Author: Mohiuddin Ahmed
Publisher: CRC Press
ISBN: 1000427315
Category : Computers
Languages : en
Pages : 305
Book Description
The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. This increased connectivity and the devices used for edge computing will create more room for cyber criminals to exploit the system’s vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse-use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked when they are most needed to fight cyber crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of the network. In this context, this book addresses the cyber security challenges associated with edge computing, which provides a bigger picture of the concepts, techniques, applications, and open research directions in this area. In addition, the book serves as a single source of reference for acquiring the knowledge on the technology, process and people involved in next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.
Secure Edge Computing
Fog/Edge Computing For Security, Privacy, and Applications
Author: Wei Chang
Publisher: Springer Nature
ISBN: 3030573281
Category : Computers
Languages : en
Pages : 417
Book Description
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.
Publisher: Springer Nature
ISBN: 3030573281
Category : Computers
Languages : en
Pages : 417
Book Description
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.
IoT and Edge Computing for Architects
Author: Perry Lea
Publisher: Packt Publishing Ltd
ISBN: 1839218878
Category : Computers
Languages : en
Pages : 633
Book Description
Learn to design, implement, and secure your IoT infrastructure. Revised and expanded for edge computing. Key FeaturesBuild a complete IoT system that's the best fit for your organizationLearn about different concepts, tech, and trade-offs in the IoT architectural stackUnderstand the theory and implementation of each element that comprises IoT designBook Description Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. An architectural guide is needed if you want to traverse the spectrum of technologies needed to build a successful IoT system, whether that's a single device or millions of IoT devices. IoT and Edge Computing for Architects, Second Edition encompasses the entire spectrum of IoT solutions, from IoT sensors to the cloud. It examines modern sensor systems, focusing on their power and functionality. It also looks at communication theory, paying close attention to near-range PAN, including the new Bluetooth® 5.0 specification and mesh networks. Then, the book explores IP-based communication in LAN and WAN, including 802.11ah, 5G LTE cellular, Sigfox, and LoRaWAN. It also explains edge computing, routing and gateways, and their role in fog computing, as well as the messaging protocols of MQTT 5.0 and CoAP. With the data now in internet form, you'll get an understanding of cloud and fog architectures, including the OpenFog standards. The book wraps up the analytics portion with the application of statistical analysis, complex event processing, and deep learning models. The book then concludes by providing a holistic view of IoT security, cryptography, and shell security in addition to software-defined perimeters and blockchains. What you will learnUnderstand the role and scope of architecting a successful IoT deploymentScan the landscape of IoT technologies, from sensors to the cloud and moreSee the trade-offs in choices of protocols and communications in IoT deploymentsBecome familiar with the terminology needed to work in the IoT spaceBroaden your skills in the multiple engineering domains necessary for the IoT architectImplement best practices to ensure reliability, scalability, and security in your IoT infrastructureWho this book is for This book is for architects, system designers, technologists, and technology managers who want to understand the IoT ecosphere, technologies, and trade-offs, and develop a 50,000-foot view of IoT architecture. An understanding of the architectural side of IoT is necessary.
Publisher: Packt Publishing Ltd
ISBN: 1839218878
Category : Computers
Languages : en
Pages : 633
Book Description
Learn to design, implement, and secure your IoT infrastructure. Revised and expanded for edge computing. Key FeaturesBuild a complete IoT system that's the best fit for your organizationLearn about different concepts, tech, and trade-offs in the IoT architectural stackUnderstand the theory and implementation of each element that comprises IoT designBook Description Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. An architectural guide is needed if you want to traverse the spectrum of technologies needed to build a successful IoT system, whether that's a single device or millions of IoT devices. IoT and Edge Computing for Architects, Second Edition encompasses the entire spectrum of IoT solutions, from IoT sensors to the cloud. It examines modern sensor systems, focusing on their power and functionality. It also looks at communication theory, paying close attention to near-range PAN, including the new Bluetooth® 5.0 specification and mesh networks. Then, the book explores IP-based communication in LAN and WAN, including 802.11ah, 5G LTE cellular, Sigfox, and LoRaWAN. It also explains edge computing, routing and gateways, and their role in fog computing, as well as the messaging protocols of MQTT 5.0 and CoAP. With the data now in internet form, you'll get an understanding of cloud and fog architectures, including the OpenFog standards. The book wraps up the analytics portion with the application of statistical analysis, complex event processing, and deep learning models. The book then concludes by providing a holistic view of IoT security, cryptography, and shell security in addition to software-defined perimeters and blockchains. What you will learnUnderstand the role and scope of architecting a successful IoT deploymentScan the landscape of IoT technologies, from sensors to the cloud and moreSee the trade-offs in choices of protocols and communications in IoT deploymentsBecome familiar with the terminology needed to work in the IoT spaceBroaden your skills in the multiple engineering domains necessary for the IoT architectImplement best practices to ensure reliability, scalability, and security in your IoT infrastructureWho this book is for This book is for architects, system designers, technologists, and technology managers who want to understand the IoT ecosphere, technologies, and trade-offs, and develop a 50,000-foot view of IoT architecture. An understanding of the architectural side of IoT is necessary.
Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications
Author: Deepak Gupta
Publisher: John Wiley & Sons
ISBN: 1119670071
Category : Technology & Engineering
Languages : en
Pages : 464
Book Description
A practical guide to the design, implementation, evaluation, and deployment of emerging technologies for intelligent IoT applications With the rapid development in artificially intelligent and hybrid technologies, IoT, edge, fog-driven, and pervasive computing techniques are becoming important parts of our daily lives. This book focuses on recent advances, roles, and benefits of these technologies, describing the latest intelligent systems from a practical point of view. Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications is also valuable for engineers and professionals trying to solve practical, economic, or technical problems. With a uniquely practical approach spanning multiple fields of interest, contributors cover theory, applications, and design methodologies for intelligent systems. These technologies are rapidly transforming engineering, industry, and agriculture by enabling real-time processing of data via computational, resource-oriented metaheuristics and machine learning algorithms. As edge/fog computing and associated technologies are implemented far and wide, we are now able to solve previously intractable problems. With chapters contributed by experts in the field, this book: Describes Machine Learning frameworks and algorithms for edge, fog, and pervasive computing Considers probabilistic storage systems and proven optimization techniques for intelligent IoT Covers 5G edge network slicing and virtual network systems that utilize new networking capacity Explores resource provisioning and bandwidth allocation for edge, fog, and pervasive mobile applications Presents emerging applications of intelligent IoT, including smart farming, factory automation, marketing automation, medical diagnosis, and more Researchers, graduate students, and practitioners working in the intelligent systems domain will appreciate this book’s practical orientation and comprehensive coverage. Intelligent IoT is revolutionizing every industry and field today, and Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications provides the background, orientation, and inspiration needed to begin.
Publisher: John Wiley & Sons
ISBN: 1119670071
Category : Technology & Engineering
Languages : en
Pages : 464
Book Description
A practical guide to the design, implementation, evaluation, and deployment of emerging technologies for intelligent IoT applications With the rapid development in artificially intelligent and hybrid technologies, IoT, edge, fog-driven, and pervasive computing techniques are becoming important parts of our daily lives. This book focuses on recent advances, roles, and benefits of these technologies, describing the latest intelligent systems from a practical point of view. Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications is also valuable for engineers and professionals trying to solve practical, economic, or technical problems. With a uniquely practical approach spanning multiple fields of interest, contributors cover theory, applications, and design methodologies for intelligent systems. These technologies are rapidly transforming engineering, industry, and agriculture by enabling real-time processing of data via computational, resource-oriented metaheuristics and machine learning algorithms. As edge/fog computing and associated technologies are implemented far and wide, we are now able to solve previously intractable problems. With chapters contributed by experts in the field, this book: Describes Machine Learning frameworks and algorithms for edge, fog, and pervasive computing Considers probabilistic storage systems and proven optimization techniques for intelligent IoT Covers 5G edge network slicing and virtual network systems that utilize new networking capacity Explores resource provisioning and bandwidth allocation for edge, fog, and pervasive mobile applications Presents emerging applications of intelligent IoT, including smart farming, factory automation, marketing automation, medical diagnosis, and more Researchers, graduate students, and practitioners working in the intelligent systems domain will appreciate this book’s practical orientation and comprehensive coverage. Intelligent IoT is revolutionizing every industry and field today, and Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications provides the background, orientation, and inspiration needed to begin.
Cases on Edge Computing and Analytics
Author: Ambika, Paranthaman
Publisher: IGI Global
ISBN: 1799848744
Category : Computers
Languages : en
Pages : 327
Book Description
Edge computing and analytics are fascinating the whole world of computing. Industry and business are keenly embracing this sound concept to develop customer-centric solutions by enhancing their operations, offerings, and outputs. There is a bevy of advancements in this domain that came with the arrival of IoT devices. The seamless convergence of microservices and serverless computing creates vast opportunities. With the help of IoT devices and these other developments, there has become a deep interest in business automation and additional improvisations in edge computing. With the steady growth of edge devices and applications of IoT fog/edge computing and analytics, there are also distinct challenges and threats. Research has been keenly focused on identifying and understanding these issues and shortcomings to bring viable solution approaches and algorithms. Cases on Edge Computing and Analytics describes the latest innovations, improvements, and transformations happening with edge devices and computing. It addresses the key concerns of the edge computing paradigm, how they are processed, and the various technologies and tools empowering edge computing and analytics. While highlighting topics within edge computing such as the key drivers for implementation, computing capabilities, security considerations, and use-cases, this book is ideal for IT industry professionals and project managers, computer scientists, computer engineers, and practitioners, stakeholders, researchers, academicians, and students looking for research on the latest trends and transitions in edge computing.
Publisher: IGI Global
ISBN: 1799848744
Category : Computers
Languages : en
Pages : 327
Book Description
Edge computing and analytics are fascinating the whole world of computing. Industry and business are keenly embracing this sound concept to develop customer-centric solutions by enhancing their operations, offerings, and outputs. There is a bevy of advancements in this domain that came with the arrival of IoT devices. The seamless convergence of microservices and serverless computing creates vast opportunities. With the help of IoT devices and these other developments, there has become a deep interest in business automation and additional improvisations in edge computing. With the steady growth of edge devices and applications of IoT fog/edge computing and analytics, there are also distinct challenges and threats. Research has been keenly focused on identifying and understanding these issues and shortcomings to bring viable solution approaches and algorithms. Cases on Edge Computing and Analytics describes the latest innovations, improvements, and transformations happening with edge devices and computing. It addresses the key concerns of the edge computing paradigm, how they are processed, and the various technologies and tools empowering edge computing and analytics. While highlighting topics within edge computing such as the key drivers for implementation, computing capabilities, security considerations, and use-cases, this book is ideal for IT industry professionals and project managers, computer scientists, computer engineers, and practitioners, stakeholders, researchers, academicians, and students looking for research on the latest trends and transitions in edge computing.
Secure Edge Computing for IoT
Author: Oluyemi James Odeyinka
Publisher: Orange Education Pvt Ltd
ISBN: 8197256292
Category : Computers
Languages : en
Pages : 417
Book Description
TAGLINE Securing the Future of IoT with Advanced Edge Computing Solutions KEY FEATURES ● Tailored security protocols for edge computing, ensuring comprehensive protection against cyber threats. ● Master strategies for deploying, monitoring, and securing edge devices to maintain a resilient IoT ecosystem. ● Gain valuable insights from real-world examples, guiding you through the implementation of secure edge computing solutions across diverse industries. DESCRIPTION Embark on a journey into the cutting-edge world of secure edge computing. In this meticulously crafted handbook, delve deep into the intricacies of this transformative technology that is reshaping the landscape of computing. From its fundamental principles to advanced applications, this book leaves no stone unturned in demystifying the complexities of secure edge computing. Explore the architecture that underpins this paradigm shift, unraveling how it seamlessly integrates cloud resources with local devices to enhance efficiency and reliability. Dive into the nuances of security in edge computing, understanding the unique challenges posed by distributed networks and diverse endpoints. Learn essential strategies for safeguarding data integrity, confidentiality, and availability in this dynamic environment, ensuring robust protection against emerging threats. Discover real-world case studies and best practices from industry experts, gaining invaluable insights into deploying and managing secure edge computing solutions across various domains. With clear explanations, practical examples, and actionable advice, Secure Edge Computing For IoT empowers you to harness the full potential of this transformative technology while fortifying your digital infrastructure against evolving security risks. Prepare to embark on a journey of innovation and resilience at the edge of tomorrow’s computing landscape. WHAT WILL YOU LEARN ● Understand routing protocols and communication strategies tailored for edge environments. ● Implement measures to fortify edge infrastructure against cyber threats and safeguard sensitive data. ● Leverage real-time insights for informed decision-making and innovation. ● Integrate ML algorithms to enhance edge capabilities and optimize operations. ● Ensure reliability, scalability, and compliance with industry standards. ● Gain practical insights into the development process, from design to deployment. ● Protect edge infrastructure with encryption, authentication, and intrusion detection. ● Adhere to regulations and best practices in edge computing to ensure regulatory compliance and data privacy. ● Understand the components and architecture that underpin edge computing ecosystems. ● Explore practical examples and use cases from various industries to illustrate best practices and challenges in implementing secure edge computing solutions. WHO IS THIS BOOK FOR? This book is tailored for a diverse audience of IT professionals seeking to deepen their understanding of secure edge computing. It is particularly beneficial for DevOps engineers, system administrators, cloud architects, IoT developers, data analysts, and cybersecurity specialists. TABLE OF CONTENTS 1. Introduction to IoT and Edge Computing 2. Edge Computing Fundamentals and Use Cases 3. Edge Networking and Routing Protocols 4. IoT and Edge Computing Security 5. Data Analytics and Machine Learning at Edge 6. Secure Edge Design and Development 7. Secure Edge Penetration Testing and Incident Management 8. Edge Computing Cybersecurity and Cryptography 9. Cloud Computing in the Context of Edge Computing 10. Secure Edge Development and Implementation Index
Publisher: Orange Education Pvt Ltd
ISBN: 8197256292
Category : Computers
Languages : en
Pages : 417
Book Description
TAGLINE Securing the Future of IoT with Advanced Edge Computing Solutions KEY FEATURES ● Tailored security protocols for edge computing, ensuring comprehensive protection against cyber threats. ● Master strategies for deploying, monitoring, and securing edge devices to maintain a resilient IoT ecosystem. ● Gain valuable insights from real-world examples, guiding you through the implementation of secure edge computing solutions across diverse industries. DESCRIPTION Embark on a journey into the cutting-edge world of secure edge computing. In this meticulously crafted handbook, delve deep into the intricacies of this transformative technology that is reshaping the landscape of computing. From its fundamental principles to advanced applications, this book leaves no stone unturned in demystifying the complexities of secure edge computing. Explore the architecture that underpins this paradigm shift, unraveling how it seamlessly integrates cloud resources with local devices to enhance efficiency and reliability. Dive into the nuances of security in edge computing, understanding the unique challenges posed by distributed networks and diverse endpoints. Learn essential strategies for safeguarding data integrity, confidentiality, and availability in this dynamic environment, ensuring robust protection against emerging threats. Discover real-world case studies and best practices from industry experts, gaining invaluable insights into deploying and managing secure edge computing solutions across various domains. With clear explanations, practical examples, and actionable advice, Secure Edge Computing For IoT empowers you to harness the full potential of this transformative technology while fortifying your digital infrastructure against evolving security risks. Prepare to embark on a journey of innovation and resilience at the edge of tomorrow’s computing landscape. WHAT WILL YOU LEARN ● Understand routing protocols and communication strategies tailored for edge environments. ● Implement measures to fortify edge infrastructure against cyber threats and safeguard sensitive data. ● Leverage real-time insights for informed decision-making and innovation. ● Integrate ML algorithms to enhance edge capabilities and optimize operations. ● Ensure reliability, scalability, and compliance with industry standards. ● Gain practical insights into the development process, from design to deployment. ● Protect edge infrastructure with encryption, authentication, and intrusion detection. ● Adhere to regulations and best practices in edge computing to ensure regulatory compliance and data privacy. ● Understand the components and architecture that underpin edge computing ecosystems. ● Explore practical examples and use cases from various industries to illustrate best practices and challenges in implementing secure edge computing solutions. WHO IS THIS BOOK FOR? This book is tailored for a diverse audience of IT professionals seeking to deepen their understanding of secure edge computing. It is particularly beneficial for DevOps engineers, system administrators, cloud architects, IoT developers, data analysts, and cybersecurity specialists. TABLE OF CONTENTS 1. Introduction to IoT and Edge Computing 2. Edge Computing Fundamentals and Use Cases 3. Edge Networking and Routing Protocols 4. IoT and Edge Computing Security 5. Data Analytics and Machine Learning at Edge 6. Secure Edge Design and Development 7. Secure Edge Penetration Testing and Incident Management 8. Edge Computing Cybersecurity and Cryptography 9. Cloud Computing in the Context of Edge Computing 10. Secure Edge Development and Implementation Index
The Internet of Things
Author: John Davies
Publisher: John Wiley & Sons
ISBN: 1119545269
Category : Technology & Engineering
Languages : en
Pages : 244
Book Description
Provides comprehensive coverage of the current state of IoT, focusing on data processing infrastructure and techniques Written by experts in the field, this book addresses the IoT technology stack, from connectivity through data platforms to end-user case studies, and considers the tradeoffs between business needs and data security and privacy throughout. There is a particular emphasis on data processing technologies that enable the extraction of actionable insights from data to inform improved decision making. These include artificial intelligence techniques such as stream processing, deep learning and knowledge graphs, as well as data interoperability and the key aspects of privacy, security and trust. Additional aspects covered include: creating and supporting IoT ecosystems; edge computing; data mining of sensor datasets; and crowd-sourcing, amongst others. The book also presents several sections featuring use cases across a range of application areas such as smart energy, transportation, smart factories, and more. The book concludes with a chapter on key considerations when deploying IoT technologies in the enterprise, followed by a brief review of future research directions and challenges. The Internet of Things: From Data to Insight Provides a comprehensive overview of the Internet of Things technology stack with focus on data driven aspects from data modelling and processing to presentation for decision making Explains how IoT technology is applied in practice and the benefits being delivered. Acquaints readers that are new to the area with concepts, components, technologies, and verticals related to and enabled by IoT Gives IoT specialists a deeper insight into data and decision-making aspects as well as novel technologies and application areas Analyzes and presents important emerging technologies for the IoT arena Shows how different objects and devices can be connected to decision making processes at various levels of abstraction The Internet of Things: From Data to Insight will appeal to a wide audience, including IT and network specialists seeking a broad and complete understanding of IoT, CIOs and CIO teams, researchers in IoT and related fields, final year undergraduates, graduate students, post-graduates, and IT and science media professionals.
Publisher: John Wiley & Sons
ISBN: 1119545269
Category : Technology & Engineering
Languages : en
Pages : 244
Book Description
Provides comprehensive coverage of the current state of IoT, focusing on data processing infrastructure and techniques Written by experts in the field, this book addresses the IoT technology stack, from connectivity through data platforms to end-user case studies, and considers the tradeoffs between business needs and data security and privacy throughout. There is a particular emphasis on data processing technologies that enable the extraction of actionable insights from data to inform improved decision making. These include artificial intelligence techniques such as stream processing, deep learning and knowledge graphs, as well as data interoperability and the key aspects of privacy, security and trust. Additional aspects covered include: creating and supporting IoT ecosystems; edge computing; data mining of sensor datasets; and crowd-sourcing, amongst others. The book also presents several sections featuring use cases across a range of application areas such as smart energy, transportation, smart factories, and more. The book concludes with a chapter on key considerations when deploying IoT technologies in the enterprise, followed by a brief review of future research directions and challenges. The Internet of Things: From Data to Insight Provides a comprehensive overview of the Internet of Things technology stack with focus on data driven aspects from data modelling and processing to presentation for decision making Explains how IoT technology is applied in practice and the benefits being delivered. Acquaints readers that are new to the area with concepts, components, technologies, and verticals related to and enabled by IoT Gives IoT specialists a deeper insight into data and decision-making aspects as well as novel technologies and application areas Analyzes and presents important emerging technologies for the IoT arena Shows how different objects and devices can be connected to decision making processes at various levels of abstraction The Internet of Things: From Data to Insight will appeal to a wide audience, including IT and network specialists seeking a broad and complete understanding of IoT, CIOs and CIO teams, researchers in IoT and related fields, final year undergraduates, graduate students, post-graduates, and IT and science media professionals.
Handbook of Research on Information and Records Management in the Fourth Industrial Revolution
Author: Chigwada, Josiline Phiri
Publisher: IGI Global
ISBN: 1799877426
Category : Language Arts & Disciplines
Languages : en
Pages : 407
Book Description
Information and records management has been an important part of society for establishing procedures to effectively manage information. As technology has increased in society, this essential function has been impacted as well. With the onset of technological tools brought upon by the fourth industrial revolution, technologies such as artificial intelligence, the internet of things, big data, and more have changed the face of information and records management. These technologies and tools have paved new ways for security, efficiency in timely processes, new ways to create and process records, and other beneficial traits. Along with these advancements come new contemporary issues, leading to the need for research on how exactly information records management is functioning in modern times, the technologies brought on by the fourth industrial revolution, and both the benefits and challenges to this transition. The Handbook of Research on Information and Records Management in the Fourth Industrial Revolution showcases contemporary issues and demonstrates the value of information and records management in the fourth industrial revolution. The book provides a summary of the key activities undertaken by information and records managers as they seek to make records and information management more visible in the modern knowledge-driven society. The chapters highlight innovation, the use of information and communication technology in information and records management, best practices, challenges encountered, and how they are overcome. The target audience of this book will be composed of professionals, librarians, archivists, lecturers, and researchers working in the field of library and information science, along with practitioners, academicians, and students interested in information and records management in the 21st century.
Publisher: IGI Global
ISBN: 1799877426
Category : Language Arts & Disciplines
Languages : en
Pages : 407
Book Description
Information and records management has been an important part of society for establishing procedures to effectively manage information. As technology has increased in society, this essential function has been impacted as well. With the onset of technological tools brought upon by the fourth industrial revolution, technologies such as artificial intelligence, the internet of things, big data, and more have changed the face of information and records management. These technologies and tools have paved new ways for security, efficiency in timely processes, new ways to create and process records, and other beneficial traits. Along with these advancements come new contemporary issues, leading to the need for research on how exactly information records management is functioning in modern times, the technologies brought on by the fourth industrial revolution, and both the benefits and challenges to this transition. The Handbook of Research on Information and Records Management in the Fourth Industrial Revolution showcases contemporary issues and demonstrates the value of information and records management in the fourth industrial revolution. The book provides a summary of the key activities undertaken by information and records managers as they seek to make records and information management more visible in the modern knowledge-driven society. The chapters highlight innovation, the use of information and communication technology in information and records management, best practices, challenges encountered, and how they are overcome. The target audience of this book will be composed of professionals, librarians, archivists, lecturers, and researchers working in the field of library and information science, along with practitioners, academicians, and students interested in information and records management in the 21st century.
Advances in Edge Computing: Massive Parallel Processing and Applications
Author: F. Xhafa
Publisher: IOS Press
ISBN: 1643680633
Category : Computers
Languages : en
Pages : 326
Book Description
The rapid advance of Internet of Things (IoT) technologies has resulted in the number of IoT-connected devices growing exponentially, with billions of connected devices worldwide. While this development brings with it great opportunities for many fields of science, engineering, business and everyday life, it also presents challenges such as an architectural bottleneck – with a very large number of IoT devices connected to a rather small number of servers in Cloud data centers – and the problem of data deluge. Edge computing aims to alleviate the computational burden of the IoT for the Cloud by pushing some of the computations and logics of processing from the Cloud to the Edge of the Internet. It is becoming commonplace to allocate tasks and applications such as data filtering, classification, semantic enrichment and data aggregation to this layer, but to prevent this new layer from itself becoming another bottleneck for the whole computing stack from IoT to the Cloud, the Edge computing layer needs to be capable of implementing massively parallel and distributed algorithms efficiently. This book, Advances in Edge Computing: Massive Parallel Processing and Applications, addresses these challenges in 11 chapters. Subjects covered include: Fog storage software architecture; IoT-based crowdsourcing; the industrial Internet of Things; privacy issues; smart home management in the Cloud and the Fog; and a cloud robotic solution to assist medical applications. Providing an overview of developments in the field, the book will be of interest to all those working with the Internet of Things and Edge computing.
Publisher: IOS Press
ISBN: 1643680633
Category : Computers
Languages : en
Pages : 326
Book Description
The rapid advance of Internet of Things (IoT) technologies has resulted in the number of IoT-connected devices growing exponentially, with billions of connected devices worldwide. While this development brings with it great opportunities for many fields of science, engineering, business and everyday life, it also presents challenges such as an architectural bottleneck – with a very large number of IoT devices connected to a rather small number of servers in Cloud data centers – and the problem of data deluge. Edge computing aims to alleviate the computational burden of the IoT for the Cloud by pushing some of the computations and logics of processing from the Cloud to the Edge of the Internet. It is becoming commonplace to allocate tasks and applications such as data filtering, classification, semantic enrichment and data aggregation to this layer, but to prevent this new layer from itself becoming another bottleneck for the whole computing stack from IoT to the Cloud, the Edge computing layer needs to be capable of implementing massively parallel and distributed algorithms efficiently. This book, Advances in Edge Computing: Massive Parallel Processing and Applications, addresses these challenges in 11 chapters. Subjects covered include: Fog storage software architecture; IoT-based crowdsourcing; the industrial Internet of Things; privacy issues; smart home management in the Cloud and the Fog; and a cloud robotic solution to assist medical applications. Providing an overview of developments in the field, the book will be of interest to all those working with the Internet of Things and Edge computing.
Internet of Things for Architects
Author: Perry Lea
Publisher: Packt Publishing Ltd
ISBN: 1788475747
Category : Computers
Languages : en
Pages : 514
Book Description
Learn to design, implement and secure your IoT infrastructure Key Features Build a complete IoT system that is the best fit for your organization Learn about different concepts, technologies, and tradeoffs in the IoT architectural stack Understand the theory, concepts, and implementation of each element that comprises IoT design—from sensors to the cloud Implement best practices to ensure the reliability, scalability, robust communication systems, security, and data analysis in your IoT infrastructure Book Description The Internet of Things (IoT) is the fastest growing technology market. Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. An architectural guide is necessary if you want to traverse the spectrum of technologies needed to build a successful IoT system, whether that's a single device or millions of devices. This book encompasses the entire spectrum of IoT solutions, from sensors to the cloud. We start by examining modern sensor systems and focus on their power and functionality. After that, we dive deep into communication theory, paying close attention to near-range PAN, including the new Bluetooth® 5.0 specification and mesh networks. Then, we explore IP-based communication in LAN and WAN, including 802.11ah, 5G LTE cellular, SigFox, and LoRaWAN. Next, we cover edge routing and gateways and their role in fog computing, as well as the messaging protocols of MQTT and CoAP. With the data now in internet form, you'll get an understanding of cloud and fog architectures, including the OpenFog standards. We wrap up the analytics portion of the book with the application of statistical analysis, complex event processing, and deep learning models. Finally, we conclude by providing a holistic view of the IoT security stack and the anatomical details of IoT exploits while countering them with software defined perimeters and blockchains. What you will learn Understand the role and scope of architecting a successful IoT deployment, from sensors to the cloud Scan the landscape of IoT technologies that span everything from sensors to the cloud and everything in between See the trade-offs in choices of protocols and communications in IoT deployments Build a repertoire of skills and the vernacular necessary to work in the IoT space Broaden your skills in multiple engineering domains necessary for the IoT architect Who this book is for This book is for architects, system designers, technologists, and technology managers who want to understand the IoT ecosphere, various technologies, and tradeoffs and develop a 50,000-foot view of IoT architecture.
Publisher: Packt Publishing Ltd
ISBN: 1788475747
Category : Computers
Languages : en
Pages : 514
Book Description
Learn to design, implement and secure your IoT infrastructure Key Features Build a complete IoT system that is the best fit for your organization Learn about different concepts, technologies, and tradeoffs in the IoT architectural stack Understand the theory, concepts, and implementation of each element that comprises IoT design—from sensors to the cloud Implement best practices to ensure the reliability, scalability, robust communication systems, security, and data analysis in your IoT infrastructure Book Description The Internet of Things (IoT) is the fastest growing technology market. Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. An architectural guide is necessary if you want to traverse the spectrum of technologies needed to build a successful IoT system, whether that's a single device or millions of devices. This book encompasses the entire spectrum of IoT solutions, from sensors to the cloud. We start by examining modern sensor systems and focus on their power and functionality. After that, we dive deep into communication theory, paying close attention to near-range PAN, including the new Bluetooth® 5.0 specification and mesh networks. Then, we explore IP-based communication in LAN and WAN, including 802.11ah, 5G LTE cellular, SigFox, and LoRaWAN. Next, we cover edge routing and gateways and their role in fog computing, as well as the messaging protocols of MQTT and CoAP. With the data now in internet form, you'll get an understanding of cloud and fog architectures, including the OpenFog standards. We wrap up the analytics portion of the book with the application of statistical analysis, complex event processing, and deep learning models. Finally, we conclude by providing a holistic view of the IoT security stack and the anatomical details of IoT exploits while countering them with software defined perimeters and blockchains. What you will learn Understand the role and scope of architecting a successful IoT deployment, from sensors to the cloud Scan the landscape of IoT technologies that span everything from sensors to the cloud and everything in between See the trade-offs in choices of protocols and communications in IoT deployments Build a repertoire of skills and the vernacular necessary to work in the IoT space Broaden your skills in multiple engineering domains necessary for the IoT architect Who this book is for This book is for architects, system designers, technologists, and technology managers who want to understand the IoT ecosphere, various technologies, and tradeoffs and develop a 50,000-foot view of IoT architecture.