HOME
Disclaimer
Required Tools
1.
IoT Introduction
1.1.
Introduction
1.2.
IoT Use Cases
1.3.
JOBS
1.4.
Terminologies
1.5.
Evolution of IOT
1.6.
Protocols
1.7.
IOT Stack Overview
1.8.
Lower Stack
1.9.
Upper Stack
1.9.1.
Upper Stack Deepdive
1.10.
Puzzle
2.
Data Processing
2.1.
Application Layer
2.1.1.
MQTT
2.1.2.
JSON
2.1.3.
CBOR
2.1.4.
XML
2.1.5.
MessagePack
2.1.6.
Protocol Buffers
2.1.7.
HTTP & REST API
2.1.7.1.
Statefulness
2.1.7.2.
Statelessness
2.1.7.3.
REST API
2.1.8.
CoAP
2.2.
Python Environment
2.2.1.
Concurrent & Parallel
2.2.2.
Code Quality & Safety
2.2.3.
Error Handling
2.2.4.
Faker
2.2.5.
Logging
2.3.
Containers
2.3.1.
VMs or Containers
2.3.2.
Podman-Docker
2.3.3.
How Container helps
2.3.4.
Container Examples
2.4.
Time Series Databases
2.4.1.
InfluxDB
2.5.
Data Visualization libraries
2.5.1.
Grafana
3.
Machine Learning with IoT
3.1.
Predictive Maintenance
3.2.
Anomaly Detection
3.3.
ML with IoT
4.
Security
4.1.
Introduction
4.2.
Application Layer
4.3.
Data Layer
4.4.
Communication Layer
4.5.
Number Systems
4.6.
Encryption
4.7.
IoT Privacy
4.8.
Auditing in IoT
5.
Edge Computing
5.1.
Introduction
5.2.
Duck DB
5.3.
IFTTT
6.
IoT Cloud Computing
6.1.
Introduction
6.2.
Terms to Know
6.3.
Types of Cloud
6.4.
IoT Cloud
6.5.
Pros and Cons
6.6.
High Availability
Good Reads
Notebooks vs IDE
Assignments
Light
Rust
Coal
Navy
Ayu
Adv - IoT Upper Stack