Precision can help you craft & successfully execute your IoT initiative. Discover how in our guide featuring exclusive research from
IoT has been in the news for a while and businesses are coming up with ideas & use cases that they would like to see carried forward. CIOs & CDOs are now faced with the task of building & implementing an IoT solution that suits the needs of the business. There is a lot of information on aspects to consider whilst embarking on an IoT mission. Many of them make sense but they do often conflict with each other and do not go far enough in their analysis.
It is in situations like this that a ready to use framework would come in handy to ease the process of building an IoT solution. Precision brings its more than two decades of experience in the IT industry to assist in your IoT journey by collaborating with you from the IoT idea envisioning phase right through to implementation.
Precision has employed its expertise and experience to create PIVOT, Precision's Value added IoT framework (PIVOT), which provides you with all the tools necessary to quickly develop a solution that is right for you.
'PIVOT' is Precision's end-to-end, modular, value added IoT framework, which has been designed to adapt rapidly and easily to IoT solution needs, be it Industrial IoT, Enterprise IoT or Consumer IoT solutions.
PIVOT employs best in class tools and techniques to:
In the PIVOT Architecture, 'things' represent the communication module of a device that is connected to the network. All data collection and controls happen through communication to a 'thing'. A 'thing' contains one or more 'controllers' (hardware pieces that are part of a thing). A 'controller' in turn, may contain one or more modules (software blocks) that represent a 'sensor' or a 'controlled device'. There are many types of modules defined in PIVOT that makes it easy to build a system quickly and has built in support for information gathering and command execution.
'Site' is a physical location such as a home, office or factory that has one or more 'things' in it. A 'user' is a person who has access to the site or multiple sites with a 'role' assigned to each site.
PIVOT allows for the implementation in different 'modes' as described below, in order to provide flexibility to address all kinds of usage scenarios:
Direct Mode: Where the user operates a standalone thing such as a home appliance. In this scenario, the thing is operated in a 'direct mode' without having to communicate through a gateway. Primarily,
Gateway Mode: In scenarios where many 'things' are available in a site, it is meaningful to have a 'gateway'. The PIVOT gateway acts as an intermediary between 'things' and the 'cloud' server. This enables the user to operate and monitor all 'things' at the site through the gateway, without having to individually & directly connect to them.
Cloud Mode: Regardless of whether the user has a gateway or not, operation through the 'Cloud' server is always possible. This comes in particularly handy when the user is not at the site and wishes to monitor and control 'things' at the site. In this case, the user connects to the 'Cloud' server and performs the desired tasks.
PIVOT is not only strong on embedded board & electronic controls, it also supports analytics for data gathered from various 'sensors' and 'control devices'. PIVOT's analytics module caters to analytics from both the user perspective, wherein it provides reports on usage & forecasts based on history and trend analysis, and from the smart device's manufacturer's perspective, wherein it provides reports on the performance of 'things' on the field, including monitoring of devices, tracking service history, warrantees and so forth.
PIVOT uses SQL/NoSQL databases and advanced analytical tools and technologies.
Precision employs widely used protocols in PIVOT and shall keep enhancing the protocol stack in line with the industry trends and optimized applicability. PIVOT implements Web sockets and supports MQTT, CoAP & Modbus. In terms of Security, PIVOT secures different layers of its architecture through appropriate standards such as role based user authentication, Site IDs, Site Authentication Codes, SSL, WPA2 and so forth.
We understand that IoT implementation does not conform to the age old 'waterfall' model where you can smoothly transition from one stage to the other. We will liaise with your business to understand the priorities, do the necessary preparations and develop a prototype quickly to demonstrate the validity of the IoT idea and the value it can bring to your company.
The possibilities are endless. Give us a call and experience the difference.