Scenario: An IoT pipeline exists to transform data into information. As a working example, we use sensors that report room temperature, humidity, and occupancy, and translate that raw data into information that would be useful to a building manager.
Ken Rimple discusses the key concepts and terminology of the Internet of Things, including types of IoT devices, networking hardware, transport and protocols, and how they relate to our event and the real world. Topics discussed include connectivity examples and various IoT devices.
By Ken Rimple, Director of Training/Mentoring Services, Chariot Solutions
There are many ways to add wireless connectivity to a device. We’ll take a brief tour of the some of these like WiFi, Bluetooth, ZigBee, Zwave, NFC, Cellular, LoRa, and Sigfox. We’ll talk about some of the pros and cons of each technology to help you decide which is best for your use case.
What is MQTT? How does it work? Why should you care? We’ll discuss the MQTT protocol and how AWS IoT Core is an MQTT Broker able to send and receive messages to and from devices.
AWS IoT provides connectivity to IoT devices through HTTP and MQTT. In this session we learn how to leverage AWS Core IoT as an MQTT broker, how to connect your devices using a client certificate, how policies can enforce data security, and how rules are used to move data elsewhere in the AWS infrastructure.
This talk will cover the high-level design of Kinesis, how it scales, how clients can retrieve records that have been stored in it, and the use of Kinesis Analytics to to transform data and extract outliers.
Data has different purposes over time: when fresh, it can be used for real-time decision-making; as it ages, it becomes useful for analytics; eventually, it becomes a record, useful or perhaps not. Each of these stages requires a different approach to storage and management, and this talk looks at appropriate ways to work with your data at the different stages of its life.
This talk will review two common use cases for the use of captured metric data: 1) Real-time analysis, visualization, and quality assurance, and 2) Ad-hoc analysis.
In this session we will walk through the steps required to securely communicate with your device using the Device Shadow service. This will include an overview of user authentication and authorization, connecting to AWS IoT, and using MQTT to communicate with the device’s “Device Shadow” to read and update its state. All this, using the AWS Amplify CLI and SDK.
This presentation will take you through the biggest areas where you need to focus your efforts in order to keep your data safe in AWS, and will show some real-life examples of what could go wrong if you make compromises or allow bad practices.