DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
View Events Video Library
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Integrating PostgreSQL Databases with ANF: Join this workshop to learn how to create a PostgreSQL server using Instaclustr’s managed service

Mobile Database Essentials: Assess data needs, storage requirements, and more when leveraging databases for cloud and edge applications.

Monitoring and Observability for LLMs: Datadog and Google Cloud discuss how to achieve optimal AI model performance.

Automated Testing: The latest on architecture, TDD, and the benefits of AI and low-code tools.

Related

  • PHP Development in the Era of the Internet of Things (IoT)
  • The Internet of Things Costs Too Much
  • The Internet of Things: Almost 5 Times Bigger by 2018
  • Internet of Doom: The Security Vulnerabilities of Connected Devices

Trending

  • Podman Desktop Review
  • How To Deploy Helidon Application to Kubernetes With Kubernetes Maven Plugin
  • Deploy a Session Recording Solution Using Ansible and Audit Your Bastion Host
  • Exploring Sorting Algorithms: A Comprehensive Guide
  1. DZone
  2. Data Engineering
  3. Big Data
  4. The Internet of Things, Gateways, and Next Generation of APIs Speaker Session at APIStrat Austin

The Internet of Things, Gateways, and Next Generation of APIs Speaker Session at APIStrat Austin

Check out these conference highlights concerning IoT development, API optimization, and data security from APIStrat Austin.

Steven Willmott user avatar by
Steven Willmott
·
Nov. 22, 15 · Presentation
Like (6)
Save
Tweet
Share
6.99K Views

Join the DZone community and get the full member experience.

Join For Free








 


Sitting down in this speaker series, it was all too apparent how much my own life has been impacted by the Internet of Things. With a Macbook Pro on my lap, Samsung Galaxy Edge in my pocket, and LG smart watch on my wrist, I could not be more connected as my devices sync up with the world around me. Sure, I am a great use case for why this topic is so important, but these four speakers provided a little more insight into the past, present, and future of IoT.

Kicking off the presentation, Mandy Whaley, Developer Experience Lead at Cisco, shared her thoughts on IoT. Software licensing has become less profitable, and companies need to own some element of hardware development to create a larger “stickiness” factor. Hardware and software developers have become comfortable in a world where their roles have had very little interaction. Mandy and her team at Cisco have stepped up to ensure this is not the case, creating a “two way street of education,” including Coding 101 for hardware developers and soldering lessons for software engineers. This cultural shift has enabled a synergy across both functional teams, benefiting Cisco’s greater developer community in the form of the DevNet IoT Dev Center, with the ultimate goal of driving down TTFHW (time to first hello world). The Internet of Things is only getting bigger!

Second to the stage was Vivek Gupta, VP of Product Management at AnyPresence who provided his best practices for unlocking the value of IoT. With upwards of 50 billion devices making connections in a given day, Vivek pinpointed the most successful IoT solutions as those that create an ecosystem. APIs are the “must-have starting point", and careful attention should be given to human-Machine interactions (HMI), optimizing the API to a particular solution. From this stage, and with access to the developer community, your API can be integrated in ways that push into a larger and larger IoT ecosystem. One use case to highlight this–and a perfect segue into the next speaker–is the growing importance of financial technology solutions.

Jeanine Swatton, Director of Developer Evangelism at Yodlee, gave an exciting presentation on the “Fintech of Things”. Financial institutions, year after year, are allocating large portions of their budgets toward improving customer experience through financial technology. One driving force behind this is the millennial population who are demanding automation across every aspect of their lives. So far this has been accomplished through opening up the ecosystem of devices used for making payments, as well as providing digital experiences that no longer require visits to physical bank branches. Could virtual reality be the next stage in banking? Jeanine thinks so and believes we are not too far away from virtually walking into our financial transactions.

It would not be a technology event without the discussion of data security. With every new device comes an added window into private data. Rezna Naghibi, Senior Engineer at Varnish Software, gave us some great takeaways to ensure our information doesn’t fall into the wrong hands. Security breaches aren’t limited to hackers breaking into servers but can occur when applications are reverse engineered or free users breaking open premium product services. With more levels of exposure, the first thing hackers will look into will be communication between servers, devices, etc. We must “sanitize database access” as Rezna suggests by clearly defining authorized and authenticated users. A great reminder to us all for proper housekeeping!

Thank you to our great guest speakers for a thrilling discussion on the Internet of Things! Videos of this and other sessions will be coming soon. Stay tuned. You might be missing the brisket, but you can sink your teeth into all this content.











This article is written by Chris Wittman.

IoT Internet (web browser) Session (web analytics)

Published at DZone with permission of Steven Willmott, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Related

  • PHP Development in the Era of the Internet of Things (IoT)
  • The Internet of Things Costs Too Much
  • The Internet of Things: Almost 5 Times Bigger by 2018
  • Internet of Doom: The Security Vulnerabilities of Connected Devices

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: