Internet of Things - Technology focus
42.9K views | +2 today
Follow
Internet of Things - Technology focus
Your new post is loading...
Your new post is loading...
Scooped by Richard Platt
Scoop.it!

This Guy Won $25,000 For a Brilliant App that May Never Get Made

Steve Castle entered the Federal Trade Commission’s “Internet of Things Home Inspector Challenge" and won with a brilliant idea for fighting consume
Richard Platt's insight:

The mobile app he proposed seeks to help users manage the IoT devices in their home. It would enable users with limited technical expertise to scan their home wifi and bluetooth networks to identify and inventory connected devices. It would flag devices with out-of-date software and other common vulnerabilities and provide instructions on how to update each device’s software and fix other vulnerabilities.

No comment yet.
Scooped by Richard Platt
Scoop.it!

Bluetooth Mesh Solutions for the IoT 

Bluetooth Mesh Solutions for the IoT  | Internet of Things - Technology focus | Scoop.it
Silicon Labs releases suite of BLE mesh networking tools.
Richard Platt's insight:

So what does this mean for the Internet of Things (IoT)? The Bluetooth SIG certainly expects the new capability to make big waves, predicting Bluetooth mesh networks will “eventually become a common technology in the larger Internet of Things ecosystem.”   Semiconductor company Silicon Labs is also betting on the technology, given that they recently released a suite of software and hardware tools for BLE mesh developers. The tools include a variety of Bluetooth mesh modules, system-on-chip (SoC) and system-in-package (SiP) developer kits, and software development kits (SDKs). According to Silicon Labs, these tools will enable IoT developers to cut their time to market by six months (which, as we all know, is an eternity in the tech world).  "We expect to see a wave of new devices hit the market quickly by leveraging ubiquitous Bluetooth connectivity to create hub-less mesh networks that extend the range and reliability of Bluetooth systems," said Silicon Labs’ Daniel Cooley. "No matter which mesh technology developers choose to power their next IoT designs, we offer a complete portfolio of silicon, software and solutions that gives device makers everything they need to accelerate time to market while designing secure, robust mesh networks."  While Bluetooth isn’t the only technology for mesh networks, it certainly has its share of advantages. Chief among these is the ubiquity and familiarity of Bluetooth devices. Consumers favor brands they recognize, and by now, just about everyone on Earth recognizes the runic Bluetooth logo. Aside from that, Bluetooth has the proven security and low-power requirements that are necessary for IoT applications.

No comment yet.
Scooped by Richard Platt
Scoop.it!

Multi-function environmental sensor targets the Internet of Things | Engineer Live

Multi-function environmental sensor targets the Internet of Things | Engineer Live | Internet of Things - Technology focus | Scoop.it
Designed for monitoring temperature, humidity, light, UVI, barometric pressure, noise and acceleration
Richard Platt's insight:

Omron Electronic Components Europe has developed an environmental sensor that allows designers to monitor seven parameters from a single module measuring 46 x 39 x 15mm and weighing 16g.  The 2JCIE-BL01 is specifically designed for the growing number of autonomous IoT systems, monitoring temperature, humidity, light, UVI, barometric pressure, noise and acceleration. 

No comment yet.
Rescooped by Richard Platt from d@n3n
Scoop.it!

IoT Security Testing Methodology | Rapid7

IoT Security Testing Methodology | Rapid7 | Internet of Things - Technology focus | Scoop.it

When examining IoT technology, the actionable testing focus and methodology is often applied solely to the embedded device. This is short sighted and incomplete. An effective assessment methodology should consider the entire IoT solution or as we refer to it, the IoT Product Ecosystem.


Via Danen Raas
Richard Platt's insight:

When examining IoT technology, the actionable testing focus and methodology is often applied solely to the embedded device. This is short sighted and incomplete. An effective assessment methodology should consider the entire IoT solution or as we refer to it, the IoT Product Ecosystem.

No comment yet.
Rescooped by Richard Platt from Internet of Things & Wearable Technology Insights
Scoop.it!

96% Challenged by IoT Projects, 42% Targeting Consumers

96% Challenged by IoT Projects, 42% Targeting Consumers | Internet of Things - Technology focus | Scoop.it

But the success metrics are but one of the challenges of IoT implementation. Almost all (96%) of those involved in IoT projects say they face challenges in one form or another.

The challenges range from policies to issues with the actual technology. For any of you involved in IoT projects, this list of challenges from those already involved in IoT may sound familiar:

58% -- Business processes or policies, such as privacy issues
51% -- User adoption of new technology
41% -- Timely collection and analysis of data
40% -- Sensors or devices....


Via Jeff Domansky
Richard Platt's insight:

Only a third (33%) of those involved in IoT have quantifiable metrics to track success, according to the study IoT Meets Big Data and Analytics.  The study, conducted by Dimensional Research for ParStream, comprised an online survey of 200 businesspeople who have professional responsibility for IoT projects.   Almost half (47%) said their IoT initiatives were driven by strategic business investments and 42% are targeting consumers.  But the success metrics are still somewhat of a work in progress. Here’s how the success of IoT projects are evaluated:

  • 38% -- Objective is to explore options, so the process of learning will be the business success
  • 33% -- Have quantifiable metrics to track success
  • 29% -- Have documented goals, but they are difficult to quantify

But the success metrics are but one of the challenges of IoT implementation. Almost all (96%) of those involved in IoT projects say they face challenges in one form or another.  The challenges range from policies to issues with the actual technology. For any of you involved in IoT projects, this list of challenges from those already involved in IoT may sound familiar:

  • 58% -- Business processes or policies, such as privacy issues
  • 51% -- User adoption of new technology
  • 41% -- Timely collection and analysis of data
  • 40% -- Sensors or devices
Jeff Domansky's curator insight, October 28, 2015 2:29 PM

Challenges ahead for IOT, but market potential is irresistible if business can solve some of the potential problems.

YoloCommunications's curator insight, October 29, 2015 5:23 AM

Aside from IoT having a mystique to the term, why would this area be treated or approached any differently to any other new business proposition? After a business plan is developed, there should be a marketing strategy coupled with clear quantifiable metrics to gauge success and if those can be met then the prospects are extremely exciting.

Scooped by Richard Platt
Scoop.it!

The internet of things and cybersecurity vulnerabilities - IoT Agenda

IoT creates cybersecurity vulnerabilities in every capacity, from homes to critical infrastructure. Cytellix's Brian Berger offers tips to help stay safe.
Richard Platt's insight:

Lastly, manufacturing sensors and devices are a common threat, as they are unmanaged. As seen with  Petya,  NotPetya  and WannaCry, unmanaged devices have been the target for spreading ransomware across networks. The attackers are looking for the easiest entry point and the sensors of unmanaged IoT devices, which have become active targets. Manufacturing under government contracts has been a key target and supply chain SMBs now have required guidance for compliance. Some of the most critical aerospace designs have been stolen through cyberattacks that have a significant effect on our national security, as well as the economy for lost programs from these smaller manufacturers, whereas in food safety, the monitoring and prevention of agroterrorism is paramount to protect our national food supply.  What should we do? The list of actions remains very similar. Make sure all devices are not set to default (i.e., change passwords) — this is a typical flaw in the devices of SMBs as well as consumer devices. Verify all devices and sensors are managed and monitored. Properly segment your network — create an internal, guest and IoT network at a minimum. Some other helpful considerations around a cybersecurity program include updating firewalls, securing remote access, reviewing security configurations, operating system updates and patches, training staff members, improving security policies and changing control procedures.

No comment yet.
Scooped by Richard Platt
Scoop.it!

This Wearable Chair Looks Ridiculous, But It Solves a Real Problem

This Wearable Chair Looks Ridiculous, But It Solves a Real Problem | Internet of Things - Technology focus | Scoop.it
The Chairless Chair could be a lifesaver for factory workers.
Richard Platt's insight:

But once you shake off the initial giggles of seeing someone wearing a robot suit and squatting by their workstation, the applications of the device become clear. For people who work with heavy machinery or on production lines or do other jobs that require long periods of standing, The Chairless Chair could be a lifesaver.  Sitting is not always feasible in those kinds of environments, due to the clutter chairs could create. And standing in non-ergonomic positions for long periods of time can lead to joint issues. The company claims its product could lead to fewer employee absences caused by injuries.

No comment yet.
Rescooped by Richard Platt from d@n3n
Scoop.it!

Analysis of data harvested by Kaspersky Lab’s IoT honeytraps

Analysis of data harvested by Kaspersky Lab’s IoT honeytraps | Internet of Things - Technology focus | Scoop.it

There were a number of incidents in 2016 that triggered increased interest in the security of so-called IoT or ‘smart’ devices. They included, among others, the record-breaking DDoS attacks against the French hosting provider OVH and the US DNS provider Dyn. These attacks are known to have been launched with the help of a massive botnet made up of routers, IP cameras, printers and other devices.


Via Danen Raas
No comment yet.
Rescooped by Richard Platt from Internet of Things & Wearable Technology Insights
Scoop.it!

Easily Hacked Tea Kettle Latest To Highlight Pathetic Internet Of Things 'Security'

Easily Hacked Tea Kettle Latest To Highlight Pathetic Internet Of Things 'Security' | Internet of Things - Technology focus | Scoop.it

We've discussed at length that companies rushing to embrace the "Internet of Things" (read: networked devices for those of us not in marketing) tend to have completely forgotten a little something called device security. As a result we're now bombarded week after week with stories about cars that can be controlled remotely, televisions that share your unencrypted living room conversations with anybody on the Internet, and refrigerators that leave the door wide open to having your e-mail password stolen. Some of these are kind of cute exploits, but many of them could be potentially fatal.

While these companies are desperately trying to highlight the wonderful future of Internet connected devices, they've inadvertently been creating advertisements for why many devices should just remain stupid. Especially if you're going to cut corners in development so device security is an afterthought, or cut corners post release when it comes to quickly identifying and patching exploits.

The latest case in point: the $150 iKettle by UK company Smarter promises to save its users "two days a year in wasted waiting time" over traditional tea kettles. How? Users can remotely turn the kettle on from anywhere via smartphone app, potentially letting users walk into the house just as the kettle comes to a boil. Avoiding the horrible task of having to walk a few feet and wait a few minutes is the pinnacle of modern engineering to be sure; the problem is that for the better part of this year researchers have been noting that the security on the kettle was virtually nonexistent...


Via Jeff Domansky
Richard Platt's insight:

More detail on the tea kettle that can be hacked and understand how this thing called WiFi technology needs a bit more robustness to mitigate the threat of being hacked.  Read on.

Jeff Domansky's curator insight, October 28, 2015 2:33 PM

Here's a look inside the challenge of security for Internet of things products.