18:15 - 18:20 WELCOME
18:20 - 18:30 Simon Montford (http://www.simonmontford.com/) (WEB3//IOT (http://www.web3iot.com/))
Open Forum; members are invited to make announcements, share news, seek project collaborators, promote their IoT events, and request topics for future Meetups.
18.30 - 18.50 Martin Hawksey (https://uk.linkedin.com/in/mhawksey) (Assoc for Learning Tech, UK)
Google Analytics continues to evolve and this presentation will offer hacks, insights, and inspiration. The talk will explore how Google Analytics can be used as part of the IoT using devices such as Raspberry Pis for recording and analysing everything from sensor data to physical switches. We'll also look at bridging offline and asynchronous tracking sending measurement data in batches when connectivity is reestablished as well as pushing data from third party APIs into Google Analytics using free tools.
18:50 - 19:10 Richard Taylor (https://www.linkedin.com/in/richard-taylor-b69a93/)(Critical Blue (https://www.criticalblue.com/))
Properly used, API keys and tokens for mobile apps and IoT devices play an important role in web application security, efficiency, and usage tracking. Though simple in concept, API keys and tokens have a fair number of gotchas to watch out for. In this talk I will start off with a very simple example of API key usage and iteratively enhance its API protection up to the deployment of an OAuth2 based solution while (hopefully!) not getting bogged down the the complexities of the protocols involved. This should provide you with enough knowledge to deploy your own API keys successfully.
19:10 - 19:30 Barry O'Rourke (https://www.linkedin.com/in/barry-o-rourke-81917b6/) (Critical Blue (https://www.criticalblue.com/))
The causes of security breaches are often obvious with hindsight. The terrible truth is that, in the rush to market, many companies fail to ensure their products are adequately secure before they are built and shipped to customers. In a bid to improve things a little, Barry will introduce the idea of Threat Analysis. This straightforward approach to identifying potential security threats, and mitigating them, can be quickly applied to new and existing systems, and you won't need to be a security expert to understand and follow his recommendations.
19:30 -19:50 DISCUSSION & PANEL Q&A
19:50 - 21:00 NETWORKING & DRINKS
To receive IoT news, meet and interact with other IOT//SCT members, and keep the conversation going online before and after each Meetup, please join us on social media:
Website: www.iotSct.com (http://www.iotsct.com/)
Facebook: www.facebook.com/iotSct (http://www.facebook.com/iotSct)
Hashtags: #iotsct #iotedi #iotgla
Website: www.web3iot.com (http://www.web3iot.com/)
Youtube: www.youtube.com/web3iot (http://ow.ly/10EROx)
Events: www.web3iot.com/events (http://www.web3iot.com/meetups.html)
Submit a guest blog: http://www.web3iot.com/contact
Receive update via email: www.web3iot.com/newsletter (http://ow.ly/10ESpD)
Simon Montford: www.simonmontford.com (http://www.simonmontford.com/)
Emma MacLean: Linkedin/EmmaMaclean (https://uk.linkedin.com/in/emma-maclean-544b9b41)
Dr Tim Willis: Linkedin/TimWillis (https://uk.linkedin.com/in/dwillis1)
Allan Lloyds: Linkedin/AllanLloyds (https://uk.linkedin.com/in/allanclloyds)
Tabeetha Sun: Linkedin/ (https://uk.linkedin.com/in/tabeetha-sun-b07980106)TabeethaSun (https://uk.linkedin.com/in/tabeetha-sun-b07980106)
Alice Dréano: Linedin/JakubTansey (https://uk.linkedin.com/in/jakub-tansey-45510680)