Internet of Things - Technology focus
42.9K views | +2 today
Internet of Things - Technology focus
Your new post is loading...
Your new post is loading...
Rescooped by Richard Platt from The Blockchain Revolution
Scoop.it!

IoT and Blockchain: A Happy Marriage or a Messy Divorce? –

IoT and Blockchain: A Happy Marriage or a Messy Divorce? – | Internet of Things - Technology focus | Scoop.it
The Internet of Things has its problems. Even the biggest advocate for IoT tech will admit there’s a lot of work ahead. Scalability and security seem to be major issues on the horizon, and the juryâ

Via Lionel Gikonyo
Richard Platt's insight:

But what about the companies successfully using blockchain with IoTZEDEDA leverages unikernel technology to build a cloud-native edge computing platform. It’s designed to enable the hyper-scale required for real-time​ IoT​ edge applications, from self-driving cars to industrial robots. This cloud-native solution creates the framework required for blockchain integration within IoT.  Joel Vincent, the company’s CMO, explains, “As the world becomes more cyber-physical and connected, we’re creating cloud-native edge computing that will take the principles of cloud computing, allow developers to move applications to edge systems and out of the data center, ultimately shrinking the concept of real time… to microseconds to interpret data and make a car swerve. We’re doing this with a combination of distributed computing, peer-to-peer crypto-routing, embedded virtualization, and soon blockchain and smart contracts.”

Vincent believes that blockchain tech is pivotal to IoT’s success, postulating that the real value lies in “data provenance as well as value exchange.”  A data provenance service would allow an app developer to add devices to the network and have every piece of data tracked. The data could only be accessed by others with the express permission of the originator. “This service can be provided to that app by a platform via smart contracts and blockchain,” Vincent says.   Value exchange would remove the problem of ROI from having expensive technology in latent devices. When devices need to temporarily connect, “such as in a public safety app in a Smart City,” security cameras could collaborate through the blockchain, as needed, until the task was completed. Every security camera owner would be compensated and their camera then re-released.

Lionel Gikonyo's curator insight, April 22, 2018 1:56 PM

"The Internet of Things has its problems. Even the biggest advocate for IoT tech will admit there’s a lot of work ahead. Scalability and security seem to be major issues on the horizon, and the jury’s still out on whether blockchain can be part of the solution."

Scooped by Richard Platt
Scoop.it!

This Guy Won $25,000 For a Brilliant App that May Never Get Made

Steve Castle entered the Federal Trade Commission’s “Internet of Things Home Inspector Challenge" and won with a brilliant idea for fighting consume
Richard Platt's insight:

The mobile app he proposed seeks to help users manage the IoT devices in their home. It would enable users with limited technical expertise to scan their home wifi and bluetooth networks to identify and inventory connected devices. It would flag devices with out-of-date software and other common vulnerabilities and provide instructions on how to update each device’s software and fix other vulnerabilities.

No comment yet.
Scooped by Richard Platt
Scoop.it!

Preparing for the future by securing the Internet of Things 

The 2017 Black Hat cybersecurity conference has focused on the security of the Internet of Things. How can we secure these technologies moving forward?
Richard Platt's insight:

This year’s Black Hat presentations demonstrated potentially devastating attacks on the often cheaply-made, portable network-connected devices that make up the “Internet of Things,” or IoT. Hackers at the conference have shown how simple tools and attack techniques can exploit vulnerabilities in the inexpensive and unsecure designs of many IoT items. This means that simple, internet-enabled items like temperature gauges, smart TVs, game consoles, vacuums, or even refrigerators could give hackers access to an entire network’s operations. The cybersecurity risks of IoT devices have already been made readily apparent to the public, with the widespread internet disruption caused by a massive distributed denial-of-service (DDoS) attack in October 2016 that turned ordinary devices (like TV cameras and home routers) into weapons.  IoT devices are often vulnerable to attack because manufacturers want market friendly, inexpensive designs that consumers will want to adopt. Because security measures add complexity and cost to technology, they are omitted, especially as society has become accustomed to cheaper, simple-to-use devices. As the phrase “plug and play” demonstrates: You open the box, plug the device in; it connects to a network and starts operating.  To address this problem, security needs to be part of the manufacturing process to ensure a safely designed “thing” is available for consumers to purchase. There is a push by the security community to create “security by design,” or the practice of building security into the basic design of devices that will be attached to a network rather than trying to patch designs after they’ve been connected to the network.

No comment yet.
Scooped by Richard Platt
Scoop.it!

This Wearable Chair Looks Ridiculous, But It Solves a Real Problem

This Wearable Chair Looks Ridiculous, But It Solves a Real Problem | Internet of Things - Technology focus | Scoop.it
The Chairless Chair could be a lifesaver for factory workers.
Richard Platt's insight:

But once you shake off the initial giggles of seeing someone wearing a robot suit and squatting by their workstation, the applications of the device become clear. For people who work with heavy machinery or on production lines or do other jobs that require long periods of standing, The Chairless Chair could be a lifesaver.  Sitting is not always feasible in those kinds of environments, due to the clutter chairs could create. And standing in non-ergonomic positions for long periods of time can lead to joint issues. The company claims its product could lead to fewer employee absences caused by injuries.

No comment yet.
Scooped by Richard Platt
Scoop.it!

Garmin finds a new target for its wearables: seniors - Kansas City Business Journal

Garmin finds a new target for its wearables: seniors - Kansas City Business Journal | Internet of Things - Technology focus | Scoop.it
Garmin will bring wearables to senior-living communities through a new partnership with a North Carolina-based Internet-of-Things developer.
Richard Platt's insight:

K4Connect’s community package integrates smart thermostats, lights and communication with family members via a tablet app. Through the partnership with Garmin, residents can track their steps, sleep and other health metrics, which can be shared with family and senior-living staff members.  “The data from the device goes directly into the platform,” said Sean McNamara, manager of health partnerships for Garmin. “We see that as a huge market — you throw it on and don’t have to think about it.”  Johnson added that initial deployments of the product delivered good results, with high use rates among elder residents.

The partnership is just one piece of a broader initiative by Garmin to expand wearable device uses outside the current consumer base. Although the wearables market is saturated with a number of competitors, Garmin still may seek opportunities by expanding its age demographic (including an activity tracker for kids introduced last year) and through business-to-business opportunities. The Garmin health team has worked to foster relationships with everything from insurance companies, such as Blue Cross and Blue Shield of Kansas City, to gym chains.  “Even on the wellness side, there’s still such a massive user base that will continue to grow over the next three to four years,” McNamara said. “As technology becomes more pervasive in senior-living markets and things like that, objective data from these devices is going to be so valuable.”

No comment yet.
Rescooped by Richard Platt from Enterprise Architecture
Scoop.it!

The future of the IoT job market

The future of the IoT job market | Internet of Things - Technology focus | Scoop.it
Since the dawn of technology, we’ve been afraid of technology eliminating our jobs. Look at the birth of the steam engine. When it was invented in the late..

Via Emeric Nectoux
Richard Platt's insight:

In a nutshell, IoT will do exactly what technology does everywhere — it supplants low-skill jobs with high-skill jobs. Eventually, the Internet of Things will lead to widespread replacement of simple and repetitive jobs in areas such as manufacturing, administration, quality control and planning. But more importantly, IoT will lead to the creation of new jobs that will help organizations champion and pioneer not only their personal success with IoT, but the success of the business as well.

No comment yet.
Rescooped by Richard Platt from Internet of Things & Wearable Technology Insights
Scoop.it!

Connected kettles boil over, spill Wi-Fi passwords over London

Connected kettles boil over, spill Wi-Fi passwords over London | Internet of Things - Technology focus | Scoop.it

A security man has mapped and hacked insecure connected kettles across London, proving they can leak WiFi passwords.

The iKettle is designed to save users precious seconds spent waiting for water to boil by allowing the kitchen staple to be turned on using a smartphone app.

Pen Test Partners bod Ken Munro says hackers can make more than a cuppa, however: armed with some social engineering data, a directional antenna, and some networking gear they can "easily" cause the iKettle to spew WiFi passwords.

"If you haven’t configured the kettle, it’s trivially easy for hackers to find your house and take over your kettle," Munro says. "Attackers will need to setup a malicious network with the same SSID but with a stronger signal that the iKettle connects to before sending a disassociation packet that will cause the device to drop its wireless link....


Via Jeff Domansky
Richard Platt's insight:

A security man has mapped and hacked insecure connected kettles across London, proving they can leak WiFi passwords.  The iKettle is designed to save users precious seconds spent waiting for water to boil by allowing the kitchen staple to be turned on using a smartphone app.  Pen Test Partners bod Ken Munro says hackers can make more than a cuppa, however: armed with some social engineering data, a directional antenna, and some networking gear they can "easily" cause the iKettle to spew WiFi passwords.  "If you haven’t configured the kettle, it’s trivially easy for hackers to find your house and take over your kettle," Munro says. "Attackers will need to setup a malicious network with the same SSID but with a stronger signal that the iKettle connects to before sending a disassociation packet that will cause the device to drop its wireless link....

Jeff Domansky's curator insight, October 28, 2015 2:38 PM

Great story about the potential security issues with IoT products. it highlights how did simple it is to hack devices that are poorly or not configured or password-protected. Who'd a thought? Invasion of the connected kettles?

Rescooped by Richard Platt from Internet of Things & Wearable Technology Insights
Scoop.it!

96% Challenged by IoT Projects, 42% Targeting Consumers

96% Challenged by IoT Projects, 42% Targeting Consumers | Internet of Things - Technology focus | Scoop.it

But the success metrics are but one of the challenges of IoT implementation. Almost all (96%) of those involved in IoT projects say they face challenges in one form or another.

The challenges range from policies to issues with the actual technology. For any of you involved in IoT projects, this list of challenges from those already involved in IoT may sound familiar:

58% -- Business processes or policies, such as privacy issues
51% -- User adoption of new technology
41% -- Timely collection and analysis of data
40% -- Sensors or devices....


Via Jeff Domansky
Richard Platt's insight:

Only a third (33%) of those involved in IoT have quantifiable metrics to track success, according to the study IoT Meets Big Data and Analytics.  The study, conducted by Dimensional Research for ParStream, comprised an online survey of 200 businesspeople who have professional responsibility for IoT projects.   Almost half (47%) said their IoT initiatives were driven by strategic business investments and 42% are targeting consumers.  But the success metrics are still somewhat of a work in progress. Here’s how the success of IoT projects are evaluated:

  • 38% -- Objective is to explore options, so the process of learning will be the business success
  • 33% -- Have quantifiable metrics to track success
  • 29% -- Have documented goals, but they are difficult to quantify

But the success metrics are but one of the challenges of IoT implementation. Almost all (96%) of those involved in IoT projects say they face challenges in one form or another.  The challenges range from policies to issues with the actual technology. For any of you involved in IoT projects, this list of challenges from those already involved in IoT may sound familiar:

  • 58% -- Business processes or policies, such as privacy issues
  • 51% -- User adoption of new technology
  • 41% -- Timely collection and analysis of data
  • 40% -- Sensors or devices
Jeff Domansky's curator insight, October 28, 2015 2:29 PM

Challenges ahead for IOT, but market potential is irresistible if business can solve some of the potential problems.

YoloCommunications's curator insight, October 29, 2015 5:23 AM

Aside from IoT having a mystique to the term, why would this area be treated or approached any differently to any other new business proposition? After a business plan is developed, there should be a marketing strategy coupled with clear quantifiable metrics to gauge success and if those can be met then the prospects are extremely exciting.

Rescooped by Richard Platt from Internet of Things & Wearable Technology Insights
Scoop.it!

Security will be critical to the success or failure of Internet of Things products

Security will be critical to the success or failure of Internet of Things products | Internet of Things - Technology focus | Scoop.it

Over the next five years, the number of Internet of Things devices will grow nearly tenfold — from 2.5 billion in 2014, to nearly 24 billion by 2019, according to BI Intelligence estimates.


However, one of the biggest barriers currently preventing widespread IoT adoption are security concerns. Business executives, government officials, and consumers are rightly worried that by installing IoT devices within their business, city, or home they are exposing themselves to a hacker who could either use their IoT device in a malicious way and/or steal the data associated with the device....


Via Jeff Domansky
Jeff Domansky's curator insight, April 16, 2015 10:38 AM

IoT devices have many security flaws that will be marketing's biggest challenge in the future.

Jeff Domansky's curator insight, April 16, 2015 6:37 PM

IoT devices have many security flaws that will be marketing's biggest challenge in the future.

Кирилл Беличенко's curator insight, November 30, 2022 6:35 AM

Wpływ cyberbezpieczeństwa na produkt końcowy

Rescooped by Richard Platt from Future Technology
Scoop.it!

An Unexpected Capital for the Internet of Things

An Unexpected Capital for the Internet of Things | Internet of Things - Technology focus | Scoop.it
A wired city full of sensors looks like the future for all of us, for better or worse. Dublin is trying it out on a grand scale.

Via TechinBiz
Richard Platt's insight:

With the help of Intel, Dublin's brick lanes, lush parks and gray river banks will soon be seamlessly linked with high-tech sensors capable of gathering information such as air quality, noise levels and microclimate data. The project will initially focus mainly on environmental data, but the smart network is designed to implement a range of other applications in the future, from citizen feedback to guiding tourists.

No comment yet.
Scooped by Richard Platt
Scoop.it!

The $10 Hardware Hack That Wrecks IoT Security

The $10 Hardware Hack That Wrecks IoT Security | Internet of Things - Technology focus | Scoop.it
Using an SD card reader and some soldering savvy, these hackers rooted out a ton of IoT zero days.
Richard Platt's insight:

Tinker, Hacker, Solder, Spy:  On many devices, all it takes to access everything stored on the flash memory chip is a $10 SD card reader, some wire, and some soldering experience. The researchers focus on a type of memory called eMMC flash, because they can access it cheaply and easily by connecting to just five pins (electrical connections). By soldering five wires to the chip—a command line, a clock line, a data line, a power line, and a ground—they can get read/write access that lets them exfiltrate data and start reprogramming to eventually control the whole device.  This process could theoretically work on any digital device that uses flash memory, but most types would require interfacing with more pins than eMMC does, and many necessitate specialized readers and protocols to gain access. "For the most common types of memory, most people don’t want to open things up, solder to them, do all that kind of stuff, because it’s kind of a giant mess," Heres says. "But with eMMC you can do it with five wires. Of course, the soldering is a little difficult, but totally doable. It’s not 40 or 50 wires." Some data recovery services already use that method to help customers retrieve their information from broken devices, but it isn't widely known.

No comment yet.
Scooped by Richard Platt
Scoop.it!

The internet of things and cybersecurity vulnerabilities - IoT Agenda

IoT creates cybersecurity vulnerabilities in every capacity, from homes to critical infrastructure. Cytellix's Brian Berger offers tips to help stay safe.
Richard Platt's insight:

Lastly, manufacturing sensors and devices are a common threat, as they are unmanaged. As seen with  Petya,  NotPetya  and WannaCry, unmanaged devices have been the target for spreading ransomware across networks. The attackers are looking for the easiest entry point and the sensors of unmanaged IoT devices, which have become active targets. Manufacturing under government contracts has been a key target and supply chain SMBs now have required guidance for compliance. Some of the most critical aerospace designs have been stolen through cyberattacks that have a significant effect on our national security, as well as the economy for lost programs from these smaller manufacturers, whereas in food safety, the monitoring and prevention of agroterrorism is paramount to protect our national food supply.  What should we do? The list of actions remains very similar. Make sure all devices are not set to default (i.e., change passwords) — this is a typical flaw in the devices of SMBs as well as consumer devices. Verify all devices and sensors are managed and monitored. Properly segment your network — create an internal, guest and IoT network at a minimum. Some other helpful considerations around a cybersecurity program include updating firewalls, securing remote access, reviewing security configurations, operating system updates and patches, training staff members, improving security policies and changing control procedures.

No comment yet.
Scooped by Richard Platt
Scoop.it!

Bluetooth Mesh Solutions for the IoT 

Bluetooth Mesh Solutions for the IoT  | Internet of Things - Technology focus | Scoop.it
Silicon Labs releases suite of BLE mesh networking tools.
Richard Platt's insight:

So what does this mean for the Internet of Things (IoT)? The Bluetooth SIG certainly expects the new capability to make big waves, predicting Bluetooth mesh networks will “eventually become a common technology in the larger Internet of Things ecosystem.”   Semiconductor company Silicon Labs is also betting on the technology, given that they recently released a suite of software and hardware tools for BLE mesh developers. The tools include a variety of Bluetooth mesh modules, system-on-chip (SoC) and system-in-package (SiP) developer kits, and software development kits (SDKs). According to Silicon Labs, these tools will enable IoT developers to cut their time to market by six months (which, as we all know, is an eternity in the tech world).  "We expect to see a wave of new devices hit the market quickly by leveraging ubiquitous Bluetooth connectivity to create hub-less mesh networks that extend the range and reliability of Bluetooth systems," said Silicon Labs’ Daniel Cooley. "No matter which mesh technology developers choose to power their next IoT designs, we offer a complete portfolio of silicon, software and solutions that gives device makers everything they need to accelerate time to market while designing secure, robust mesh networks."  While Bluetooth isn’t the only technology for mesh networks, it certainly has its share of advantages. Chief among these is the ubiquity and familiarity of Bluetooth devices. Consumers favor brands they recognize, and by now, just about everyone on Earth recognizes the runic Bluetooth logo. Aside from that, Bluetooth has the proven security and low-power requirements that are necessary for IoT applications.

No comment yet.
Scooped by Richard Platt
Scoop.it!

Multi-function environmental sensor targets the Internet of Things | Engineer Live

Multi-function environmental sensor targets the Internet of Things | Engineer Live | Internet of Things - Technology focus | Scoop.it
Designed for monitoring temperature, humidity, light, UVI, barometric pressure, noise and acceleration
Richard Platt's insight:

Omron Electronic Components Europe has developed an environmental sensor that allows designers to monitor seven parameters from a single module measuring 46 x 39 x 15mm and weighing 16g.  The 2JCIE-BL01 is specifically designed for the growing number of autonomous IoT systems, monitoring temperature, humidity, light, UVI, barometric pressure, noise and acceleration. 

No comment yet.
Scooped by Richard Platt
Scoop.it!

Testing the Internet of Things

Testing the Internet of Things | Internet of Things - Technology focus | Scoop.it
A look inside TUV Rheinland's Internet of Things (IOT) test center in Silicon Valley
Richard Platt's insight:

That tsunami of new IoT gadgets? They all have to be tested before they roll out into the world, not only to meet government regulations but to verify adherence to a host of voluntary standards, like WiFi, Bluetooth, ZigBeeThread and others. That is a lot of testing. And that’s why TUV Rheinland recently opened a huge Silicon Valley test facility in Fremont, Calif.  It’s important for testing to be near the design teams, says TUV Rheinland’s Sarb Shelopal, the company’s global director of wireless and IoT testing. Distance, he says—and Silicon Valley’s traffic—is a big deal when companies are trying to move fast.  “Typically at the testing point,” says Shelopal, “a product team typically involves eight to ten people, but could be as big as 100, including safety engineers, software engineers, and hardware engineers. And when a product isn’t passing, we need to get them all in, and they will change this piece of hardware or this bit of software.”  Many of the tweaks, he said, can be made on site, with companies only having to go “back to the drawing board if they have a huge flaw in their design.”

No comment yet.
Rescooped by Richard Platt from Engineering Software
Scoop.it!

The Next Big Thing in IoT is Actually Really Small | PTC

The Next Big Thing in IoT is Actually Really Small | PTC | Internet of Things - Technology focus | Scoop.it
It’s time to meet the Internet of Nano Things (IoNT), which is the overall same concept as the IoT, but at a really, really small scale – as in 1/80,000 of a hair follicle small.

Via Dan Roberts
Richard Platt's insight:

Very small sensors will enable the connection of very small devices...

Dan Roberts's curator insight, February 2, 2017 9:55 AM
Very small sensors will enable the connection of very small devices...
Sarah Beaulieu's curator insight, February 17, 2017 7:37 PM

Nanotechnology definitely has its uses.

Rescooped by Richard Platt from Internet of Things & Wearable Technology Insights
Scoop.it!

Easily Hacked Tea Kettle Latest To Highlight Pathetic Internet Of Things 'Security'

Easily Hacked Tea Kettle Latest To Highlight Pathetic Internet Of Things 'Security' | Internet of Things - Technology focus | Scoop.it

We've discussed at length that companies rushing to embrace the "Internet of Things" (read: networked devices for those of us not in marketing) tend to have completely forgotten a little something called device security. As a result we're now bombarded week after week with stories about cars that can be controlled remotely, televisions that share your unencrypted living room conversations with anybody on the Internet, and refrigerators that leave the door wide open to having your e-mail password stolen. Some of these are kind of cute exploits, but many of them could be potentially fatal.

While these companies are desperately trying to highlight the wonderful future of Internet connected devices, they've inadvertently been creating advertisements for why many devices should just remain stupid. Especially if you're going to cut corners in development so device security is an afterthought, or cut corners post release when it comes to quickly identifying and patching exploits.

The latest case in point: the $150 iKettle by UK company Smarter promises to save its users "two days a year in wasted waiting time" over traditional tea kettles. How? Users can remotely turn the kettle on from anywhere via smartphone app, potentially letting users walk into the house just as the kettle comes to a boil. Avoiding the horrible task of having to walk a few feet and wait a few minutes is the pinnacle of modern engineering to be sure; the problem is that for the better part of this year researchers have been noting that the security on the kettle was virtually nonexistent...


Via Jeff Domansky
Richard Platt's insight:

More detail on the tea kettle that can be hacked and understand how this thing called WiFi technology needs a bit more robustness to mitigate the threat of being hacked.  Read on.

Jeff Domansky's curator insight, October 28, 2015 2:33 PM

Here's a look inside the challenge of security for Internet of things products.

Rescooped by Richard Platt from Electronics
Scoop.it!

Samsung Set To Unveil New Chips To Power IoT

Samsung Set To Unveil New Chips To Power IoT | Internet of Things - Technology focus | Scoop.it
The Artik system-on-a-chip series will make it easier for even small-fry developers to power the next wave of smart gadgets.

Via Ensil
Richard Platt's insight:

Samsung has officially said that Chief Strategy Officer Young Sohn will “reveal a major company milestone that will enable the new wave of groundbreaking Internet of Things devices and services.”  -  A system on a chip (or SoC) integrates all the key components of a mobile computer onto a single chip, including memory, sensors, accelerometer and gyroscope, and crucially, radio frequency functions.  -  Samsung’s best-known system-on-a-chip is the Exynos, a powerful ARM-based chip found primarily in Samsung’s Galaxy line of smartphones. An earlier SoC from Samsung also powered Apple’s first iPhone in 2007.  -  The Artik SoC is different because it’s aimed at a range of hardware developers both large and small, not just big clients like Apple or Samsung’s own mobile division.  -  Samsung has previously pledged to make all of its electronic gadgets and appliances connected by 2020, and the Artik system on a chip series will play a key role in making that happen.

Ensil's curator insight, May 12, 2015 11:34 AM

Samsung continues to make bold tech and R&D moves as its smartphone profits fluctuate, moving further now into the Internet of Things space.

Rescooped by Richard Platt from Technology in Business Today
Scoop.it!

Why CIOs must think about the Internet of Things

Why CIOs must think about the Internet of Things | Internet of Things - Technology focus | Scoop.it
Why CIOs Must Think About The Internet Of Things. Intelligenthq The Internet of Things is taking the world by storm, and savvy CIOs are already paying atte

Via TechinBiz
Richard Platt's insight:

6 types of applications in 2 categories:

  1. Tracking behavior - monitoring the behavior of things, people, or data in space and time
  2. Enhanced situational awareness - achieving real time awareness of the physical environment
  3. Sensor driven decision analytics - assisting human decision making through deep analysis and data visualization
  4. Process Optimization - automated control of closed (self contained)  systems
  5. Optimized Resource Allocation -  control of consumption to optimize resource use across the network
  6. Complex autonomous systems - automated control in open environments with great uncertainty
No comment yet.