You are on page 1of 17

Individual Assignment

TECHNOLOGY PARK MALAYSIA


CT121-3-2-EIOT
ENTERPRISE INTERNET OF THINGS
APD2F2109CS(IS)
HAND OUT DATE: 18/2/2022
HAND IN DATE: 15/4/2022

INSTRUCTIONS TO CANDIDATES:
Complete the assignment and submit it online through Moodle. Your
assignment submission is integrated with Turnitin option for
plagiarism check.

NAME: CHEAH WENG HOE


TP NO: TP055533
Table of Contents
1.0 Industry 4.0 Enabling Technology...................................................................................................3

1.1 Big Data.......................................................................................................................................3

1.1.1 Definition..............................................................................................................................3

1.1.2 Implementation in Industries................................................................................................3

1.1.3 Example of Industry..............................................................................................................3

1.2 Cloud Manufacturing...................................................................................................................5

1.2.1 Definition..............................................................................................................................5

1.2.2 Implementation in Industries................................................................................................5

1.2.3 Example of Industry..............................................................................................................5

1.3 Additive Manufacturing...............................................................................................................6

1.3.1 Definition..............................................................................................................................6

1.3.2 Implementation in Industries................................................................................................6

1.3.3 Example of Industry (RAMLAB).........................................................................................6

1.4 Augmented Reality (AR).............................................................................................................8

1.4.1 Definition..............................................................................................................................8

1.4.2 Implementation in Industries................................................................................................8

1.4.3 Example of Industry..............................................................................................................8

1.5 Cyber Security...........................................................................................................................10

1.5.1 Definition............................................................................................................................10

1.5.2 Implementation in Industries..............................................................................................10

1.5.3 Example of Industry............................................................................................................11

2.0 Enterprise (Meta)...........................................................................................................................12

2.1 Summary...................................................................................................................................12

2.2 Enabling Technologies..............................................................................................................13

2.2.1 Big Data..............................................................................................................................13

2.2.2 Cloud Manufacturing..........................................................................................................14

2.2.3 Additive Manufacturing......................................................................................................15


2.2.4 Augmented Reality (AR)....................................................................................................16

2.2.5 Cyber Security....................................................................................................................17

References...........................................................................................................................................18
1.0 Industry 4.0 Enabling Technology
1.1 Big Data
1.1.1 Definition
Based on the definition provided by Forrester, Big Data can be categorized into four
components which are volume of data, diversity of data, the speed which new data is
collected and analyzed and the value of data (Forcina & Falcone, 2021). Data can originate
from IoT systems that are integrated to the productive layer or through the interchange of
information between IT systems for production and warehouse management. Machine
learning techniques for planning and forecasting, predictive maintenance and simulation are
some of the specific uses in this area (Martinelli, Mina, & Moggi, 2019).

1.1.2 Implementation in Industries


Pillbox is one of the concepts proposed in “Health 2.0”. Pillbox is designed to reduce
the cost of diagnosing medicines and their effects, provide medical knowledge using big data
and support in the preservation of a clean medical system by tracking drug sales and medical
records. Big data is being used by an expanding number of businesses, particularly
healthcare-related enterprises, to address a range healthcare concern, such as supporting
research, translating data into knowledge and assisting physicians in improving patient care.

1.1.3 Example of Industry


In 2006, the Apache Hadoop distributed processing framework was made open-
source, laying the groundwork for a clustered platform built on commodity hardware and
optimized for big data applications. As the Hadoop ecosystem took shape and begam to
expand, big data applications were mostly used by large internet and e-commerce firms, such
as Yahoo, Google and Facebook as well as analytics and marketing services providers. In
recent years, retailers, financial services firms, insurance, healthcare organizations,
manufacturers and the energy sector have all starting to involves themselves in big data
analytics. While the researchers do not have specific statistics on R&D spending on
manufacturing Big Data tools, the increased activity in this area implies a substantial increase
in business in the sector (IDC, 2018).
1.2 Cloud Manufacturing
1.2.1 Definition
Cloud Manufacturing (CM) is a modern manufacturing approach that converts
traditional manufacturing resources into cloud computing, IoT and virtualization services and
make them available via the Internet (Wu, Greer, Rosen, & Schaefer, 2017). It is also referred
to as the cloud-based deployment of well-known industrial resources such as Enterprise
Resource Planning (ERP) (First, 2016).

1.2.2 Implementation in Industries


Healthcare organizations have embraced new technology to speed up procedures,
develop new patient-care applications and improve services. Despite these IT solutions, most
healthcare organizations face challenges such as high infrastructure costs, the need for
computing resources, scalability, all over access, multi-tenancy and the growing need for
collaboration (Takyar, 2022). The cloud’s qualities that address these issues are as follows:

 On-demand service: The resources are delivered promptly and without the
intervention of a human.
 Resource Pooling: Cloud services may be used by several users at the same time.
 Elasticity: It is possible to add, delete or upgrade features as needed by the
organizations.
 Broad Network Access: A wide range of network accessibility is available at all time
and from any location.

1.2.3 Example of Industry


The healthcare industry has been sluggish to adopt new technology due to worries
about security and the time required to make the changeover. RapidScale’s Cloud Healthcare
solution provides a smooth and reliable transition. The solutions adhere to a variety of
healthcare laws. RapidScale also offers other advantages that healthcare professionals are
seldom aware of. Doctors will be able to communicate more effectively with their patients
and work more effectively with one another. Simple tasks that used to take time, such as
making referrals or filling out patient histories may now be completed rapidly, allowing
physicians to focus entirely on their patients (Figone, 2022).
1.3 Additive Manufacturing
1.3.1 Definition
Additive manufacturing also known as 3D Printing. It involves depositing layer upon
layer of material in precise geometric forms to create items. One of the most significant
benefits is the ability to create objects that are normally made up of several elements in a
single procedure. Thanks to a continual integration of computers, the internet and production
processes, this technology is changing manufacturing (Martinelli, Mina, & Moggi, 2019).

1.3.2 Implementation in Industries


Markforged has launched two new composite 3D printing technologies. The first
method involves using a composite filament with a nylon matrix and discontinuous carbon
fibers as reinforcement. The manufacturer claims a 60% improvement in bending strength as
compared to pure nylon. During the printing process, the second method involves inserting
reinforcements between the layers of thermoplastic material. An additional nozzle applies a
layer of the reinforcing component, likewise in the pattern given in the CAD model, after
completing the application of the stated number of layers of the base filament. Kevlar, glass
fiber, carbon fiber and high strength high temperature glass fiber can all be used as
reinforcing materials (Ziolkowski & Dyl, 2020).

1.3.3 Example of Industry (RAMLAB)


RAMLAB is a Dutch firm that attempts to create additive manufacturing (AM)
technology that may be used in shipbuilding. RAMLAB’s key technology is WAAM, which
stands for wire arc additive manufacturing and is based on layer welding employing
MIG/MAG welding robots.

RAMLAB has created two products that have been successfully used in the industry.
The first is the WAAMpeller, a propeller constructed completely on WAAM technology. The
propeller was built in collaboration with and for the DAMEN shipyard, who used it to power
a Stan Tug 1606 tugboat. The crane hook for Huisman Equipment is the second product
introduced by RAMLAB. (Ziolkowski & Dyl, 2020).
1.4 Augmented Reality (AR)
1.4.1 Definition
Augmented Reality (AR) is defined as a technologically improved representation of
the actual world that is created by the use of digital visual components, music or other
sensory stimulation. AR blends real and virtual items and is both interactive and 3D
registered. According to Paul Milgram and Fumio Kishino, Milgram’s Reality-Virtuality
Continuum connects the actual world and the virtual world, with Augmented Reality (AR)
and Augmented Virtuality (AV) in between, where AR is closer to the real world and AV is
closer to a pure virtual world (Furht, 2018).

1.4.2 Implementation in Industries


The ARToolkit system employs binary thresholding and partial line fitting to detect
probable marker edges. All four-line segmented regions are regarded prospective marker
candidates and are utilized to generate a six degree of freedom (6DOF) matrix transformation
for the marker with respect to the observing camera. The marker may be corrected so that it
appears parallel to the camera’s sensor plane and the internal pattern can be compared against
a database of known patterns once this transformation is established. This pattern matching
allows user to establish whether or not a marker is genuine, which one it is and how it is
oriented around the vertical axis of the maker (Billinghurst, Clark, & Lee, 2017).

1.4.3 Example of Industry


Niantic, the developer behind location-based AR games such as Pokémon Go and
Pikmin Bloom, has announced that its Niantic Lightship Augmented Reality Developer Kit
will be made accessible to developers all across the world in an effort to expand its ever-
expanding AR metaverse (Melnick, 2021). The Niantic Lightship Augmented Reality
Developer Kit is a comprehensive set of tools that allows developers to construct multiplayer
experiences with depth, physics, occlusions and semantic segmentation.
1.5 Cyber Security
1.5.1 Definition
‘Cyber-’ is a prefix derived from the word cybernetics and it has taken on the
connotation of using a computer in general (Cavelty, 2018). According to the literature
studied, the term “security” does not appear to be a widely recognized notion and it is
notoriously difficult to define in a broad sense. According to Buzan, Waever and Wilde
(1998), security discourses must be incorporate and aim to comprehend who securitizes, on
what concerns for whom, why, with what consequences and under what conditions (Craigen,
Thibault, & Purse, 2017).

Cyber-security the technique of safeguarding computers, servers, mobile devices,


electronic systems, networks and data against malicious assault. It is also known as electronic
information security or information technology security. The phrase pertains to a wide range
of situations from corporate to mobile computing and is separated into a few areas, including
Network Security, Application Security, Information Security and so on (kaspersky, 2022).

1.5.2 Implementation in Industries


The Industrial Control System (ICS) is a management and control system that ensures
the automated operation of industrial technical equipment while also supervising and
monitoring business activities. In particular, iCSs are made up of a set of control components
that work together to achieve a certain industrial goal. The Industrial Control System (ICS) is
a broad term that refers to a variety of control systems, including Supervisory Control and
Data Acquisitions (SCADA) and Distributed Control Systems (DCS) (Lezzi, Lazoi, &
Corallo, 2018).

1.5.3 Example of Industry


Facebook Protect was launched in 2018 to give enhanced account security to those
who are at high risk of being targeted by unscrupulous hackers. When this feature is enabled,
account holders will be required to employ two-factor authentication (2FA), which may be
accomplished using third-party authentication applications. The security of online accounts
will be greatly improved as a result of this. This function is for those whose accounts are
vulnerable to cyberattacks or assaults by governments. Human rights activists, journalists and
government officials are among them.
2.0 Enterprise (Meta)
2.1 Summary
In the year 2021, Mark Zuckerberg introduced Meta, a new corporation brand that
unifies various programmers and technology such as Facebook, Instagram, WhatsApp and
others. Meta’s primary goal will be able to bring the metaverse to life by assisting individuals
in connecting, forming communities and expanding their enterprises. Facebook transformed
the way people interacted when it initially launched in 2004. To aid in the development of
next generation of social technologies, Meta is now going beyond 2D displays and into
immersive experiences such as augmented and virtual reality (Meta, 2021).

According to Mark Zuckerberg, Meta was meant to be metaverse first, not Facebook.
In other words, Facebook and social media will no longer be the company’s primary priority.
Rather, it will focus its efforts on developing virtual reality goods and establishing the
Metaverse (Sandercock, 2021).
2.2 Enabling Technologies
2.2.1 Big Data
2.2.1.1 How it is implemented
At Meta, Hadoop has traditionally been used in conjunction with Hive for storage and
analysis of large data sets. The majority of this analysis is done offline in batch operations
with the goal of increasing throughout and efficiency. Typically, these workloads read and
write massive volumes of data from disk in a sequential manner. As a result, less attention
has been placed on making Hadoop performant for random access workloads by offering
low-latency HDFS access. Hadoop instead relied in a mix of huge clusters of MySQL
databases and Memcached caching layers. In many situations, Hadoop results are uploaded to
MySQL or Memcached and then consumed by the web layer (Borthakur, et al.).

2.2.1.2 Advantages/Example of implementation


Meta offered its users were given the option of viewing and sharing a video that
traced the trajectory of their social network activity from the time of registration to the
present in order to honor its 10th anniversary. As mentioned above, termed as the
“Flashback”, this video is basically a compilation of photos and posts that gained the
maximum comments and likes, which are accompanied by nostalgic background music.

Moreover, the movies are shown to users on special events such as their
“friendiversary” also known as the day they become friends on the platform or on the
occasion of the user’s birthday (Rangaiah, 2021).

2.2.1.3 How it contributes to the SOP


COVID-19’s worldwide pandemic has created a massive and diverse amount of data,
which is continually growing. This information may be used in a variety of ways, including
diagnosis, risk estimation ad risk prediction, using big data analytics approaches. Meta can
leverage big data to update the latest daily COVID-19 status on their platform, which will
warn Meta platform users. Meta can also recommend to consumers various critical items like
as hand sanitizers, masks and COVID-19 gloves.
2.2.2 Cloud Manufacturing
2.2.1.1 How it is implemented
Meta is one of the most well-known software firms that does not use AWS or Azure.
Meta for that matter does not use the cloud to store its data (Amyra, 2020). However, Meta
predicts that there will be two major development areas in this industry. First, the metaverse
providers themselves, keeping in mind that if technology investors regard this as a legitimate
possibility, they are likely to see others crop up. The majority of these compute-and graphics-
intensive systems will be developed on public cloud providers, with some using private data
centers and other using managed services.

Those in charge of creating a virtual environment will find pay-as-you-go access to


on-demand computation and storage appealing. The main benefit of public cloud providers is
that they may give scattered points of presence throughout the world, minimizing some of the
delay in transmitting generated visuals back to the user and allowing them to have a more
realistic experience (Linthicm, 2022).

2.2.1.2 Advantages/Example of Implementation


The implementation of cloud manufacturing enables metaverse to store the massive
amounts of users’ data. The Amazon IoT FleetWise service assists automakers with data
collecting, administration and cloud access while the Amazon IoT TwinMaker servie enables
developers to more simply and rapidly create real-world digital twins such as buildings,
factories, industrial equipment and production lines (Lawrence, 2022).

2.2.1.3 How it contributes to the SOP


The notion of cloud computing provides customers with tools to help them operate
their organizations more effectively and save money. As a result of the COVID-19
pandemic’s spread, more individuals whether working adults or students are compelled to
work or study remotely, popular services models such as SaaS and PaaS are in high demand
in CCE. Hence, Meta should take this opportunity to implement cloud manufacturing
technology in Metaverse.
2.2.3 Additive Manufacturing
2.2.1.1 How it is implemented
The design language in the actual world will continue to alter as the Metaverse
evolves. To quote an example, a design team meeting around a virtual model on a regular
base is something different than looking at a few blueprints and some renders once a week.
Viewing the prototype in the virtual model will be easier for the engineers to see what the
designer means and easier for the designer to see what mechanical limitations are going to
face by the engineers while constructing the respective object.

2.2.1.2 Advantages/Example of Implementation


Today, most of the architects will use virtual reality to assist their customer prior to
the commencement of construction. In addition, actual stores are being created in VR to
improve the online purchasing experience. The majority of the audacious concepts don’t
function on paper, but they may in virtual reality. As a result, certain bold virtual reality
designs may frequently necessitate additive manufacturing. As a result, certain bold virtual
reality designs may frequently necessitate additive manufacturing.

2.2.1.3 How it contributes to the SOP


Millions of doctors and clinicians are not protected against the virus due to high
demand for personal protective equipment (PPE) and lack of awareness of government in
preventing the COVID-19 pandemic. Healthcare systems require significant quantities of
medical equipment and gadgets in order to control the spread of illness. In order to address
this need, Meta can emerge AM technologies to solve this problem. To quote an example,
Meta could use their AM technologies to produce 3D face masks, face shield, 3D printed
hand sanitizer holder, Hand gloves and etc. (Equbal, Akhter, Sood, & Equbal, 2021).
2.2.4 Augmented Reality (AR)
2.2.4.1 How it is implemented
The Metaverse’s second Mix Reality (MR) incarnation is under construction and it
will combine social, immersive VR platforms with massive multiplayer online video games,
open worlds and AR collaboration spaces. According to this vision, users can meet, converse
and engage freely in an embodied form as 3D holograms or avatars in actual or virtual
spaces. Within the same platform, this is now achievable with various limits. The next stage
is cross-platform and cross-technology meetings and engagement with some users in VR and
others in AR surroundings. Software connectivity and user teleportation across realities are
two common Metaverse ideas. This needs avatar customization interoperability as well as the
mobility of accessories props and inventories based on industry standards. (Mystakidis,
2022).

2.2.4.2 Advantages/ Example of implementation


In Metaverse, students can take images of things or text that can be then be compared
to desired object or content. In addition, Metaverse also enables students to upload their own
virtual items. This permits the addition of 3D graphics or other digital material to the actual
world as overlays. Students can also create bespoke blocks to utilize in their experiences by
coding them. These blocks can be used to add functionality to existing blocks and shared with
others in the Metaverse repository. Students may learn how experiences function and use it to
inform their own programming if they make their resources available. In Metaverse, students
may learn a variety of skills by developing their own AR experiences, with computational
thinking skills being on of the most generic.

2.2.4.3 How it contributes to the SOP


As COVID-19 spread throughout countries, schools and institutions began to look to
virtual learning options. In order to restrict the spread of the virus, most of the institutions
choose to move the remainder of the semester’s work to online learning solely, while some
shuttered campuses. Students can enjoy the same experience as actual classroom on campus
by studying in the virtual reality environment. Students and teachers may connect in the
virtual world via their virtual reality headsets, regardless of where they are in real life. For
individuals who are motivated to pursue it, such functionality can lead to improved
education.
2.2.5 Cyber Security
2.2.5.1 How it is implemented
Meta has built-in security that aids in the protection of the user and their data. One
primary level of security that Meta uses is called SSL also known as Secure Socket Layer. In
a nutshell, this sort of security encrypts all data sent through Meta-developed programs such
as Facebook, Instagram, Twitter and etc. from login credentials to chat conversations.

Moreover, the server that stores and protects user information has its own built-in
security. An anti-intrusion system in place to prevent hackers from breaking in, invading and
stealing data from users. Antivirus and anti-spyware tools are also used to maintain the
system clean and clear of security risks such as viruses and malware (Computer Hope, 2021).

2.2.5.2 Advantages/Example of implementation


As social engineering and phishing attempts become more common, there will be a
greater need to raise awareness about these risks. In truth, cybersecurity necessitates a holistic
strategy in its whole, focusing on the requirement for a proper combination of security
solutions as well as suitable cybersecurity knowledge.

Meta has added two-factor authentication feature to assist Facebook users safeguard
their accounts. If the user has enabled two-factor authentication, they will be prompted to
provide a unique login code or confirm their login attempt each time someone attempts to
access Facebook using a browser or mobile device that Facebook does not recognize. In
addition, when someone tries to get into the user account, the user will also receive and alert
(Facebook, 2022).

2.2.5.3 How it contributes to the SOP


The increase in remote working necessitates a higher attention on cybersecurity, due
to the increased vulnerability to cyber danger. This is apparent, for example from the fact that
47% of individuals fall for a phishing scam while working at home. As a result, Meta will
need to plan ahead and utilize theta hunting, penetration testing and vulnerability assessments
to guarantee that its security systems are safe, secure and unbreakable. Meta can only achieve
a cyber secure 2022 with the metaverse if each individual recognizes the desperate need to
secure himself and understands the hazards connected with even the tiniest degree of
negligence (Waqas, 2022).

References
Amyra. (22 December, 2020). IntelliPaat. Retrieved from Does facebook use aws or azure:
https://intellipaat.com/community/64801/does-facebook-use-aws-or-
azure#:~:text=Facebook%20is%20one%20of%20the,was%20developing%20back
%20in%202009.

Billinghurst, M., Clark, A., & Lee, G. (2017). A Survey of Augmented Reality. Foundation
and Trends in Human-Computer Interaction, 73-272.

Borthakur, D., Muthukkaruppan, K., Ranganathan , K., Rash, S., Sarma, J. S., Spiegelberg,
N., . . . Aiyer, A. (n.d.). Apache Hadoop Goes Realtime at Facebook.

Cavelty, M. D. (2018). Cyber-Security. Handbook of New Security Studies, 154.

Computer Hope. (2 January, 2021). Computer Hope. Retrieved from Is Facebook safe?:
https://www.computerhope.com/issues/ch000559.htm

Craigen, D., Thibault, N. D., & Purse, R. (2017). Defining Cybersecurity. Technology
Innovation Management Review.

Equbal, A., Akhter, S., Sood, A. K., & Equbal, I. (2021). Annals of 3D Printed Medicine. The
usefulness of additive manufacturing (AM) in COVID-19.

Facebook. (2022). Facebook. Retrieved from Help Centre:


https://www.facebook.com/help/148233965247823

Figone, S. (2022). 10 Industries That Can Benefit from the Cloud. Retrieved from
RapidScale: https://rapidscale.net/resources/blog/desktop-as-a-service/10-industries-
can-benefit-cloud

First, C. (20 June, 2016). ERP Cloud Blog. Retrieved from What is Cloud Manufacturing?:
https://erpsoftwareblog.com/cloud/2016/06/what-is-cloud-manufacturing/

Forcina , A., & Falcone, D. (2021). Procedia Computer Science. The role of Industry 4.0
enabling technologies for safety management: A systematic literature review, 436-
445.

Furht, B. (2018). Handbook of Augmented Reality. Springer.

IDC. (2018). Worldwide Artificial Intelligence Spending Guide. Retrieved from IDC.

kaspersky. (2022). What is Cyber Security? Retrieved from Definition, Types and User
protection: https://www.kaspersky.com/resource-center/definitions/what-is-cyber-
security

Lawrence, L. (25 February, 2022). kilowott. Retrieved from The Metaverse Cloud Wars Have
Begun. Which Side Are You On?: https://kilowott.com/blog/metaverse-cloud-
infrastructure-future/

Lezzi, M., Lazoi, M., & Corallo, A. (2018). Computers in Industry. Cybersecurity for
Industry 4.0 in the current literature: A reference.

Linthicm, D. (8 March, 2022). InfoWorld. Retrieved from Cloud computing and the
metaverse: https://www.infoworld.com/article/3652496/cloud-computing-and-the-
metaverse.html

Martinelli, A., Mina, A., & Moggi, M. (2019). Cyber Security technology aims to protect
shared information against cyber-attacks. The best way to protect the company .

Melnick, K. (2021). The Creator Of ‘Pokémon Go’ Is Building Its Own AR Metaverse.
VRScout.

Meta. (28 October, 2021). Introducing Meta: A Social Technology Company. Retrieved from
Meta: https://about.fb.com/news/2021/10/facebook-company-is-now-meta/

Mystakidis, S. (2022). Metaverse. Encyclopedia, 486-497.

Niantic. (11 May, 2021). Niantic. Retrieved from Niantic Expands Developer Platform and
AR Tools with Niantic Lightship: https://nianticlabs.com/blog/lightship/

Rangaiah, M. (4 February, 2021). analytic Steps. Retrieved from How Facebook uses Big
Data to enhance customer experience: https://www.analyticssteps.com/blogs/how-
facebook-uses-big-data-enhance-customer-experience

Sandercock, H. (19 November, 2021). Facebook name change: what is Meta, meaning of new
name and Metaverse concept - and what Mark Zuckerberg said. Retrieved from
National world: https://www.nationalworld.com/news/facebook-name-change-what-
is-meta-meaning-of-new-name-and-metaverse-concept-and-what-mark-zuckerberg-
said-3436676

SAS. (2022). Big Data: What it is and why it matters. Retrieved from SAS:
https://www.sas.com/en_my/insights/big-data/what-is-big-data.html#:~:text=Big
%20data%20refers%20to%20data,around%20for%20a%20long%20time.
Takyar, A. (2022). Cloud Computing in Healthcare. Retrieved from HOW DOES CLOUD
COMPUTING IMPACT HEALTHCARE INDUSTRY?

Taylor, D. (22 January, 2022). What is Big Data? Introduction, Types, Characteristics,
Examples. Retrieved from Guru99: https://www.guru99.com/what-is-big-data.html

Waqas. (12 February, 2022). VB. Retrieved from How the metaverse could shape
cybersecurity in 2022: https://venturebeat.com/2022/02/12/how-the-metaverse-could-
shape-cybersecurity-in-2022/

Wu, D., Greer, M. J., Rosen, D. W., & Schaefer, D. (2017). Journal of Manufacturing
Systems. Cloud manufacturing: Strategic vision and state-of-the-art, 564-579.

Ziolkowski, M., & Dyl, T. (2020). Possible Applications of Additive Manufacturing


Technologies in Shipbuilding: A Review.

You might also like