Cisco - Intro to IoT
Purpose of data analytics
to gain new insights from data
Purpose of packet tracer
to simulate and visualize one or more networks
inside and outside
two areas of physical security within a data center
IP Addressing and SSID
two requirements to connect a smart device to a home wireless network?
Computer programs and data
two things that all digital devices need in order to work
bank and financial
two types of institutions do malicious web pages often look like
Benefits of cloud computing
It enables access to organizational data anywhere and at any time; It streamlines the IT operations of an organization by subscribing only to needed services; It eliminates or reduces the need for onsite IT equipment, maintenance, and management.
PII
Personal information, described in United States legal fields as either personally identifiable information (PII), or sensitive personal information (SPI),[1][2][3] as used in information security and privacy laws, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context
Global variables
Type of variable that can be used within any function of a program.
distributed processing
a phrase used to refer to a variety of computer systems that use more than one computer (or processor) to run an application. This includes parallel processing in which a single computer uses more than one CPU to execute programs.
Features of automation
a process that is self-driven; a process that eventually eliminates the need for human intervention
fog computing
an architecture that uses edge devices to carry out a substantial amount of computation, storage, communication locally and routed over the internet backbone.
Arduino
an open-source physical computing platform that can take input from a variety of switches or sensors to control physical objects
cloud services
any service made available to users on demand via the Internet from a cloud computing provider's servers as opposed to being provided from a company's own on-premises servers
microcontroller
provides IoT sensors with access to the network
home gateway
provides auto discovery services for smart devices that are connected to the network
developing a security policy
security best practice involves defining company rules, job duties, and expectations
Design and programming
skills that help with prototyping
ML
technology is a subset of AI that uses statistical techniques to enable computers to "learn" from collected data
AI
technology that has the intelligence that is demonstrated by machines in a way that mimics human cognitive functions
Blockly
technology used as a visual programming tool to create a program by connecting colored blocks
quotation mark (")
character used within a search engine to gather data efficiently by placing the character before and after the name of a particular person
PAN
computer network that enables communication between computer devices near a person
artificial intelligence
core component of Intent-Based Networking
unstructured data
data that has been collected through sources such as web pages, audio, or tweets categorized
LAN
group of computers and associated devices that share a common communications line or wireless link to a server.
What limits the types of different objects that can become intelligent sensors on the Internet of Things?
imagination
end-to-end verification of network-wide behavior
key feature of the assurance element of the intent-based networking model
Internet
largest network in existence
Mined data visualized for charts
number of variables to be shown; items requiring comparison
VPN
the extension of a private network that includes links across shared or public networks, such as the Internet.
Volume, velocity, variety
three attributes of data that indicate it may be big data