04638nam 2200493 450 991064374530332120230224123321.01-119-78768-81-119-78766-11-119-78767-X(MiAaPQ)EBC7099634(Au-PeEL)EBL7099634(CKB)24882716400041(EXLCZ)992488271640004120230224d2022 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierIoT product design and development best practices for industrial, consumer, and business applications /Ahmad FattahiHoboken, NJ :John Wiley & Sons, Inc.,[2022]©20221 online resource (200 pages)IoT Skills in Practice Ser.Print version: Fattahi, Ahmad IoT Product Design and Development Newark : John Wiley & Sons, Incorporated,c2022 9781119787655 Cover -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Preface -- Chapter 1 Introduction to IoT -- WHAT IS IoT? -- WHY IS IoT IMPORTANT? -- WHY NOW? -- Chapter 2 IoT and Digital Transformation -- THE ROLE OF IoT IN MODERN BUSINESSES -- Opportunities -- Risks -- IT'S AN INTEGRATION PROCESS: THE HUMAN ASPECTS OF DIGITAL TRANSFORMATION -- IT-OT Integration -- Building Trust Is Key -- Chapter 3 Business Models and Market Analysis -- BUSINESS AND INDUSTRIAL MARKET -- The Shift to Software-Based PLCS -- Example: Improve Cost and Reliability of a Power Distribution System with IoT -- Example: Enhance Safety, Security, and Carbon Footprint in an Airport Using IoT -- CONSUMER MARKET -- Sources of Cost -- Sources of Revenue -- Matter, Formerly Known as Project Connected Home Over IP (CHIP) -- Example: Improve Quality of Life and Energy Efficiency by Smart Thermostats -- CONNECTIVITY CHOICE AND ITS IMPACT ON ROI -- CLIMATE CHANGE AND PERFORMANCE PER WATT -- DATA BY-PRODUCTS BEYOND THE ORIGINAL IoT APPLICATION -- Services and Device Management -- Peripheral Businesses -- Marketing -- Data Management -- Analytics and AI -- Developers -- Security and Safety -- Chapter 4 Security -- ENCRYPTION TECHNIQUES -- Symmetric Encryption Algorithms -- Asymmetric Encryption Algorithms -- SOFTWARE AND FIRMWARE UPDATE TECHNIQUES -- Random Key Generation -- Software and Firmware Update Process -- KEY MANAGEMENT AND PROTECTION AGAINST KNOWN THREATS -- SECURITY ATTACKS AND CHAIN OF TRUST -- Security Attacks -- Chain of Trust -- Incident Response -- BLOCKCHAIN -- SUMMARY OF BEST SECURITY PRACTICES FOR IoT SYSTEMS -- NETWORKING CONCEPTS -- Proxy -- VPN -- Firewall -- DMZ -- IoT SECURITY STANDARDS AND CERTIFICATES -- ioXT -- UL -- Matter, Formerly Known as Project Home over IP (CHIP) -- Governmental Regulations and Other General Guidelines.Chapter 5 IoT System Design Process and Main Components -- DESIGN AND DEPLOYMENT PROCESS -- Roles, Responsibilities, and Team Structure -- Process - A Deeper Look -- SENSORS -- Common Sensors -- General Sensor Concepts -- Filtering the Sensor Output -- FILE SYSTEMS -- Data in Motion versus Data at Rest -- MACHINE LEARNING -- History and Background -- Categories of Learning Algorithms -- General Machine Learning Concepts -- How a Machine Learning Model Is Built -- Overfitting -- Data Set, Explainability, and Supervised Concepts -- What Is and What Is Not Machine Learning? -- Machine Learning Architecture -- NETWORKING AND COMMUNICATION SYSTEM, PRODUCT LIFECYCLE, DEVICE MANAGEMENT -- IoT System Architecture: Edge, Cloud, and Fog -- Networking -- WIRELESS COMMUNICATION PROTOCOLS -- Short-Range Wireless Protocols -- Long-Range Wireless Protocols -- EXAMPLES -- Smart Video Doorbell -- Energy-Efficient Office -- IoT SYSTEMS LIFECYCLE -- Chapter 6 The Process of Building a Data Product -- WHAT PERSONAS DO YOU NEED ON YOUR TEAM? -- BUSINESS UNDERSTANDING -- DATA UNDERSTANDING -- DATA PREPARATION -- MODELING -- EVALUATION -- DEPLOYMENT -- THE CYCLE REPEATS - CRISP-DM -- Chapter 7 Concluding Remarks -- Further Reading -- Index -- EULA.IoT Skills in Practice Ser.Internet of thingsProduct designNew productsInternet of things.Product design.New products.004.67/8Fattahi Ahmad1323087MiAaPQMiAaPQMiAaPQBOOK9910643745303321IoT product design and development3035363UNINA