scholarly journals Implementasi Teknologi IoT Pada Smart Home

Author(s):  
Febryan Ramdani ◽  
Harry Dhika

Indonesia to date has implemented a variety of telecommunications technologies forImproving quality and improving quality so that improvements need to be done in all fields, one of them is Telecommunications Infrastructure. Internet of Things (IoT) technology, offering smart services and networks. But to implement IoT technology requires a lot of costs and is quite expensive, therefore it is necessary to formulate a strategy that is suitable for implementing IoT technology. To formulate a plan based on the concept of strategic management science using strategy formulation using a strategy process consisting of MEI (Evaluation Matrix Internal), MEE (External Evaluation Matrix), SWOT, External Internal Matrix, and Grand Strategy. After formulating it was found that the "3 R strategy and then slowly applying the IoT technology" is the best and workable strategy.

2004 ◽  
Vol 03 (03) ◽  
pp. 259-272 ◽  
Author(s):  
Senthil K. Muthusamy ◽  
Ramaraj Palanisamy

The organisation that wants to build competitive advantages has to create and leverage its capabilities. One of the central bases for achieving competitive advantage is the organisational capability to create new knowledge and transfer it across various levels and parts of the organisation. Because knowledge is central to strategy formulation and implementation, knowledge management has become a key strategic task facing managers for achieving success in today's complex and dynamic environments. A major challenge facing strategic management is engineering and managing the individual and group level knowledge that facilitates better strategies and invokes commitment. A knowledge management based model of strategy formulation process is presented. Traditional strategy frameworks are evaluated and a comprehensive cognition and learning centered strategy framework is suggested as a better model of strategy formulation and implementation for achieving competitive advantage. The implications of the knowledge-based approach for strategic management practice and research are highlighted.


2019 ◽  
Vol 01 (02) ◽  
pp. 31-39 ◽  
Author(s):  
Duraipandian M. ◽  
Vinothkanna R.

The paper proposing the cloud based internet of things for the smart connected objects, concentrates on developing a smart home utilizing the internet of things, by providing the embedded labeling for all the tangible things at home and enabling them to be connected through the internet. The smart home proposed in the paper concentrates on the steps in reducing the electricity consumption of the appliances at the home by converting them into the smart connected objects using the cloud based internet of things and also concentrates on protecting the house from the theft and the robbery. The proposed smart home by turning the ordinary tangible objects into the smart connected objects shows considerable improvement in the energy consumption and the security provision.


2021 ◽  
pp. 126908
Author(s):  
Wonyoung Choi ◽  
Jisu Kim ◽  
SangEun Lee ◽  
Eunil Park

Proceedings ◽  
2021 ◽  
Vol 74 (1) ◽  
pp. 1
Author(s):  
Hilal Çepik ◽  
Ömer Aydın ◽  
Gökhan Dalkılıç

With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared.


2019 ◽  
Vol 36 (1) ◽  
pp. 203-224 ◽  
Author(s):  
Mario A. Paredes‐Valverde ◽  
Giner Alor‐Hernández ◽  
Jorge L. García‐Alcaráz ◽  
María del Pilar Salas‐Zárate ◽  
Luis O. Colombo‐Mendoza ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document