Gordo] Principais Indicadores 16-dez-2011AgroTalento
 
Café com Seguro ANSP - Psicopatas na Aviação - Dras Hilda e Júlia
Café com Seguro ANSP -  Psicopatas na Aviação - Dras Hilda e JúliaCafé com Seguro ANSP -  Psicopatas na Aviação - Dras Hilda e Júlia
Café com Seguro ANSP - Psicopatas na Aviação - Dras Hilda e Júliapaulooficinadotexto
 
Apresentação bruna malagoli martino
Apresentação bruna malagoli martinoApresentação bruna malagoli martino
Apresentação bruna malagoli martinopaulooficinadotexto
 
Tips, techniques, and tools for measuring what works in social, presented by ...
Tips, techniques, and tools for measuring what works in social, presented by ...Tips, techniques, and tools for measuring what works in social, presented by ...
Tips, techniques, and tools for measuring what works in social, presented by ...SocialMedia.org
 
Analysys_Mason_M2M_IoT_operator_opportunities_Apr2016
Analysys_Mason_M2M_IoT_operator_opportunities_Apr2016Analysys_Mason_M2M_IoT_operator_opportunities_Apr2016
Analysys_Mason_M2M_IoT_operator_opportunities_Apr2016Dennis McCain
 
Evaluation of Caring Dads Safer Children
Evaluation of Caring Dads Safer ChildrenEvaluation of Caring Dads Safer Children
Evaluation of Caring Dads Safer ChildrenBASPCAN
 

Viewers also liked (10)

Intro to six sigma s depoe.ppt
Intro to six sigma s depoe.pptIntro to six sigma s depoe.ppt
Intro to six sigma s depoe.ppt
 
[Mercado Boi Gordo] Principais Indicadores 16-dez-2011
[Mercado Boi Gordo] Principais Indicadores 16-dez-2011[Mercado Boi Gordo] Principais Indicadores 16-dez-2011
[Mercado Boi Gordo] Principais Indicadores 16-dez-2011
 
Café com Seguro ANSP - Psicopatas na Aviação - Dras Hilda e Júlia
Café com Seguro ANSP -  Psicopatas na Aviação - Dras Hilda e JúliaCafé com Seguro ANSP -  Psicopatas na Aviação - Dras Hilda e Júlia
Café com Seguro ANSP - Psicopatas na Aviação - Dras Hilda e Júlia
 
Les 21
Les 21Les 21
Les 21
 
ฟุตบอล(Football)
ฟุตบอล(Football)ฟุตบอล(Football)
ฟุตบอล(Football)
 
Apresentação bruna malagoli martino
Apresentação bruna malagoli martinoApresentação bruna malagoli martino
Apresentação bruna malagoli martino
 
Tips, techniques, and tools for measuring what works in social, presented by ...
Tips, techniques, and tools for measuring what works in social, presented by ...Tips, techniques, and tools for measuring what works in social, presented by ...
Tips, techniques, and tools for measuring what works in social, presented by ...
 
Analysys_Mason_M2M_IoT_operator_opportunities_Apr2016
Analysys_Mason_M2M_IoT_operator_opportunities_Apr2016Analysys_Mason_M2M_IoT_operator_opportunities_Apr2016
Analysys_Mason_M2M_IoT_operator_opportunities_Apr2016
 
Smart city-Ahmedabad, Bhopal & Kakinada
Smart city-Ahmedabad, Bhopal & KakinadaSmart city-Ahmedabad, Bhopal & Kakinada
Smart city-Ahmedabad, Bhopal & Kakinada
 
Evaluation of Caring Dads Safer Children
Evaluation of Caring Dads Safer ChildrenEvaluation of Caring Dads Safer Children
Evaluation of Caring Dads Safer Children
 

Similar to Iot through hardware

Applying IoT
Applying IoTApplying IoT
Applying IoTNorseDisc
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTWSO2
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatDuo Security
 
Your Thing is pwnd - Security Challenges for the Internet of Things
Your Thing is pwnd - Security Challenges for the Internet of ThingsYour Thing is pwnd - Security Challenges for the Internet of Things
Your Thing is pwnd - Security Challenges for the Internet of ThingsWSO2
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecturePaul Fremantle
 
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloudA Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloudWSO2
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Duo Security
 
20130226 How Personal Is Your Cloud?
20130226 How Personal Is Your Cloud?20130226 How Personal Is Your Cloud?
20130226 How Personal Is Your Cloud?T.Rob Wyatt
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsPaul Fremantle
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014Brian Knopf
 
IOT Oversharing: 
Stop Sending My Stuff to the Cloud
IOT Oversharing: 
Stop Sending My Stuff to the CloudIOT Oversharing: 
Stop Sending My Stuff to the Cloud
IOT Oversharing: 
Stop Sending My Stuff to the CloudRamin Firoozye
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7Rapid7
 
Introduction to Windows IoT via Raspberry Pi 3
Introduction to Windows IoT via Raspberry Pi 3Introduction to Windows IoT via Raspberry Pi 3
Introduction to Windows IoT via Raspberry Pi 3Lee Richardson
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of thingsMonika Keerthi
 
Edge computing in practice using IoT, Tensorflow and Google Cloud
Edge computing in practice using IoT, Tensorflow and Google CloudEdge computing in practice using IoT, Tensorflow and Google Cloud
Edge computing in practice using IoT, Tensorflow and Google CloudAlvaro Viebrantz
 
Hack one iot device, break them all!
Hack one iot device, break them all!Hack one iot device, break them all!
Hack one iot device, break them all!Justin Black
 

Similar to Iot through hardware (20)

Applying IoT
Applying IoTApplying IoT
Applying IoT
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoT
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
Your Thing is pwnd - Security Challenges for the Internet of Things
Your Thing is pwnd - Security Challenges for the Internet of ThingsYour Thing is pwnd - Security Challenges for the Internet of Things
Your Thing is pwnd - Security Challenges for the Internet of Things
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
 
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloudA Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
 
Bigger On The Inside
Bigger On The InsideBigger On The Inside
Bigger On The Inside
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
 
20130226 How Personal Is Your Cloud?
20130226 How Personal Is Your Cloud?20130226 How Personal Is Your Cloud?
20130226 How Personal Is Your Cloud?
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
 
IOT Oversharing: 
Stop Sending My Stuff to the Cloud
IOT Oversharing: 
Stop Sending My Stuff to the CloudIOT Oversharing: 
Stop Sending My Stuff to the Cloud
IOT Oversharing: 
Stop Sending My Stuff to the Cloud
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
Introduction to Windows IoT via Raspberry Pi 3
Introduction to Windows IoT via Raspberry Pi 3Introduction to Windows IoT via Raspberry Pi 3
Introduction to Windows IoT via Raspberry Pi 3
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Edge computing in practice using IoT, Tensorflow and Google Cloud
Edge computing in practice using IoT, Tensorflow and Google CloudEdge computing in practice using IoT, Tensorflow and Google Cloud
Edge computing in practice using IoT, Tensorflow and Google Cloud
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
IOT Exploitation
IOT Exploitation	IOT Exploitation
IOT Exploitation
 
Hack one iot device, break them all!
Hack one iot device, break them all!Hack one iot device, break them all!
Hack one iot device, break them all!
 

Recently uploaded

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 

Recently uploaded (20)

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 

Iot through hardware