Welcome!

@DevOpsSummit Authors: Liz McMillan, Elizabeth White, David Linthicum, Zakia Bouachraoui, Yeshim Deniz

Related Topics: @DevOpsSummit, Linux Containers, @CloudExpo, @DXWorldExpo, @ThingsExpo

@DevOpsSummit: Blog Post

Logging to Rescue the 'Internet of Things' By @TrevParsons | @ThingsExpo [#IoT]

The Internet of Things Network Is Growing at an Unbelievable Pace

Logging Activity in a Smart Home

The Smart Home concept is a subset of the Internet of Things(IoT). The core idea is to connect "things" (digital devices) to each other to facilitate communication, feedback, and alerting. In essence connecting the physical world with the digital world. We are installing new sensors and actuators into everyday devices that is leading to new IoT and Smart Home services by integrating existing solutions and technologies.

The IoT Network Is Growing at an Unbelievable Pace

From just 2 billion objects in 2006 to a projected 200 billion in 20201. The connection of these smart "things" can provide us with accurate, critical information that can potentially be used to increase the quality of our lives. IoT is only limited by our imagination. It has applications in health, transport, home, industry and smart buildings to name but a few.

Let's Focus on the Smart Homes Concept

How many times have you walked out of your house, got into your car, and after driving away asked yourself: "Have I locked the front door?"

With an electronic front door connected to your Smart Home network using the IoT, it's as simple as logging into your mobile device, checking for unlocked doors, and then locking them with a single tap on the screen. All this intelligence provides an opportunity for people to interact remotely with their home environment in real time.

A major challenge is providing the analytical infrastructure that understands the flow of data, detects anomalous behavior, and makes the appropriate decision.

In order to turn the Internet of Things into the Internet of Opportunities we need to handle, process, and visualize data in a human-friendly way, while keeping in mind that a change in one object may have an impact on another object. Being able to receive real time data from all the sensors installed in the object is crucial for successful analytics and decision-making.

Logging Comes to the Rescue for IoT and Smart Home Applications

One advantage of a good logging system is the ability to track every event and then use visualizations to uncover patterns that can predict ‘critical' events likely to occur in the future.

logging activity in a smart home

Logging in a Smart Home Example

Reflecting on the concepts above with the use of a real life example4 let's consider the house of an elderly person fitted out with a variety of sensors. Fore example a pressure sensor on their bed, flow sensor in their bathroom, motion detectors in their kitchen.

For ten days straight we observe that the person wakes up at 6am, turns on their kettle, and has a bath. A pattern of activity has emerged, all of these key events are logged and deviations from the norm can trigger alerts.

On the 11th day the kettle doesn't turn on, water is not flowing and pressure sensors on the bed are not activated. This could raise a warning or a critical alert that could save the person's life by sending a simple notification to the family members or health services that something may be wrong.

Solutions

real time tags and alerts feature can send critical alerts using SMS, email and iPhone notifications when important events do not occur3.

One of the solutions to the problem described in the above use case would be to create new inactivity alert that triggers a new notification after a specific time of logging inactivity.

logging activity in a smart home alert

Or an inactivity alert notification sent to Logentries Notification iPhone app.

smart home logging inactivity alert

In the Near Future, Hundreds of Billions of Devices Will Become Interconnected4

Individuals and businesses already appreciate the potential and capabilities of IoT and are pushing such functions into the home. We need to be prepared for the change, innovate and push the boundaries in a safe and secure manner5.

If you'd like to explore more about types of alerts, check out our post on alerts and global notifications.

References:

  1. A Guide to the Internet of Things
  2. What Exactly Is The "Internet of Things"?
  3. Our Tags And Alerts Have Gone Global
  4. An Unexpected Capital for the Internet of Things
  5. How "Internet of Things" May Change the World

More Stories By Trevor Parsons

Trevor Parsons is Chief Scientist and Co-founder of Logentries. Trevor has over 10 years experience in enterprise software and, in particular, has specialized in developing enterprise monitoring and performance tools for distributed systems. He is also a research fellow at the Performance Engineering Lab Research Group and was formerly a Scientist at the IBM Center for Advanced Studies. Trevor holds a PhD from University College Dublin, Ireland.

@DevOpsSummit Stories
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO Silicon Valley 2019 will cover all of these tools, with the most comprehensive program and with 222 rockstar speakers throughout our industry presenting 22 Keynotes and General Sessions, 250 Breakout Sessions along 10 Tracks, as well as our signature Power Panels. Our Expo Floor will bring together the leading global 200 companies throughout the world of Cloud Computing, DevOps, IoT, Smart Cities, FinTech, Digital Transformation, and all they entail. As your enterprise creates a vision and strategy that enables you to create your own unique, long-term success, learning about all the technologies involved is essential. Companies today not only form multi-cloud and hybrid cloud architectures, but create them with built-in cognitive capabilities.
In today's always-on world, customer expectations have changed. Competitive differentiation is delivered through rapid software innovations, the ability to respond to issues quickly and by releasing high-quality code with minimal interruptions. DevOps isn't some far off goal; it's methodologies and practices are a response to this demand. The demand to go faster. The demand for more uptime. The demand to innovate. In this keynote, we will cover the Nutanix Developer Stack. Built from the foundation of software-defined infrastructure, Nutanix has rapidly expanded into full application lifecycle management across any infrastructure or cloud .Join us as we delve into how the Nutanix Developer Stack makes it easy to build hybrid cloud applications by weaving DBaaS, micro segmentation, event driven lifecycle operations, and both financial and cloud governance together into a single unified st...
For far too long technology teams have lived in siloes. Not only physical siloes, but cultural siloes pushed by competing objectives. This includes informational siloes where business users require one set of data and tech teams require different data. DevOps intends to bridge these gaps to make tech driven operations more aligned and efficient.
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
Hackers took three days to identify and exploit a known vulnerability in Equifax’s web applications. I will share new data that reveals why three days (at most) is the new normal for DevSecOps teams to move new business /security requirements from design into production. This session aims to enlighten DevOps teams, security and development professionals by sharing results from the 4th annual State of the Software Supply Chain Report -- a blend of public and proprietary data with expert research and analysis.Attendees can join this session to better understand how DevSecOps teams are applying lessons from W. Edwards Deming (circa 1982), Malcolm Goldrath (circa 1984) and Gene Kim (circa 2013) to improve their ability to respond to new business requirements and cyber risks.