What are Industrial Robots And Virtual Monitoring

What Are Industrial Robots 

One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT) and industrial robots. According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies”. Based on this definition, IOT refers to networkable things. Things can be Physical things which exist in the physical world (e.g. sensors of surrounding environments, industrial robots, goods, and electrical equipment), or Virtual things which exist in the information world (e.g. multimedia contents, application software and service representations of physical things). They are able to be integrated into communication networks and can offer services to various kinds of applications such as intelligent transportation systems, e-health, and smart environmental monitoring.

According to Lee et al. (2013), the Internet of things will include: “ubiquitous connectivity allowing for whenever, whoever, wherever, and whatever types of communications; a pervasive reality for effective interfaces to provide connectable real world environments; and ambient intelligence allowing for innovative communications and providing increased value creation”. The vision of the IOT suggests that devices can communicate with other devices through a worldwide network with or without the involvement of human. Humans can also communicate with a device in order to get or transfer specific information. In this way, everything from individuals, groups, communities, objects, products, data, services, and processes will be connected by the IOT. It is estimated that approximately 50 billion things will be connected to each other through the communication network by 2020. A massive set of data will be created. It would seem that management of the data generated and its interpretation for application purposes are important issues that should be considered.

Connected Communities

The IOT will create new services based on real-time physical world data and will transform businesses, industries, and the daily life of people. Smart cities (connected communities), smart planet (green environment), smart building (building, smart homes), smart industry (industrial environment), smart energy (electric grid), smart transport (intelligent transport system), smart living (entertainment, leisure), smart health (health care system) are examples of the Internet of things.

The major characteristics of the IOT are: interconnectivity of physical and virtual things; ability of providing thing-related services within the constraints of things; heterogeneity of IOT devices; dynamic changes of devices, and enormous scale. Various technologies such as M2M, microcontrollers, wireless communication, RFID, energy harvesting technologies, location technology, and various software will contribute to the development of the IOT.

Many scholars believe that security, privacy, and trust are important issues and should be considered as fundamental design parameters of sensor systems. In a world where everything is connected by the internet, confidentiality, authenticity, and integrity of data and services are critical particularly for public services, enterprises, and citizens. Furthermore, privacy protection of data during transmission, aggregation, storage, mining and processing is important. Therefore, dynamic trust models need to be designed to provide security and privacy features.

By Mojgan Afshari

Episode 16: Bigger is not always better: the benefits of working with smaller cloud providers
The benefits of working with smaller cloud providers A conversation with Ryan Pollock, VP Product Marketing and Developer Relationships for Vultr.com - Everyone knows who the big players are in the cloud business. But sometimes, ...
Gary Bernstein
Using Data to Gain Advantages Data collection is now omnipresent in every sector of the global economy. Several aspects of modern economic activity would not be possible without it, just as it would not be ...
Matrix
When sci-fi films like Tom Cruise’s Oblivion depict humans living in the clouds, we imagine that humanity might one day leave our primitive dwellings attached to the ground and ascend to floating castles in the ...
Derrek Schutman
Implementing Digital Capabilities Successfully Building robust digital capabilities can deliver huge benefits to Digital Service Providers (DSPs). A recent TMForum survey shows that building digital capabilities (including digitization of customer experience and operations), is the ...
Gilad David Maayan
Cloud Security Posture Management Cloud Security Posture Management (CSPM) enables you to secure cloud data and resources. You can integrate CSPM into your development process, to ensure continuous visibility. CSPM is particularly beneficial for DevOps ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.