Articles & Tutorials
IoT and the Smart Home series
In this 3-part series, you learn how to build a simple - but complete - home automation system. In doing so, you'll work with 433-MHz hardware components (Part 1), software that runs on the Raspberry Pi (Part 2), and an IoT app in the IBM Cloud and an Android mobile app (Part 3).
Security and the IoT ecosystem
Security in systems design and development tends to be an afterthought, but it should be considered throughout the product lifecycle. One area where the number of exploits is exploding is in Internet of Things (IoT). This article explores the spectrum of security in the context of IoT, including access security (authentication), data security (encryption), and security analytics (policy-based controls).
Developing cognitive IoT solutions for anomaly detection by using deep learning, Part 5: Using Keras and Tensor Flow
This article is the fifth in a five-part series, and it demonstrates a deep learning solution using Keras and TensorFlow that is used to analyze the large amount of data that IoT sensors gather.
Code patterns
Deploy a serverless multilingual conference room
This code pattern helps you to create a communications channel to allow different-language clients to seamlessly communicate with each other. It uses MQTT, IBM Watson IoT Platform, IBM Cloud Functions, and several Watson services.
Blogs
8 sensors to help you create a smart home
With the Internet of Things and smart home sensors, and the help of insurance providers, you can help protect yourself, your home, and your family from experiencing too much of the hardship associated with home and property damage.
How cloud, fog, and mist computing can work together
Cloud, fog, and mist computing all have their own strengths and weaknesses. As more and more devices are connected to the Internet, using all of these computing paradigms correctly will be key to ensuring that our systems and applications are able to scale alongside our growing network of devices.
No comments:
Post a Comment