wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Internet of Things

profile
NEHA GAWADE
Sep 21, 2022
1 Like
0 Discussions
178 Reads

What is the Internet of Things?

The IoT brings internet connectivity, data processing and analytics to the world of physical objects.The phrase "Internet of Things" describes the overall network of interconnected gadgets as well as the technology that enables communication between gadgets and the cloud as well as among gadgets.

How does IoT work?

The Internet of Things (IoT) ecosystem is made up of web-enabled smart devices that use embedded systems, such as processors, sensors, and communication gear, to gather, send, and act on the data they get from their surroundings. By connecting to an IoT gateway or other edge device, which either sends data to the cloud for analysis or analyses it locally, IoT devices exchange the sensor data they collect. These gadgets converse with other similar devices on occasion, acting on the data they exchange. Although individuals can engage with the devices to set them up, give them instructions, or retrieve the data, the gadgets accomplish the majority of the job without their help.

                                                               

Examples of IoT devices

Any device that can gather and transmit information about the physical world can participate in the IoT ecosystem. Smart home appliances, RFID tags, and industrial sensors are a few examples. Other examples include fitness wearables and home security systems. There are also more generic devices, like the RaspberryPi or Arduino, that let you build your own IoT endpoints.

                                                                                                   

 


Comments ()


Sign in

Read Next

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

Supervised and unsupervised learning

Blog banner

File System

Blog banner

Interrupts

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

Os(Computer security threats)

Blog banner

Data Mining

Blog banner

What is OS and its overview

Blog banner

Zero-Day Attack

Blog banner

Understanding the 'Ambiverts'

Blog banner

Memory heirchy

Blog banner

Virtual memory

Blog banner

Cyber Forensics

Blog banner

John Titor: The Time Traveler

Blog banner

GraphQL

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

Animal’s have my heart

Blog banner

Worms, viruses and Bots

Blog banner

Kernel in Operating System

Blog banner

Whatsapp Messenger

Blog banner

E-commerce

Blog banner

Shoulders

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Chicken Dum Biryani

Blog banner

Lifestyle of a photographer

Blog banner

Memory management

Blog banner

What is Data, Information and Knowledge?

Blog banner

Be you

Blog banner

Deadlock and Starvation

Blog banner

Amazon

Blog banner

Multithreading in Operating System

Blog banner

Memory input output management

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Art and Culture of Rajasthan

Blog banner

Study of Sniffing Tools

Blog banner

Service Transition Process in ITSM

Blog banner

Embedded Operating System

Blog banner

COMMUNICATION

Blog banner

Data is an asset and it is your responsibility!

Blog banner

Life

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

Microsoft powerpoint presentation

Blog banner