We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAbraham Masters
Modified over 3 years ago
IT MANAGEMENT OF HOME SYSTEMS IN HOMES AND LEISURE: NEST THERMOSTAT Zachary Winiecki Period 5
FLOWCHART EXPLANATION Device turned on Connects to Wi-Fi Mode Activated
FLOWCHART EXPLANATION Thermostat mode Dial is turned Temperature changes
FLOWCHART EXPLANATION Security mode Option activated Signal sent to security
FLOWCHART EXPLANATION Smoke Detector Threat detected Signal sent Neutralize threat
HARDWARE Thermostat Smoke Detector Door Sensors
HARDWARE Thermostat Controls temperature and other systems Output/Input/Processing
HARDWARE Smoke Detector Detects fire, CO 2 and smoke. Output
HARDWARE Door Sensors Monitors the use of doors Output
SOFTWARE Nest Learning Software Collects Data Runs all home systems
STAKEHOLDERS Consumers Nest
ADVANTAGE Consumers More secure security and home systems.
DISADVANTAGE Consumers Pay more and deal with bugs at first.
ADVANTAGE Nest Will make lots of money off their innovative system.
DISADVANTAGE Nest Have make new policies to avoid privacy intrusion.
ETHICAL CONCERN Security The system is less susceptible to hackers.
ETHICAL CONCERN Reliability More reliable at keeping houses secure.
ETHICAL CONCERN Policies New polices on the uses.
WORK CITED http://www.itpro.co.uk/security/19204/leaving-door-unlocked-information-security (Picture of security) http://www.itpro.co.uk/security/19204/leaving-door-unlocked-information-security http://blog.alightplanning.com/bid/125845/Number-Misnomers (Picture of reliability) http://blog.alightplanning.com/bid/125845/Number-Misnomers http://www.sonoma.edu/reslife/help/policies.html (Picture of policies) http://www.sonoma.edu/reslife/help/policies.html http://techcrunch.com/2012/05/08/the-future-is-going-retail-nest-thermostat-now-selling-at-lowes/ (Picture of Nest Learning Software) http://techcrunch.com/2012/05/08/the-future-is-going-retail-nest-thermostat-now-selling-at-lowes/ http://www.businessinsider.com/nest-smoke-detector-2013-10 (Picture of Smoke Detector) http://www.businessinsider.com/nest-smoke-detector-2013-10 http://www.aliexpress.com/item-img/GSM-Home-Alarm-System-with-Wireless-Door-Sensor-window-sensor-and-PIR- motion-sensor/748142495.html# (Picture of Door Sensor) http://www.aliexpress.com/item-img/GSM-Home-Alarm-System-with-Wireless-Door-Sensor-window-sensor-and-PIR- motion-sensor/748142495.html# http://mashable.com/2012/10/15/foodsmart-app/ (Picture of consumers) http://mashable.com/2012/10/15/foodsmart-app/ http://www.lakelandgov.net/lpd/SpecialSvcs/CommunityServicesSection/CommunityServicesUnit/SecureYourHo me.aspx (Picture of secure house) http://www.lakelandgov.net/lpd/SpecialSvcs/CommunityServicesSection/CommunityServicesUnit/SecureYourHo me.aspx http://www.geekosystem.com/google-bug-reward-20-large/ (Picture of money) http://www.geekosystem.com/google-bug-reward-20-large/ http://ucbstartupfair.com/attendees/previous (Picture of nest) http://ucbstartupfair.com/attendees/previous http://sjvceonews.blogspot.com/2012/10/smartphone-solutions-for-energy-problems.html (Picture of nest system) http://sjvceonews.blogspot.com/2012/10/smartphone-solutions-for-energy-problems.html http://blog.sgrouples.com/sgrouples-ceo-on-huffpost-freedom-from-unauthorized-intrusion/ (Picture of policies against privacy intrusion) http://blog.sgrouples.com/sgrouples-ceo-on-huffpost-freedom-from-unauthorized-intrusion/ http://www.gizmag.com/nest-labs-releases-upgraded-learning-thermostat/24448/ (Picture of Nest Thermostat 2) http://www.gizmag.com/nest-labs-releases-upgraded-learning-thermostat/24448/ http://www.fastcompany.com/3019628/nest-reimagines-the-smoke-detector-with-less-false-alarm-hassle (Picture of black nest thermostat) http://www.fastcompany.com/3019628/nest-reimagines-the-smoke-detector-with-less-false-alarm-hassle http://siliconangle.com/blog/2014/01/20/trust-is-nests-new-angle-as-hackers-attack-smart-home/ (article) http://siliconangle.com/blog/2014/01/20/trust-is-nests-new-angle-as-hackers-attack-smart-home/
Hardware – Missile Defense System Politics and Government Espionage Justin Modi.
Monitoring, measurement and control technology. Definition of data logging Data logging – collecting data automatically from sensors over a certain period.
Embedded Design Using ARM For Strong Room Security System
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
AUTOMATING HOME SECURITY RYAN C. KRAUSE. BACKGROUND: HOME SECURITY Many providers including, self-building kits ADT, Gaurdian, Xfinity, LifeShield, Protection.
How Electronic Security Solutions can Help the Government in Securing its Assets and Reduce Energy expenditure Presented By- Nimish Vishnoi Manager-Product.
Saving Energy, Timer & Automation Best Design Course 30 Minutes Test 10 Minutes TIS Training Program 2012, Rev 1.1
Vincent Quick MIS 304 November 15, Founders Tony Fadell Apple employee, the “Father of the iPod” Matt Rogers Apple employee, iPod software.
Print Lock Madison Elmer. Ally Bushman. Anita Bui. “No more keys, no more hassle”
BUILDING SECURITY ALARM SYSTEM. BUILDING SECURITY ALARM SYSTEM Any electrical or mechanical device which is designed or used for the detection of an unauthorized.
Research Directions for the Internet of Things Supervised by: Dr. Nouh Sabry Presented by: Ahmed Mohamed Sayed.
An operating system (OS) is a collection of system programs that together control the operation of a computer system.
COMPUTER CONTROL Year 11. Lesson 1 Introduction to Computer Control.
Telephone Call Interception System Kevin Colkitt Personal and Public Communications.
The Circuit Home Security Systems are a simple electric circuit. To open or close a light, you simply throw a switch. In a burglar alarm it?s the.
FALSE ALARM PREVENTION FOR YOUR HOME 1. Introduction 2 FARA Tips for Residences What is a false alarm? Why are false alarms a problem? How do alarm systems.
Smart Home Automation Ernesto Castillo Tong Moua Julie Xiong Garitt Church.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
© 2017 SlidePlayer.com Inc. All rights reserved.