Deepak Puri

Author Archives: Deepak Puri

IDG Contributor Network: Monitoring the Amazon wildfires with satellites, IoT sensors and GIS

The Amazon spans 2.1 million square miles of rain forest spread over nine countries. And on its edges are miles of agricultural fields, whose farmers routinely burn in order to control pests and weeds, and to encourage new growth.Brazil is the largest cattle exporter in the world with over 200 million head of cattle. Ranchers often set fires to clear land for grazing, reports the Yale School of Forestry and Environmental Studies. However, these long-practiced techniques have raised concerns of the threat that accidental forest fires could pose during drought years. Climate change, which is beginning to show its effects around the world, could exacerbate this threat.To read this article in full, please click here

IDG Contributor Network: IoT-enabled shipping containers sail the high seas improving global supply chains.

Global trade flows through shipping containers. Manufacturers depend on them to get raw materials in time and to ship finished products to market. IoT is being applied to monitor containers and make sure that their contents aren’t damaged or stolen.Inter-modal containers Containers have standardized dimensions, which lets transporters easily ship, stack and store them. There are over twenty million containers in motion right now. Containers are pre-filled which reduces the time that trucks need to get loaded. Their standard size allows them to be easily transferred between trucks, planes, ships and trains.Global supply chains based on containers enable manufacturers to minimize their costs with ‘just-in-time’ inventory. This makes it important to track containers’ location and the condition of their contents.To read this article in full, please click here

IDG Contributor Network: Robots extend the scope of IoT applications

Robots and IoT devices are similar in that they both rely on sensors to understand their environment, rapidly process large streams of data and decide how to respond.That’s where the similarities end. Most IoT applications handle well-defined tasks, whereas robots autonomously handle anticipated situations. Let’s consider both from six different vectors:1. Sensor IoT – Binary output from stationary sensor. “Is the door open or closed?” Robots – Complex output from multiple sensors. “What is in front of me? How do I navigate around it?” 2. Processing IoT – Simple data stream of signals handled with well-known programming methods. Robots – Large complex data streams handled by neural network computing. 3. Mobility IoT – Sensors are stationary and signal processing is done in the cloud. Robots – The sensor laden robot is mobile and signal processing is done locally and autonomously. 4. Response IoT – The action to take in response to a situation is well defined. Robots – Multiple actions could be taken in response to a situation. 5. Learning IoT – The application typically does not ‘evolve’ on its own and develop new features. Robots – Machine learning and other techniques are used to let Continue reading

IDG Contributor Network: Did IoT cyberattacks cause NY power transformers to explode?

Officials blamed a power surge for the blackout on Dec. 28th that left LaGuardia airport in the dark for about 45 minutes, grounding flights. A look at the trend of power outages at American airports shows a disturbing pattern and possibly sinister cause.Background Attacking an adversary’s infrastructure is asymmetrical warfare. It causes a lot of damage for a very small cost. Cyberattacks are an ideal weapon as they disguise who might be behind them, making retaliation much harder.  Attacks on the power grid for airports are especially devastating as they ground flights, stranding passengers and disrupting business nationwide. Just take a look at recent power outages:To read this article in full, please click here

IDG Contributor Network: Guarding against the threat from IoT killer drones

IoT is being weaponized. The same sensors, networks and real-time data analysis used monitoring classrooms can morph into weapons for targeted killing. How do such malicious drones operate and what can be done to protest against their airborne threat?Background Here are three data-points of weaponized drones. The recent assassination attempt on the President of Venezuela with drones. “Aug 4, 2018. CARACAS, Venezuela — A drone attack caused pandemonium at a military ceremony where President Nicolás Maduro of Venezuela was speaking on Saturday, sending National Guard troops scurrying in what administration officials called an assassination attempt.” The use of drones to shoot down incendiary kites in the Israeli-Palestinian conflict. ”IDF reservists to help; troops able to shoot down flying objects 40 seconds from detection” Slaugtherbots. “A video by the Future of Life Institute and Stuart Russell, a professor of computer science at Berkeley presenting a dramatized near-future scenario where swarms of inexpensive microdrones use artificial intelligence and facial recognition to assassinate political opponents based on preprogrammed criteria.” How do they work? Drones are aerial IoT devices. They’re mounted with sensors that relay their location, altitude and other sensor readings such as images to a back-end system or Continue reading

IDG Contributor Network: The vital role of technology in the Thai cave rescue mission

Twelve boys and their coach trapped in a cave deep underground with dwindling air and the danger of being flooded by rising water levels. How did a determined international team find and rescue the boys? How did sophisticated geographical information systems (GIS), IoT sensors and 3D simulations assist the rescuers?Tham Luang Nang Non is six mile long underground cave complex in Thailand’s Chiangrai province. A boy’s soccer team was reported missing in July 2018. Thai Navy SEAL divers' found them in a cave that could only be reached after a six hour underground journey in the dark, swimming through narrow tunnels and climbing boulders. An international rescue teams with experts from Thailand, China, Japan, Australia, the US and Britain were able to rescue them.To read this article in full, please click here

IDG Contributor Network: IoT sensors, advanced ESRI mapping and Alexa warn residents of impending floods

Scott Pruitt, EPA Administrator’s assertion that “global warming might be beneficial” may be reassuring to some, but others living close to the coast prefer the safety of an early warning when they might be flooded from rising sea levels.Predicting floods from storm surges, rain, hurricanes and tides over miles of coastline is hard. How do your monitor water levels over such a broad area? How can floods be predicted with these data streams? How can thousands of people be alerted?  The Virginia Institute of Marine Science (VIMS) is pioneering an innovative approach that combines IoT sensors, advanced mapping and Alexa.To read this article in full, please click here

IDG Contributor Network: Improving supply chains with the IoT and blockchain

The U.S. Centers for Disease Control and Prevention recently advised "consumers to throw away any store-bought romaine lettuce and warned restaurants not to serve it amid an E. coli outbreak that has sickened more than 50 people in several states."This problem highlights the dangers of modern supply chains. They help lower costs and improve business efficiency, but they’re complex and a single failure can sicken people thousands of miles away. The food we eat and the medicines we use come from remote suppliers, transported in refrigerated trucks, and stored in different warehouses. How can perishable commodities be tracked from suppliers to customers? How can the temperature conditions during shipment be monitored to avoid contamination? How can spoilt products be quickly recalled even if they’re in transit or stored in a warehouse?To read this article in full, please click here

IDG Contributor Network: How IoT trackers can fight poachers

Sea turtles have been survived for millions of years, but now face extinction.  as poachers. How do you protect sea turtles eggs on remote, miles-long beaches in developing countries from poachers working in the dark?Global System for Mobile Communications, or GSM, enabled IoT trackers may provide an answer to this scourge.Background Poachers kill sea turtles for their shells and their eggs are considered a delicacy and aphrodisiac. Sad but true. The trade of sea turtle products is restricted, but that doesn’t stop poachers. Tracking this illegal trafficking is difficult. The transit routes and final destinations are unknown.Sea turtle products are the second most frequently trafficked wildlife product smuggled from Latin America to the US. Eggs are a quarter of illegal imports and most originate in Mexico or Central America. This trade is devastating to turtle populations. A recent shipment of a thousand turtle eggs that was intercepted at the Mexico/U.S. border represented nearly 5 percent of the year’s total egg production for the beach from which they were poached!To read this article in full, please click here

IDG Contributor Network: IoT devices communicate by Chirping

Most IoT systems assume there will be some form of connectivity. But what happens when there isn’t any Bluetooth, WiFi or cellular connectivity? R2D2, the adorable robot from Star Wars, may have the answer with the bird-like noises he used to communicate.How can sensors share data when connectivity isn’t available? How can IoT devices be designed to last longer without being recharged? How can legacy equipment be retrofitted affordable to communicate with other devices?Most IoT devices communicate through either a Bluetooth, WiFi, LoRaWAN, SIGfox or cellular connection. The mode chosen is determined by the size of the payload to be transmitted, distance to be traversed, and the power available to the transmitting device. Walls, other electronic equipment and conflicting radio signals also influences the selection of the protocol to be used. What’s needed is that can work in ‘noisy’ environments and work with very little power.To read this article in full, please click here

IDG Contributor Network: Drinking lead contaminated water? Better check your sensor

President Ronald Reagan once advised “trust, but verify” about nuclear disarmament. The same could be said about some official information on public health and safety issues. Remember Flint, Michigan?LeeAnne Walters is a mother of four in Flint, Michigan. She was alarmed when her entire family started losing clumps of hair and her twins kept breaking out in rashes, reported Mother Jones. The family was suffering from the effects of lead in Flint’s water supply. Frustrated with the city’s response, Walters contacted a manager at the EPA which helped unleash a chain of investigations into the crisis.To read this article in full, please click here

IDG Contributor Network: Thoughts & prayers don’t stop mass shooters. Technology might.

It’s heartbreaking. Gun violence kills 93 Americans every day while politicians send their thoughts and prayers. 2017 has seen two of the deadliest mass shootings in American history.How can technology help reduce mass shootings? How can shooters be authenticated before they can fire? How can the police be alerted when a large number of firearms are present at an unusual location? Can an excessive number of shots fired be prevented?Background Americans make up about 4.4 percent of the global population but own 42 percent of the world’s guns. And approximately one in three gunmen is American according to a study by Adam Lankford, a professor at the University of Alabama. Firearms are an $11 billion per year industry with over 300 million existing guns in circulation. About 40% of Americans say they own a gun or live in a household with one. A recent survey reports that the US has the highest rate of murder by firearms in the developed world. Mass shootings cost Americans over $229 billion per year.To read this article in full, please click here

IDG Contributor Network: ElectOS uses open source to restore trust in voting machines

When people doubt that an election will be conducted fairly, their trust in the outcome and their leaders naturally erodes. That’s the challenge posed by electronic voting machines. Technology holds the promise of letting people vote more easily and remotely. But, they’re also prone to hacking and manipulation. How can trust be restored in voting machines and election results?Voting demands the ultimate IoT machine (to borrow a line from BMW). The integrity of these machines with their combination of sensors, security and data analysis produce the results that impact every aspect of all our lives.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Oracle’s digital twin simplifies design process for complex IoT systems

Car designers do it with wind tunnels. Architects do it models. But how do you test the design of a complex IoT system?It isn’t easy with potentially thousands of sensors sending millions of readings continuously. How do you check to make sure that your IoT design will work properly in real life? Check to make sure that different error conditions are handled properly, and corrective action taken on time?Simulated IoT devices can eliminate the guesswork from designing complex systems.Background Dr. Michael Grieves at the University of Michigan first proposed the idea of a “digital twin”. A digital twin is a virtual representation of a physical device to make sure that the design performs as intended. He defined Digital Twin Prototype (DTP) as an asset’s information. Such as a 3D model of the device, its Bill of Materials and Processes to fully describe the asset and how it should work. These digital proxies generate sensor readings and communicate just as their physical counterparts and help IoT designers with:To read this article in full or to leave a comment, please click here

IDG Contributor Network: Technology helps first responders fight California fires

Fires have laid to waste huge swaths of Northern California. The deadly blazes have burned through more than nearly 400 square miles forcing 100,000 people to evacuate, and destroying over 8,400 structures.How do firefighters respond to such a disaster? Where are they dispatched? When and where are evacuations ordered? How can a fire being propelled by 78mph gusts of wind be contained? How do planes know where and when to deploy fire retardant?Sensors, drones, fire-cams, crowdsourcing and geographical information systems all help minimize damage and deaths.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How the Internet of Things can help protect both our safety and right to free speech

Is it acceptable for someone to run over peaceful protesters? When new regulations being proposed say it is, perhaps it’s time for technologists to see how they can help.Given recent tragedies, how can peaceful protesters be protected? How can technology help protect lives? Could a portable, IoT system help safeguard freedom of speech?Background The First Amendment is clear. “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.”To read this article in full or to leave a comment, please click here

IDG Contributor Network: Measuring how warming oceans fuel stronger hurricanes

Tracking storms and weather patterns accurately has become even more critical as weather records fall like bowling pins.What causes hurricanes? How are ocean temperatures monitored across thousands of square miles? What kinds of sensors are used? How is this data converted into actionable intelligence to save lives and protect property? What role does global warming have to play?We should all know this given the devastation from Hurricanes Harvey and Irma.What causes hurricanes? Hurricanes are severe storms with winds that rotate at 74 miles per hour or more around a central, low-pressure core. They result from weather disturbances that pull in warm surface air to interact with warm seawater. Hurricanes occur close to the equator where the seawater is hot enough to power the storms and the rotation of the Earth makes them spin.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Tech enabled disaster response to Hurricane Harvey

Hurricane Harvey has dumped over 50 inches of water across Texas. Thousands of people displaced. Roads flooded. Communication channels disrupted.How are relief efforts coordinated? How are emergency personnel given the information they need? How can data be collected with broken communication channels and little cellular coverage? How can information from multiple sources be aggregated and presented in an actionable form?Here’s how Esri Disaster Response Program is helping first responders and the Texas Division of Emergency Management. Information on local conditions such as water levels, flood gauges, road closures and traffic conditions are essential to coordinate relief efforts.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How Atlanta streamlines traffic flows

If you’ve been stuck in traffic, you’ll appreciate Atlanta’s innovative new approach to keep things moving smoothly.Traffic jams are unpredictable and collecting real-time data over a large area is difficult. The City of Atlanta streamlines traffic with a city-wide system where every driver becomes a mobile traffic sensor and crowdsourced data improves traffic flow.Background The City of Atlanta was struck by what Atlanta Mayor Reed termed the single largest transportation disaster on March 30, 2017.  A bridge on one of the main traffic arteries into the city, I-85, collapsed due to a maliciously set fire from beneath. Traffic gridlock lasted for months. Atlanta which belongs to the 100 Resilient Cities program set to work. Stephanie Stuckey, Chief Resiliency Officer for Atlanta turned to the Esri Disaster Response Program, to find a way to ease the traffic burden. A partnership was formed with Esri, a global smart-mapping leader and Waze to build the foundation of Intelligent Transportation Systems.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How Atlanta streamlines traffic flows

If you’ve been stuck in traffic, you’ll appreciate Atlanta’s innovative new approach to keep things moving smoothly.Traffic jams are unpredictable and collecting real-time data over a large area is difficult. The City of Atlanta streamlines traffic with a city-wide system where every driver becomes a mobile traffic sensor and crowdsourced data improves traffic flow.Background The City of Atlanta was struck by what Atlanta Mayor Reed termed the single largest transportation disaster on March 30, 2017.  A bridge on one of the main traffic arteries into the city, I-85, collapsed due to a maliciously set fire from beneath. Traffic gridlock lasted for months. Atlanta which belongs to the 100 Resilient Cities program set to work. Stephanie Stuckey, Chief Resiliency Officer for Atlanta turned to the Esri Disaster Response Program, to find a way to ease the traffic burden. A partnership was formed with Esri, a global smart-mapping leader and Waze to build the foundation of Intelligent Transportation Systems.To read this article in full or to leave a comment, please click here

1 2 3 5