SlideShare a Scribd company logo
1 of 16
Creating the Internet of
YOUR Things
Darren Robinson
Managing & Principal Identity & Access Management Architect (NSW)
Identity & Access Management MVP
Kloud Solutions (Australia)
@darrenjrobinson darren.robinson@kloud.com.au
blog.darrenjrobinson.com // blog.kloud.com.au
HATT
Internet of ThingsInternet of Teeth?
 2mm x 2mm Sensor
 Tracks and monitors what we eat and drink
 Salt
 Glucose
 Alcohol
https://hackaday.com/2018/04/01/the-iot-internet-of-teeth/
 Gold leaf as the active material
 On-skin user interfaces
 Sense touch
 Display output
 Thermochromic tattoo
 Communicate wirelessly with other devices
 Using NFC
Internet of ThingsInternet of Tattoos?
https://www.microsoft.com/en-us/research/publication/duoskin-rapidly-prototyping-skin-user-interfaces-
using-skin-friendly-materials-2/
Facial Recognition?
https://www.hackster.io/windows-iot/windows-iot-facial-recognition-door-e087ce
 Pet Door Facial
Recognition
 Front Door Facial
Recognition
Do you have …..
Build the Internet of YOUR Things
 What and how do I build the Internet of MY Things?
 Devices and Sensors
 Integration and Management
 Automation
Devices and Sensors
AU$5-$8 AU$5-$8 AU$5-$8
w/ keyfob &
card
AU$2
AU$2-$3 AU$1-$2
AU$1-$1.50 AU$6
Device
 32-bit Microcontrollers
 Espressif ESP8266 (Single Core)
 Espressif ESP32 (Dual Core) Bluetooth
 Full TCP/IP Stack
 Wifi 802.11 b/g/n
 Mongoose OS (IoT Firmware Dev Framework)
 JavaScript (mJS) and C#
 Cloud Integration (Azure, Google, AWS)
 MQTT
 Over-The-Air Updates and Management
 Device Dashboard
https://mongoose-os.com
Azure IoT Hub
IoT Device
IoT Device
Azure IoT
Azure
MQTT
Cloud
Azure IoT
 IoT Hub
 Connect and
manage IoT Devices
 IoT Devices
 ESP8266
 ESP32
 MQTT
 Device to Cloud
 Cloud to Device
Flow
Azure Functions
Azure Functions
Automation
 Send events to the IoT Device
 Schedule triggers
 Event triggers
 Microsoft Flow
 Hundreds of Actions to trigger logic
 Azure Functions
 Custom modules or actions/triggers not available from
Microsoft Flow
 Whatever you can imagination desires
Device
Azure IoT Hub
IoT Device
IoT Device
Azure IoT
Azure
MQTT
Flow
Azure Functions
Azure Functions
Cloud Automation
Example Project
Azure IoT
Hub
Registered
Azure IoT
Device
Azure
PowerShell
Function App
MQTT Message
ESP8266
Microcontroller
Microsoft
Flow
Web Hook
Button
Trigger
MQTT
Message
Actions
End to End Integration in 5 Steps
1. Create an Azure IoT Hub
 Using PowerShell or the Azure Portal
2. Register an Azure IoT Device
 Using PowerShell or Azure Portal
3. Configure your Physical IoT Device for MQTT to/from Azure IoT
Hub
 Mongoose OS on your ESP8266/ESP32 device
4. Create remote orchestration trigger/logic
(Azure Functions / Flow)
5. Configure IoT Device to implement Internet of YOUR Things
Steps 1-3
 Creation of Azure IoT Hubs and the registration of IoT
Devices with PowerShell and VS Code
 https://blog.darrenjrobinson.com/automating-the-creation-of-
azure-iot-hubs-and-the-registration-of-iot-devices-with-
powershell-and-vs-code/
 Integrating Azure IoT Devices with MongooseOS MQTT and
PowerShell
 https://blog.darrenjrobinson.com/integrating-azure-iot-devices-
with-mongooseos-mqtt-and-powershell/
What will you build?
 Internet Connected Smoke Alarm
 Environmental Monitor / Weather Station
 Medicinal Plant Monitoring Service
 Gas / Air Quality Sensor
 Radioactivity Monitor
 Smart Washing Machine
 Motion Detection and Alert Service
 Have I left my Soldering Iron On Notifier
OR
Voice Activation
https://youtu.be/dVQ6rwaZ648?t=451
https://youtu.be/dVQ6rwaZ648?t=451

More Related Content

What's hot

Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!DefCamp
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Securityshiriskumar
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesTom Eston
 
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha ChathurangaaOS Community
 
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...Ranjan Jain
 
From Reversing to Exploitation: Android Application Security in Essence
From Reversing to Exploitation: Android Application Security in EssenceFrom Reversing to Exploitation: Android Application Security in Essence
From Reversing to Exploitation: Android Application Security in EssenceSatria Ady Pradana
 
Android Security : A Hacker's Perspective
Android Security : A Hacker's PerspectiveAndroid Security : A Hacker's Perspective
Android Security : A Hacker's PerspectiveSatria Ady Pradana
 
2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development 2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development Cheng-Yi Yu
 
Testing Android Security Codemotion Amsterdam edition
Testing Android Security Codemotion Amsterdam editionTesting Android Security Codemotion Amsterdam edition
Testing Android Security Codemotion Amsterdam editionJose Manuel Ortega Candel
 
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรการสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรSoftware Park Thailand
 
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldOneLogin
 

What's hot (12)

Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Security
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
2018-10-23 2B - a deep dive into Microsoft 365 security - Muditha Chathuranga
 
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
 
From Reversing to Exploitation: Android Application Security in Essence
From Reversing to Exploitation: Android Application Security in EssenceFrom Reversing to Exploitation: Android Application Security in Essence
From Reversing to Exploitation: Android Application Security in Essence
 
Android Security : A Hacker's Perspective
Android Security : A Hacker's PerspectiveAndroid Security : A Hacker's Perspective
Android Security : A Hacker's Perspective
 
2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development 2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development
 
IOS security
IOS securityIOS security
IOS security
 
Testing Android Security Codemotion Amsterdam edition
Testing Android Security Codemotion Amsterdam editionTesting Android Security Codemotion Amsterdam edition
Testing Android Security Codemotion Amsterdam edition
 
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรการสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
 
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
 

Similar to Creating the Internet of YOUR Things. Global Azure Bootcamp 2018

Sascha Corti presentation; Microsoft
Sascha Corti presentation; Microsoft Sascha Corti presentation; Microsoft
Sascha Corti presentation; Microsoft Andrew V
 
IoT Masterclass ESGT Santarem - Connecting The Dots
IoT Masterclass ESGT Santarem -  Connecting The DotsIoT Masterclass ESGT Santarem -  Connecting The Dots
IoT Masterclass ESGT Santarem - Connecting The DotsMarco Silva
 
IoT and Maker Crossover (IMCO) Conference 2015
IoT and Maker Crossover (IMCO) Conference 2015IoT and Maker Crossover (IMCO) Conference 2015
IoT and Maker Crossover (IMCO) Conference 2015Jollen Chen
 
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...MskDotNet Community
 
Can we build an Azure IoT controlled device in less than 40 minutes that cost...
Can we build an Azure IoT controlled device in less than 40 minutes that cost...Can we build an Azure IoT controlled device in less than 40 minutes that cost...
Can we build an Azure IoT controlled device in less than 40 minutes that cost...Codemotion Tel Aviv
 
IOT y el Data Analytics
IOT y el Data AnalyticsIOT y el Data Analytics
IOT y el Data Analyticsnnakasone
 
How to Start Building Your IoT Application
How to Start Building Your IoT ApplicationHow to Start Building Your IoT Application
How to Start Building Your IoT ApplicationDr. Mazlan Abbas
 
Introduction to Azure IoT Suite
Introduction to Azure IoT SuiteIntroduction to Azure IoT Suite
Introduction to Azure IoT SuiteDaniel Toomey
 
Exploring the Azure IoT Ecosystem
Exploring the Azure IoT EcosystemExploring the Azure IoT Ecosystem
Exploring the Azure IoT EcosystemBizTalk360
 
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)Jackson Shaw
 
Internet Of Things What You Need To Know - TechFuse
Internet Of Things What You Need To Know - TechFuseInternet Of Things What You Need To Know - TechFuse
Internet Of Things What You Need To Know - TechFuseRichard Harbridge
 
Get in Touch with Internet of Things
Get in Touch with Internet of ThingsGet in Touch with Internet of Things
Get in Touch with Internet of ThingsCodePolitan
 
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)Callon Campbell
 
Building IoT Solutions using Windows IoT Core
Building IoT Solutions using Windows IoT CoreBuilding IoT Solutions using Windows IoT Core
Building IoT Solutions using Windows IoT CoreWinWire Technologies Inc
 
Synthetic Data: From 3D model to AI on the Edge
Synthetic Data: From 3D model to AI on the EdgeSynthetic Data: From 3D model to AI on the Edge
Synthetic Data: From 3D model to AI on the EdgeSherry List
 
The Internet of your things by Jan Tielens
The Internet of your things by Jan  TielensThe Internet of your things by Jan  Tielens
The Internet of your things by Jan TielensITProceed
 
Global Azure Bootcamp 2019 - AIoT powered by Azure
Global Azure Bootcamp 2019 - AIoT powered by AzureGlobal Azure Bootcamp 2019 - AIoT powered by Azure
Global Azure Bootcamp 2019 - AIoT powered by AzureAndri Yadi
 

Similar to Creating the Internet of YOUR Things. Global Azure Bootcamp 2018 (20)

Microsoft & IoT
Microsoft & IoTMicrosoft & IoT
Microsoft & IoT
 
Sascha Corti presentation; Microsoft
Sascha Corti presentation; Microsoft Sascha Corti presentation; Microsoft
Sascha Corti presentation; Microsoft
 
IoT Masterclass ESGT Santarem - Connecting The Dots
IoT Masterclass ESGT Santarem -  Connecting The DotsIoT Masterclass ESGT Santarem -  Connecting The Dots
IoT Masterclass ESGT Santarem - Connecting The Dots
 
IoT on azure
IoT on azureIoT on azure
IoT on azure
 
IoT and Maker Crossover (IMCO) Conference 2015
IoT and Maker Crossover (IMCO) Conference 2015IoT and Maker Crossover (IMCO) Conference 2015
IoT and Maker Crossover (IMCO) Conference 2015
 
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
 
Azure IoT Hub
Azure IoT HubAzure IoT Hub
Azure IoT Hub
 
Can we build an Azure IoT controlled device in less than 40 minutes that cost...
Can we build an Azure IoT controlled device in less than 40 minutes that cost...Can we build an Azure IoT controlled device in less than 40 minutes that cost...
Can we build an Azure IoT controlled device in less than 40 minutes that cost...
 
IOT y el Data Analytics
IOT y el Data AnalyticsIOT y el Data Analytics
IOT y el Data Analytics
 
How to Start Building Your IoT Application
How to Start Building Your IoT ApplicationHow to Start Building Your IoT Application
How to Start Building Your IoT Application
 
Introduction to Azure IoT Suite
Introduction to Azure IoT SuiteIntroduction to Azure IoT Suite
Introduction to Azure IoT Suite
 
Exploring the Azure IoT Ecosystem
Exploring the Azure IoT EcosystemExploring the Azure IoT Ecosystem
Exploring the Azure IoT Ecosystem
 
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
 
Internet Of Things What You Need To Know - TechFuse
Internet Of Things What You Need To Know - TechFuseInternet Of Things What You Need To Know - TechFuse
Internet Of Things What You Need To Know - TechFuse
 
Get in Touch with Internet of Things
Get in Touch with Internet of ThingsGet in Touch with Internet of Things
Get in Touch with Internet of Things
 
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
 
Building IoT Solutions using Windows IoT Core
Building IoT Solutions using Windows IoT CoreBuilding IoT Solutions using Windows IoT Core
Building IoT Solutions using Windows IoT Core
 
Synthetic Data: From 3D model to AI on the Edge
Synthetic Data: From 3D model to AI on the EdgeSynthetic Data: From 3D model to AI on the Edge
Synthetic Data: From 3D model to AI on the Edge
 
The Internet of your things by Jan Tielens
The Internet of your things by Jan  TielensThe Internet of your things by Jan  Tielens
The Internet of your things by Jan Tielens
 
Global Azure Bootcamp 2019 - AIoT powered by Azure
Global Azure Bootcamp 2019 - AIoT powered by AzureGlobal Azure Bootcamp 2019 - AIoT powered by Azure
Global Azure Bootcamp 2019 - AIoT powered by Azure
 

Recently uploaded

Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 

Recently uploaded (9)

Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 

Creating the Internet of YOUR Things. Global Azure Bootcamp 2018

  • 1. Creating the Internet of YOUR Things Darren Robinson Managing & Principal Identity & Access Management Architect (NSW) Identity & Access Management MVP Kloud Solutions (Australia) @darrenjrobinson darren.robinson@kloud.com.au blog.darrenjrobinson.com // blog.kloud.com.au HATT
  • 2. Internet of ThingsInternet of Teeth?  2mm x 2mm Sensor  Tracks and monitors what we eat and drink  Salt  Glucose  Alcohol https://hackaday.com/2018/04/01/the-iot-internet-of-teeth/
  • 3.  Gold leaf as the active material  On-skin user interfaces  Sense touch  Display output  Thermochromic tattoo  Communicate wirelessly with other devices  Using NFC Internet of ThingsInternet of Tattoos? https://www.microsoft.com/en-us/research/publication/duoskin-rapidly-prototyping-skin-user-interfaces- using-skin-friendly-materials-2/
  • 5. Do you have …..
  • 6. Build the Internet of YOUR Things  What and how do I build the Internet of MY Things?  Devices and Sensors  Integration and Management  Automation
  • 7. Devices and Sensors AU$5-$8 AU$5-$8 AU$5-$8 w/ keyfob & card AU$2 AU$2-$3 AU$1-$2 AU$1-$1.50 AU$6
  • 8. Device  32-bit Microcontrollers  Espressif ESP8266 (Single Core)  Espressif ESP32 (Dual Core) Bluetooth  Full TCP/IP Stack  Wifi 802.11 b/g/n  Mongoose OS (IoT Firmware Dev Framework)  JavaScript (mJS) and C#  Cloud Integration (Azure, Google, AWS)  MQTT  Over-The-Air Updates and Management  Device Dashboard https://mongoose-os.com
  • 9. Azure IoT Hub IoT Device IoT Device Azure IoT Azure MQTT Cloud Azure IoT  IoT Hub  Connect and manage IoT Devices  IoT Devices  ESP8266  ESP32  MQTT  Device to Cloud  Cloud to Device
  • 10. Flow Azure Functions Azure Functions Automation  Send events to the IoT Device  Schedule triggers  Event triggers  Microsoft Flow  Hundreds of Actions to trigger logic  Azure Functions  Custom modules or actions/triggers not available from Microsoft Flow  Whatever you can imagination desires
  • 11. Device Azure IoT Hub IoT Device IoT Device Azure IoT Azure MQTT Flow Azure Functions Azure Functions Cloud Automation
  • 12. Example Project Azure IoT Hub Registered Azure IoT Device Azure PowerShell Function App MQTT Message ESP8266 Microcontroller Microsoft Flow Web Hook Button Trigger MQTT Message Actions
  • 13. End to End Integration in 5 Steps 1. Create an Azure IoT Hub  Using PowerShell or the Azure Portal 2. Register an Azure IoT Device  Using PowerShell or Azure Portal 3. Configure your Physical IoT Device for MQTT to/from Azure IoT Hub  Mongoose OS on your ESP8266/ESP32 device 4. Create remote orchestration trigger/logic (Azure Functions / Flow) 5. Configure IoT Device to implement Internet of YOUR Things
  • 14. Steps 1-3  Creation of Azure IoT Hubs and the registration of IoT Devices with PowerShell and VS Code  https://blog.darrenjrobinson.com/automating-the-creation-of- azure-iot-hubs-and-the-registration-of-iot-devices-with- powershell-and-vs-code/  Integrating Azure IoT Devices with MongooseOS MQTT and PowerShell  https://blog.darrenjrobinson.com/integrating-azure-iot-devices- with-mongooseos-mqtt-and-powershell/
  • 15. What will you build?  Internet Connected Smoke Alarm  Environmental Monitor / Weather Station  Medicinal Plant Monitoring Service  Gas / Air Quality Sensor  Radioactivity Monitor  Smart Washing Machine  Motion Detection and Alert Service  Have I left my Soldering Iron On Notifier OR