ECOM 500 SEU Mod 4 Computer Science the Internet of Things Report

User Generated

jny_2_fny

Computer Science

ECOM 500

Saudi electronic university

ECOM

Description

Conduct research and write a paper on either collaborative technologies or the Internet of Things. In your paper, address the following:

  • Briefly define the technologies you chose (collaborative technologies or IoT technologies).
  • How and why are organizations using these technologies? Provide one real-world example.
  • What are the benefits these technologies provide to organizations? Are there any cost savings organizations might realize by utilizing such technologies? Explain.
  • How do these technologies benefit internal and/or external users?
  • What are some challenges or potential problems of using such technologies? Do the benefits outweigh these concerns? Explain.


Unformatted Attachment Preview

1 Module 4: Networks, Collaborative Technology, and the Internet of Things 1. Network Fundamentals Applied to Business Networks A network is useful for businesses in that it allows users to easily share data. A user can be in a remote office on one side of the globe and access data that is on the other side of the globe. This is brought about by data communications, which uses software and hardware to exchange data between a sender and receiver (Bidgoli, 2018). A business manager must understand networks and related technology in order to make effective decisions on the technologies in which the organization will invest. Let us start with some of the basics. There are many types of networks; here are two of the most common: • • Local Area Network (LAN—)A network in which computers and shared devices are within close proximity, such as the same building or campus. Wide Area Network (WAN—)A network in which computers and shared devices are geographically dispersed, such as in a different city or country. A network topology is the “lay of the LAN.” Click on the following to learn about some common topologies: Bus: The bus topology employs one cable with all of the computers (called nodes) connected by a smaller coaxial plug. The upside of this topology is that it is relatively cheap and easy to implement and does not require much cabling. The downside is that if the single cable breaks, then the whole network goes down. As more devices are connected, the speed of the network tends to slow down. Ring: The ring topology is a cable going from each computer to the other. The advantage of this topology is that data flows in one direction, which allows for a rapid transfer of data. The downside is that if the cable or a connected device fails, the entire network fails. It is more difficult to implement than a bus network, and it is harder to troubleshoot when there are problems. Star: The star is the most commonly used topology. In a star, there is a single cable going from each connected device to a center device called a hub (or switch). Reliability is a major advantage of this topology—if a cable or device fails, the rest of the network is not impacted. It is also easier to troubleshoot than the other topologies. Finally, it is scalable 2 and can also include wireless connections in the configuration. The disadvantage to this topology is that if the hub or switch fails, the entire network will go down. It is also more expensive to implement, requiring more cable and hardware. Decisions on topologies, then, can focus on different aspects such as cost, ease of implementation, reliability, and speed. Business managers must analyze the various needs of the business to determine which topology makes the most sense. They must do the same thing with regard to which network technologies and network components they should invest in. Turban, Pollard, and Wood (2018) noted that such investment decisions can impact multiple areas of the business, including security, productivity, and user experiences. 2. Protocols, Interfaces, and Network Capabilities A key part of the data exchange in any network is the use of a protocol. Protocols are “rules that govern data communication, including error detection, message length, and transmission speed” (Bidgoli, 2018, p. 121). Think of data communication as a speaking language. Just as there are rules to follow when speaking a language, there are also rules associated with network communication. Otherwise, communication between the sender and receiver would never occur. The most common protocol in use today is the Internet Protocol, better known as IP. An IP address is a unique number (the “address”) for each device communicating with a network or the Internet. IP is combined with the Transmission Control Protocol (TCP) to form TCP/IP. Every device connected to the internet uses TCP/IP, which allows for global communication and data sharing. TCP/IP is actually a suite of protocols. Some common ones you may have heard of are FTP, HTTP, or ICMP (for the PING command). The PING command is used to troubleshoot networks for connectivity and is a commonly used term in IT. On a broad level, the network components can be divided into software and hardware. As we have learned, we need both software and hardware in order for a computer system to work. In terms of network hardware, the main elements are routers, switches, and hubs. A hub is a hardware device to which all of the computer devices (anything with an IP address) are interconnected. It is the centerpiece in the star topology. Just as the hubcap on a car tire is the center of a tire, a network hub is the center of the network. A switch acts like a hub but is “smart.” When communicating with a hub, a sender will “ask” all devices if this is the destination address it needs. If there are ten devices connected, potentially all ten devices will be asked, which is inefficient. A switch uses a lookup table (much like an index in a database) to locate the destination device quickly. The business impact is that a switch is more cost effective than a hub in the long-run, as it increases network throughput—in other words, it 3 increases the rate at which communications are successfully delivered to the receiver. A router is a hardware device that uses routing protocols to determine the best way (or route) for the sender’s data to reach the destination. Common routing protocols are routing information protocol (RIP) and open shortest path first (OSPF). From a business perspective, it is important to understand protocol efficiency. For example, OSPF is more efficient for larger networks while RIP is more efficient for smaller ones. When you connect to the internet, not only are you using the Internet Protocol (IP), you are also using another underlying hardware protocol, called Ethernet. IP needs Ethernet to work. If you have ever heard of a “hardware address” or “MAC address”, then Ethernet is in use. Ethernet is used in both wired and wireless networks. 3. Mobile Networks In order for devices to communicate, there must be something to carry the signal. Wired technologies use an Ethernet cable to connect to one another. In the case of the star topology, an Ethernet cable would go from the computer to the hub or switch. Then, the hub or switch would connect to a router. In a wired technology, the connection between the computer and the hub/switch is dedicated. Although connection via a wired network is generally fast, it is not mobile. Wireless or wireless fidelity (Wi-Fi for short) networks allow for connections from almost anywhere to an access point. If connecting to a star topology network, for example, an antenna would be used to actually send the signal through the air rather than over a cable. Companies are finding that mobility can greatly increase the efficiency and productivity of their employees (Elliot, Scornavacca, & Barnes, 2015). Smartphones, for example, allow employees to connect and communicate at any time. Wireless computers allow them to work when they are out of the office, whether on the road or at home. This has also allowed many employees to work remotely all or part of the time. Advancements in technology such as Bluetooth, GPS, 4G, and 5G have helped propel mobilization globally (Editor, n.d.). 5G technology implementation is increasing globally and promises to “dramatically increase the speed at which data is transferred across the network” (Turban et al., 2018, p. 110). The following video will help you better understand the up-and-coming 5G technology. https://www.youtube.com/watch?v=wN5Mn5Zfgbo 4 The next generation of wireless networks—5G—promises to deliver faster data speed and more reliable service. This video shows the results from a survey given to investors and analysts on the scale of 5G and IoT opportunity. 5G networks will help manage the increasing demands on wireless networks. There are downsides to wireless that must also be considered. Costs, technical issues, and security risks have been factors restricting implementation (Elliot et al., 2015). While wireless fosters mobility, the connection is generally slower since the bandwidth is shared. In addition, data traveling through the air can be vulnerable to interception mid-transmission. There is significant risk when connecting to free, public Wi-Fi. Businesses should have rules in place for employees using such connections. 4. Collaborative Technologies and the Internet of Things (IoT) The original Internet (or Web 1.0) is evolving. With Web 2.0, the trend is toward a more interactive, collaborative experience for the user (Bidgoli, 2018). We see that with the rise in popularity of social media sites like Facebook and Twitter. Web 3.0 is the latest trend, with users and computers interacting with the Internet using artificial intelligence (AI). Instead of users having to search through web sites, for example, AI software will help with this tedious task (Bidgoli, 2018). Note that these different technologies use the same Internet, with some web servers and applications using Web 1.0 technologies, others using Web 2.0 technologies, and still others using Web 3.0 technologies. View the following video on collaboration tools and the emerging technology of AI: https://www.youtube.com/watch?v=rcZl_vHyEkg&feature=emb_logo This video analyzes the benefits of adding AI to collaboration tools by specifically looking at a specific platform called RUUM by SAP. Let us explore some Web 2.0 collaborative technologies and their possible business uses; click on each: Blog: The term blog is short for binary log or Weblog (Bidgoli, 2018). A blog is a journal of one’s thoughts and opinions. Companies use blogs as a way of engaging with customers, creating communities for them, and encouraging conversation around a company and its products or services (Dobele, Steel, & Cooper, 2015). They can also be used to improve search engine results and drive more customers to a company’s web site. 5 Wiki: The term wiki means fast in Hawaiian. A wiki is a web page where the content can be created and modified by many users—quickly. They provide an easy-to-use tool for creating, sharing, and integrating information within an organization. Crowdsourcing: Crowdsourcing is a collaboration technique that organizations can use to collaborate with online communities to solve problems, using the collective creativity, actions, and ideas of large groups (Vreede, Antunes, Vassileva, Gerosa, & Wu, 2016). Some businesses involve customers to gain their insight and use them as co-creators as a way to address “fastchanging user needs, shorter product life cycles, and an increasingly competitive climate” (Kohler, 2015, p. 65). Others might invite specific groups to address a business need. For example, a mortgage lender invited ten technology firms to compete in a crowdsource challenge to create a new mobile loan operating system for its loan officers (PR Newswire, 2018). Companies can adopt one or more of these technologies to better compete in the on-demand economy. For example, a company could use social media and blogs to connect with consumers and conduct surveys, and a wiki to assist in a collaborative project involving geographically dispersed employees. As discussed in an earlier module, the Internet of Everything (IoE) is a development effort in which everyone is interconnected via various devices using different connection types. The Internet of Things (IoT) is a subset of IoE in which physical objects (the “things”) are connected via the Internet. There are a multitude of business uses for IoE and IoT. IoT devices can collect valuable data to help businesses improve business processes. These could be smart sensors alerting municipal officials to leaking pipes in a city’s water system, for example, helping the city to reduce water loss (Bidgoli, 2018). IoT devices can also improve supply chain management, automating processes and providing valuable data to decision-makers as a company’s products move through the supply chain to the customers. View the following video on IoT and Industrial IoT: https://www.youtube.com/watch?v=6MN0xRJ3yzE&feature=emb_logo This video explores the world of IoT with some time spent comparing and contrasting IoT to IIoT. References Bidgoli, H. (2018). MIS8. Boston, MA: Cengage Learning Inc. 6 Dobele, A., Steel, M., & Cooper, T. (2015). Sailing the seven C 's of blog marketing: Understanding social media and business impact. Marketing Intelligence & Planning, 33(7), 1087-1102. Editor. (n.d.). How wireless technology is benefiting industry? Retrieved from https://www.digitaledge.org/how-wireless-technology-is-benefiting-industry/ Elliott, L., Scornavacca, E., & Barnes, S. J. (2015). Wireless technologies in New Zealand businesses: A longitudinal assessment. The Journal of Computer Information Systems, 55(3), 65-71. Kohler, T. (2015). Crowdsourcing-based business models: How to create and capture value. California Management Review, 57(4), 63-84. Turban, E., Pollard, C., & Wood, G. (2018). Information technology for management: On- demand strategies for performance, growth, and sustainability (11th ed.). Hoboken, NJ: John Wiley & Sons, Inc. Vreede, G., Antunes, P., Vassileva, J., Gerosa, M. A., & Wu, K. (2016). Collaboration technology in teams and organizations: Introduction to the special issue. Information Systems Frontiers, 18(1), 1-6. SEU ECOM500 Critical Thinking Writing Rubric - Module 4 Exceeds Expectation Content, Research, and Analysis 21-25 Points Requirements Includes all of the required components, as specified in the assignment. 21-25 Points Content Demonstrates substantial and extensive knowledge of the materials, with no errors or major omissions. 25-30 Points Analysis Provides strong thought, insight, and analysis of concepts and applications. 13-15 Points Sources Sources go above and beyond required criteria and are well chosen to provide effective substance and perspectives on the issue under examination. Mechanics and Writing 5 Points Demonstrates Project is clearly college-level organized, well proficiency in written, and in organization, proper format as grammar and outlined in the style. assignment. Strong sentence and paragraph structure, contains no errors in grammar, spelling, Meets Expectation Below Expectation 16-20 Points Includes most of the required components, as specified in the assignment. 16-20 Points Demonstrates adequate knowledge of the materials; may include some minor errors or omissions. 19-24 Points Provides adequate thought, insight, and analysis of concepts and applications. 10-12 Points Sources meet required criteria and are adequately chosen to provide substance and perspectives on the issue under examination. 11-15 Points Includes some of the required components, as specified in the assignment. 11-15 Points Demonstrates fair knowledge of the materials and/or includes some major errors or omissions. 4 Points Project is fairly well organized and written and is in proper format as outlined in the assignment. Reasonably good sentence and paragraph structure, may include a few 3 Points Project is poorly organized and written and may not follow proper format as outlined in the assignment. Inconsistent to inadequate sentence and paragraph development, 13-18 Points Provides poor though, insight, and analysis of concepts and applications. 7-9 Points Sources meet required criteria but are poorly chosen to provide substance and perspectives on the issue under examination. Limited Evidence 6-10 Points Includes few of the required components, as specified in the assignment. 6-10 Points Fails to demonstrate knowledge of the materials and/or includes many major errors or omissions. 7-12 Points Provides little or no thought, insight, and analysis of concepts and applications. 4-6 Points Source selection and integration of knowledge from the course is clearly deficient. 1-2 Points Project is not organized or well written and is not in proper format as outlined in the assignment. Poor quality work; unacceptable in terms of grammar, spelling, APA style, SEU ECOM500 Critical Thinking Writing Rubric - Module 4 APA style, or APA citations and references. Total points possible = 100 minor errors in grammar, spelling, APA style, or APA citations and references. and/or includes numerous or major errors in grammar, spelling, APA style or APA citations and references. and APA citations and references. IT for Management: On-Demand Strategies for Performance, Growth, and Sustainability Eleventh Edition Turban, Pollard, Wood Chapter 4 Networks, Collaborative Technology, and The Internet of Things Learning Objectives (1 of 4) Copyright ©2018 John Wiley & Sons, Inc. 2 Network Fundamentals Defined • A computer network is a set of computers connected together for the purpose of sharing recourses. Copyright ©2018 John Wiley & Sons, Inc. 3 Common Network Types Acronym Type Characteristics Example LAN Local Area Network Short distance connection Office School Home WAN Wide Area Network Spans large physical distance Internet Large company WLAN Wireless LAN LAN based on Wi-Fi technology Internet Large company Copyright ©2018 John Wiley & Sons, Inc. 4 Intranets, Extranets, and Virtual Private Networks • Intranets are used within a company for data access, sharing, and collaboration. • Extranets are private, company-owned networks that can be logged into remotely via the Internet. • Virtual Private Networks (VPNs) are used where security of transmissions is a concern, because they encrypt the packets before they are transferred over the network. Copyright ©2018 John Wiley & Sons, Inc. 5 Virtual Private Networks A virtual tunnel routed through the Internet with software and hardware encryption. Copyright ©2018 John Wiley & Sons, Inc. 6 Network Terminology • Modem: a device that modulates/demodulates signal for transportation • Modulation and Coding: Techniques used by modem to adapt the signal to the media • Signal: Binary information we want to send. • Signal Frequency Spectrum: All the frequency components of a signal • Media Bandwidth: Limit in range of frequency signals • Capacity Bandwidth: Maximum bits per second that can be transmitted Copyright ©2018 John Wiley & Sons, Inc. 7 Figure 4.4 Basic functions of business networks Copyright ©2018 John Wiley & Sons, Inc. 8 Quality of Service (QoS) • Latent-sensitivity: data such as real-time voice and high-quality video. • Prioritized Traffic: data and apps that are time-delaysensitive or latency-sensitive apps. • Throttle Traffic: gives latency-sensitive apps priority, other types of traffic need to be held back (throttled). • Traffic Shaping: the ability to prioritize and throttle network traffic. Copyright ©2018 John Wiley & Sons, Inc. 9 The Net Neutrality Debate • Net neutrality is the principle that Internet Service Providers (ISPs) and their regulators treat all Internet traffic the same way. • Traffic shaping prioritizes the flow of traffic by delaying the flow of less important network traffic. • In 2010, the FCC ruled in favor of “net semi-neutrality”, not explicitly forbidding paid prioritization. • The FCC under the current administration may take further steps to roll back net neutrality rulings, which could favor the cable companies over consumers. Copyright ©2018 John Wiley & Sons, Inc. 10 Network Fundamentals 1. 2. 3. 4. 5. 6. 7. Name different types of networks. What is meant by “bandwidth”? What is the difference between an intranet and an extranet? How does a virtual private network (VPN) provide security? What is the purpose of a modem? Describe the basic functions of business networks. How do investments in network infrastructure impact an organization? 8. Name the two tiers of traffic to which Quality-of-Service is applied. Copyright ©2018 John Wiley & Sons, Inc. 11 Learning Objectives (2 of 4) Copyright ©2018 John Wiley & Sons, Inc. 12 Internet Protocols, APIs, and Network Capabilities • Internet Protocol (IP) is the basic technology that makes global communication possible. Each devise attached to a network has a unique IP address that enables it to send and receive files made up of packets. Copyright ©2018 John Wiley & Sons, Inc. 13 IP Addresses and Packets Figure 4.5: IPv4 addresses have four groups of four alphanumeric characters, which allows for 232 or roughly 4.3 billion unique IP address. IPv6 addresses have eight groups of alphanumeric characters, which allows for 2128 , or 340 trillion, trillion addresses. IPv6 offers also enhanced quality of service that is needed by the latest in video, interactive games, and e-commerce. Copyright ©2018 John Wiley & Sons, Inc. 14 Broadband Technology: 3G/4G/5G • 3G networks support multimedia and broadband services over a wider distance and at faster speeds than prior generation networks. They use large satellite connections to telecommunication towers. • 4G networks are digital, or IP, networks that enable even faster data transfer rates. 4G delivers average realistic download rates of 3 Mbps or higher (as opposed to theoretical rates, which are higher). • 5G networks, the coming generation of broadband technology. 5G will dramatically increase the speed at which data is transferred across the network. Copyright ©2018 John Wiley & Sons, Inc. 15 Network Technology Standards • WiMAX IEEE 802.16 o 30-mile range o 70 Megabits per second (Mbps) o Line-of-site not required o Same principles as Wi-Fi (using radio signals) o • Long-Term Evolution (LTE) o o GSM deployed by Verizon, AT&T, and T-Mobile 100 Mbps downlink, 50 Mbps uplink Copyright ©2018 John Wiley & Sons, Inc. 16 Circuit vs. Packet Switching • Circuit switching o o Older technology that originated with telephone calls Inefficient for digital transmission • Packet Switching o o o Transfers data or voice Files are broken into packets, numbered sequentially, routed individually to their destinations When received at the destination, the packets are reassembled into their proper sequences Copyright ©2018 John Wiley & Sons, Inc. 17 Application Programming Interfaces and Operating Systems • Application Program Interface (API) consists of a set of functions, commands, and protocols used by programmers for OS-interactivity without having to write a program from scratch. • Can be automated for simplified usability o o o Twitter Facebook Amazon Copyright ©2018 John Wiley & Sons, Inc. 18 Figure 4.7 API value chain in business. Copyright ©2018 John Wiley & Sons, Inc. 19 Internet Protocols (IP), APIs, and Network Capabilities 1. 2. 3. 4. 5. 6. 7. Why has IPv6 become increasingly important? What is the difference between IPv4 and IPv6? What is the purpose of an IP address? What are the benefits of using an API? What is the difference between 4G and 5G? What is the most current network standard? What benefits will the upcoming 5G network standard offer businesses? 8. What is the difference between circuit switching and packet switching? Copyright ©2018 John Wiley & Sons, Inc. 20 Learning Objectives (3 of 4) Copyright ©2018 John Wiley & Sons, Inc. 21 Figure 4.8 Four drivers of global mobile traffic through 2020 Copyright ©2018 John Wiley & Sons, Inc. 22 Mobile Data Traffic Milestone by 2020 Copyright ©2018 John Wiley & Sons, Inc. 23 Wireless Networks and Mobile Infrastructure • Mobile Networks Bluetooth: short-range wireless communication technology allowing device pairing o Wi-Fi: standard way to wirelessly connect computing devices through routers commonly connected to the Internet o WiMax: transmits voice, data, and video over high-frequency radio signals designed as alternative to cable and DSL o Copyright ©2018 John Wiley & Sons, Inc. 24 Data Networks, IP Addresses, and APIs: A mashup of GPS and Bluetooth • General term referring to the integration of two or more technologies such as Bluetooth and Wi-Fi o o o o Provide intelligence Inter-Automobile collision avoidance Sudden braking Can automatically call emergency services Copyright ©2018 John Wiley & Sons, Inc. 25 Data Networks, IP Addresses, and APIs: Near-Field Communication (NFC) • Enables two devices within close proximity to establish a communication channel and transfer data using radio waves • More secure than other wireless technologies • Examples: o o o Apple iWatch Digital tickets providing access to concerts Transmit public transport payment through phones Copyright ©2018 John Wiley & Sons, Inc. 26 Four Important Factors When Choosing a Mobile Network Copyright ©2018 John Wiley & Sons, Inc. 27 Mobile Networks 1. 2. 3. 4. 5. 6. What factors are contributing to mobility? Why is mobile global traffic increasing? What accounts for the increase in mobile traffic? Give some examples of VoIP networks. How is NFC different from RFID? What are the two components of a wireless network infrastructure? 7. What is Near Field Communication and how is it used in business? 8. What factors should be considered when evaluating a mobile network? Copyright ©2018 John Wiley & Sons, Inc. 28 Learning Objectives (4 of 4) Copyright ©2018 John Wiley & Sons, Inc. 29 Collaborative Technologies: Virtual Collaboration--Benefits • Information sharing between retailers and suppliers (Example: Walmart and Proctor & Gamble) • Retailer-supplier collaboration (Example: Asda Corp.) • Lower transportation and inventory costs and reduced stockouts (Example: Unilever’s Transportation Business Center) • Reduction of product development time (Example: Caterpillar, Inc.) Copyright ©2018 John Wiley & Sons, Inc. 30 Collaborative Technologies: Group Work • Group Work and Dynamics can be quite complex • Group workers can be located in different places or work at different times • Group members may work for the same or different organizations • Data, information, or knowledge may be located in many sources that may be external to the organization Copyright ©2018 John Wiley & Sons, Inc. 31 Collaborative Technologies: Brainstorming in the Cloud • Companies are now using cloud-based online brainstorming applications • Avoids travel expenses if members are geographically dispersed • No restriction to number of sessions • Examples o o Evernote—features function to synchronize user’s notes iMindmap Online—relies on mind mapping and other structured approaches to help streamline work processes Copyright ©2018 John Wiley & Sons, Inc. 32 The Internet of Things (IoT) Internet of Things (IoT) is the network of physical objects or “things” embedded with electronics, software, sensors, and network connectivity, that enables these objects to collect and exchange data. • Objects we interact with send signals to and from each other, collecting data • IoT collects that data from millions of sensors embedded in everything from cars, to refrigerators, to space capsules • Half of U.S. manufacturers report they are currently using IoT technology to collect machine data (Industry Week study, 2016) • A smaller percentage (44%) are colleting data from sensors embedded in their products Copyright ©2018 John Wiley & Sons, Inc. 33 Advantages of IoT 1. Monitoring performance, quality, and reliability of products and services 2. Gaining insight into potential new products and service 3. Support sales 4. Better understand product use 5. Remote troubleshooting of products 6. Deliver revenue-generating post-sales services 7. More efficiently deliver post-sales services Copyright ©2018 John Wiley & Sons, Inc. 34 Disadvantages of IoT 1. 2. 3. 4. 5. 6. 7. Network security Data privacy Data analysis capabilities Data collection capabilities Realistic efficiency opportunities Realistic new revenue opportunities Cost Copyright ©2018 John Wiley & Sons, Inc. 35 Collaboration Technologies and the Internet of Things (IoT) 1. 2. 3. 4. 5. Why is group work challenging? What might limit the use of in-person brainstorming? How can online brainstorming tools overcome those limits? List ways in which virtual collaboration can be used in business. What devices do you have that take advantage of the IoT? Describe how they impact the way that you live and work. 6. What is driving the rise of IoT? 7. What is the main concern that organizations have about the IoT? 8. Do you think the advantages outweigh the disadvantages of the IoT? Explain. Copyright ©2018 John Wiley & Sons, Inc. 36
Purchase answer to see full attachment
Explanation & Answer:
4 pages
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Introduction
Application of IoT
Paragraph 1
- The internet of things (IoT) is a vast network of interconnected devices of different
levels of complexity.
- A plethora of devices has been interconnected with the internet to make them 'smart.'
Paragraph 2
- The evolution of IoT goes back to the 1980s even before the term was coined
- One of the first recorded use of IoT was pioneered by Carnegie Melon University
students who integrated internet connectivity to a vending machine to allow remote
monitoring of the remaining stock
Paragraph 3
- Organizations are using IoT in diverse ways, depending on the intended purpose
- Typical applications are in decision support systems, optimization, and analytics
Paragraph 4
- One of the major applications of IoT is in data analytics.
- Organizations were previously responsible for designing and implementing their data
analytics systems.
Paragraph 5
- IoT is at the center of digital transformation economies.
- Organizations are determined to leverage IoT to exploit the extensive new possibilities
created by digital transformation


Running head: INTERNET OF THINGS

1

Internet of Things
Name
Institution

INTERNET OF THINGS

2
Internet of Things

Definition of the internet of things
The internet of things (IoT) is a vast network of interconnected devices of different levels
of complexity. In this era of digital technology, a plethora of devices has been interconnected
with the internet to make them 'smart.' Maple (2017) contends that IoT as an enabler of advanced
efficiency across numerous aspects of everyday life ranging from transport, healthcare,
education, and manufacturing, among others. Nearly any device, from a toy to a vehicle, can be
connected to the internet to harness its exponential capability. It is estimated that by the end of
2020, at least 30 billion devices will have internet connectivity, making them a part of the
internet of things network (Maple, 2017). The expansion of this network is contingent on the
ever-rising demand by the people to embrace and integrate the internet into their everyday life,
both in their homes and their workplaces.
The evolution of IoT goes back to the 1980s even before the term was coined (Maple,
2017). One of the f...


Anonymous
Really helped me to better understand my coursework. Super recommended.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags