"Today computers and, therefore, the internet are almost wholly dependent on human beings for information. Nearly all of
the roughly 50 petabytes (a petabyte is 1,024 terabytes) of data available on the internet were first captured and created by human beings
by typing, pressing a record button, taking a digital picture or scanning a bar code. The problem is, people have limited time, attention
and accuracy all of which means they are not very good at capturing data about things in the real world. If we had computers that knew
everything there was to know about things using data they gathered without any help from us we would be able to track and count
everything and greatly reduce waste, loss and cost. We would know when things needed replacing, repairing or recalling and whether
they were fresh or past their best."
Published In : IJCSN Journal Volume 8, Issue 2
Date of Publication : April 2019
Pages : 160-162
Figures :--
Tables : --
Navneet Sandhu :
Chandigarh Engineering College, Landran.
Sheilly Padda :
Chandigarh Engineering College, Landran.
Umesh Sehgal :
Chandigarh Engineering College, Landran.
The future IoT will require significant changes in
supporting infrastructure to accommodate the increased
number of addressable sensors and devices, and the
diversity in how those devices communicate. It is however
unclear what architectural changes will occur, since
relevant interoperability guidelines, communication
standards, and vendor designs are still immature. The main
benefits of autonomous capabilities in the future IoT is to
extend and complement human performance.
[1] https://e27.co/advantages-disadvantages-internetthings-
20160615/
[2] https://www.linkedin.com/.../pros-cons-internetthings-
iot-bhaskara-reddy-sannapured..
[3] https://www.buzzle.com/articles/pros-and-cons-ofinternet-
of-things-iot.html
[4]
https://www.networkworld.com/article/3166106/in
ternet-of-things/4-critical-security-challengesfacing-
iot.html.
[5]
https://www.researchgate.net/.../307873475_In_C
onclusion_The_Future_Internet_of
[6] https://link.springer.com/content/pdf/10.1007/978-
3-319-32125-7_16.pdf
[7] https://www.linkedin.com/.../iot-wireless-securityvulnerabilities-
solutions-conclusion.