By 2020, there will be 50 billion devices connected to the Internet. How will you and your organization capitalize on this tremendous opportunity? Join this new evolution in hardware, software, and data by registering for this six-week online offering.
While the promise of the Internet of Things (IoT) brings many new business prospects, it also presents significant challenges ranging from technology architectural choices to security concerns. MIT Professional Education’s… See More
What you’ll learn
Discover key IoT concepts including identification, sensors, localization, wireless protocols, data storage and security; Explore IoT technologies, architectures, standards, and regulation
Explore IoT technologies, architectures, standards, and regulation
Realize the value created by collecting, communicating, coordinating, and leveraging the data from connected devices
Examine technological developments that will likely shape the industrial landscape in the future
Understand how to develop and implement your own IoT technologies, solutions, and applications
Cost: $450.00
Course Outline
Module 1:
Section A: Architectures
Introduction: What is IoT and the connected world?Case study on RFIDArchitecture of IoTSecurity issuesOpportunities for IoT
Section B: The Web of Things
Linked data – value is greatest when linkedEnterprise data – shared vs. public vs. privateImportance of security, privacy, and authenticityIndustry standardsWeb of Things layer as the driver for IoT systems
Section C: Lessons from the Internet
Is the Internet the right technology to hook together a network of things?The key lessons that our experience with the Internet teaches us about a future of thingsA focus on network management, security, mobility and longevityThe desirable features of a distributed architecture for a system of things
Module 2: Technologies
Section A: Wireless protocols
One size does not fit all: why are there dozens of connectivity options?Three key dimensions: application duty cycle and data rate, battery consumption, and communication rangeThree case studies: low-power design (Bluetooth Low Energy), range extension techniques (data mining and mesh networking), and data-intensive IoT for continuous recognition applicationsPredictions for the next few years
Section B: Data storage and analysis
Managing high rate sensor dataProcessing data streamsData consistency in an intermittently connected or disconnected environmentIdentifying outliers and anomalies
Section C: Localization
Localization algorithmsIndoor localizationLocalization for mobile systemsApplications
Section D: Security in IOT
Why is security for IoT so hard?Threat modelsDefensive strategies and examples
Section E: HCI and IoT World
Theory and applications of spoken dialogue for human-computer interactionCombining speech with other modalities for natural interactionConsiderations for multilingual interactionsParalinguistic information from speech for enhanced HCIFuture challenges for ubiquitous speech interfaces
Section F: Robotics and Autonomous Vehicles
Potential benefits of self-driving vehicles and service robotsSensing and data processingSimultaneous mapping and localizationLevels of autonomyFuture research challenges
Module 3: Applications
Section A: Smart Buildings
Emerging descriptive data standards for IoT and sensorsImmersive visualization of diverse sensor data using game enginesWearable sensing for IoT featuring new ways to control and interact with your environmentSensors and paradigms for seamless interaction with the built environmentSmart tools for IoTSmart, sensate materials
Section B: Wireless Technologies for Indoor Localization, Smart Homes, and Smart Health
Smart healthHome automationLocation tracking
Section C: Smart Cities
The city as a cyber physical systemPrinciples of cybernetics such as sensing and actuatingCollection of information including opportunistic sensing, crowd sensing, and ad hoc sensingResponse of the system including analytics and optimization, distributed action, people as intelligent actuatorsPrice of anarchyHacking the city: the risk for cyberattacks in centralized and distributed systemsSmart city equals smart citizens
Conclusion: Roadmap of the Internet of Things (IoT)
Utilizing sensors to gain greater visibility and real-time situational awarenessWays to act on the information collected, thereby controlling the real worldFormulating an architecture that enables a macro picture of systems, an accessible design paradigm, and a set of interfaces which can be standardizedA security paradigm, which considers setup, maintenance, and updatingVertical applications that provide a clear business case and a pressing opportunityEmerging technologies to address IoT challenges.
NOTE: You may receive a “Privacy” notification when opening the sites. Proceed at will.