IoT trends for 2017

According to Intel IoT is expected to be a multi-trillion-dollar market, with 50 billion devices creating 44 zettabytes (or 44 trillion gigabytes) of data annually by 2020. But that widely cited 50 billion IoT devices in 2020 number is clearly not correct! Forecast of 50 Billion Devices by 2020 Is Outdated. In 2017 we should be talking about about some sensible numbers. The current count is somewhere between Gartner’s estimate of 6.4 billion (which doesn’t include smartphones, tablets, and computers), International Data Corporation’s estimate of 9 billion (which also excludes those devices), and IHS’s estimate of 17.6 billion (with all such devices included). Both Ericsson and Evans have lowered their expectations from 50 billion for 2020: Evans, who is now CTO of Stringify, says he expects to see 30 billion connected devices by then, while Ericsson figures on 28 billion by 2021.

Connectivity and security will be key features for Internet of Things processors  in 2017. Microcontroller (MCU) makers will continue to target their products at the Internet of Things (IoT) in 2017 by giving more focus on battery life, more connectivity of various types, and greater security. The new architectures are almost sure to spawn a multitude of IoT MCUs in 2017 from manufacturers who adopt ARM’s core designs.

ARM will be big. Last year, ARM’s partners shipped 15 billion chips based on its architectures. The trend toward IoT processors will go well beyond ARM licensees. Intel rolled out the Intel Atom E3900 Series  for IoT applications. And do not forget MIPS an RISC-V.

FPGA manufacturers are pushing their products to IoT market. They promise that FPGAs solve challenges at the core of IoT implementation: making IoT devices power efficient, handling incompatible interfaces, and providing a processing growth path to handle the inevitable increase in device performance requirement.

Energy harvesting field will become interesting in 2017 as it is more broadly adopted. Energy harvesting is becoming the way forward to help supplement battery power or lose the need for it altogether. Generally researchers are eyeing energy-harvesting to power ultra-low-power devices, wearable technology, and other things that don’t need a lot of power or don’t come in a battery-friendly form factor.


Low power wide area networks (LPWA) networks (also known as NarrowBand IoT) will be hot in 2017. There is hope that f LPWA nets will act as a catalyst, changing the nature of the embedded and machine-to-machine markets as NB-IoT focuses specifically on indoor coverage, low cost, long battery life, and enabling a large number of connected devices. The markets will become a kind of do-it-yourselfers paradise of modules and services, blurring the lines between vendors, users and partners.  At the same time for years to come, the market for low power wide area networks (LPWA) will be as fragmented and  is already in a race to the bottom (Sigfox, said to be promising costs approaching $1 per node per year). Competing technologies include Sigfox, LoRa Alliance, LTE Cat 1, LTE Cat M1 (eMTC), LTE Cat NB1 (NB-IoT) and other sub-gigahertz options almost too numerous to enumerate.

We are starting to see a battle between different IoT technologies, and in few years to come we will see which are winners and which technologies will be lost in the fight. Sigfox and Lora are currently starting well, but telecom operators with mobile networks NB-IoT will try hit the race heavily in 2017. Vendors prep Cat M1, NB1 for 2017: The Cat M1 standard delivers up to 380 Kbits/second over a 1.4 MHz channel. NB-1 handles up to 40 Kbits/s over 200 kHz channels.  Vendors hope the 7-billion-unit installed base of cellular M2M modules expands. It’s too early to tell which technologies will be mainstream and which niche. It could be that cellular NB-IOT was too late, it will fail in the short term, it can win in the long term, and the industry will struggle to make any money from it. At $2 a year, 20 billion devices will contribute around 4% of current global mobile subscription revenues.

New versions of communication standards will be taken into use in 2017. For example Bluetooth 5 that adds more speed and IoT functionality. In 2017, we will see an increase in the number of devices with the new Bluetooth 5 standard.

Industrial IoT to gain traction in 2017. Industrial applications ultimately have the greater transformative potential than consumer products, offering users real returns on investment (ROI) rather than just enhanced convenience or “cool factor”. But the industrial sector is conservative and has been slow to embrace an industrial IoT (IIoT), but is seems that they are getting interested now. During the past year there has been considerable progress in removing many of the barriers to IIoT adoption. A global wide implementation of an IIoT is many years away, of course. The issues of standards and interoperability will most likely remain unresolved for several years to come, but progress is being made. The Industrial Internet Consortium released a framework to support development of standards and best practices for IIoT security.

The IIoT  market is certainly poised to grow. A Genpact research study, for instance, indicates that more than 80% of large companies believe that the IIoT will be essential to their future success. In a recent market analysis by Industry ARC, for instance, the projected value of the IIoT market will reach more than $120 billion by 2021. Research firm Markets and Markets is even more optimistic, pegging IIoT growth at a CAGR of 8% to more than $150 billion by 2020. And the benefits will follow. By GE’s estimate, the IIoT will stimulate an increase in the global GDP of $10 to $15 trillion over the next 20 years.

Systems integrators are seeking a quick way to enter the industrial Internet of Things (IIoT) market. So expect to see many plug and play IoT sensor systems unveiled. There were many releses in 2016, and expect to see more in 2017. Expect to see device, connectivity and cloud service to be marketed as one packet.

IoT analytics will be talked a lot in 2017. Many companies will promise to turn Big Data insights into bigger solutions. For industrial customers Big Data analytics is promised to drive operational efficiencies, cut costs, boosting production, and improving worker productivity. There are many IIoT analytic solution and platform suppliers already on the market and a growing number of companies are now addressing industrial analytics use.

In 2016 it was all bout getting the IoT devices connected to cloud. In 2017 we will see increased talk about fog computing.  Fog computing is new IoT trend pushed by Cisco and many other companies. As the Internet of Things (IoT) evolves, decentralized, distributed-intelligence concepts such as “fog computing” are taking hold to address the need for lower latencies, improved security, lower power consumption, and higher reliability. The basic premise of fog computing is classic decentralization whereby some processing and storage functions are better performed locally instead of sending data all the way from the sensor, to the cloud, and back again to an actuator. This demands smarter sensors and new wireless sensor network architectures. Groups such as the Open Fog Consortium have formed to define how it should best be done. You might start to want to be able to run the same code in cloud and your IoT device.


The situation in IoT security in 2016 was already Hacking the IoT: As Bad As I Feared It’d Be and there is nothing that would indicate that the situation will not get any better in 2017.  A veritable army of Internet-connected equipment has been circumvented of late, due to vulnerabilities in its hardware, software or both … “smart” TVs, set-top boxes and PVRs, along with IP cameras, routers, DSL, fiber and cable modems, printers and standalone print servers, NASs, cellular hot spots, and probably plenty of other gear. IoT world at the moment is full of vulnerable devices, and it will take years to get then replaces with more secure devices. Those vulnerable devices can be used to make huge DDoS attacks against Internet services.  The 2016 October 21 cyberattacks on Dyn brought to light how easily many IoT devices can be compromised. I expect that kind of incidents will happen more in 2017 as DDoS botnets are pretty easy to build with tools available on-line. There’s no question that everyone in the chain – manufacturers, retailers and consumers – have to do a better job securing connected devices.When it comes to IoT, more security is needed.



  1. Tomi Engdahl says:

    Moving to a wireless remote monitoring system

    Heed this advice on what needs to be considered when moving from a wired remote monitoring communications to wireless communications.

    While wired remote monitoring offers advantages over manual readings from sensors or gauges, it does have limitations—depending on the application—regarding installation cost, sensor flexibility, and environmental influences. If a remote monitoring application requires multiple sensors to monitor various parameters, for example, a wired system requires each sensor be wired back to the controller using an interface port. For large systems, a wired system requires a large interface panel with many different interfaces.

    Benefits beyond wireless

    In lieu of making a complete changeover, wireless modules are available that can convert digital information into individual analog channels, simulating the existing analog interface. Although this is the easiest solution for a quick changeover, and does not require any software changes, it does not use the vast increase in data and diagnostic benefits made possible by changing the complete communications architecture to a wireless sensor control system.


    Wired systems: What is the area over which the wired system will operate? Costs related to running conduit over large areas, especially if requiring trenching, can make a wired system too cost-prohibitive.

    Wireless systems: With no conduit or trenching requirements, a wireless system can be installed at the cost of a wired system with 15m of installed conduit—less if conduit needs to be buried.


    Wired systems: When removing sensors for periodic maintenance, wires connecting to units can be damaged. Improper wire labeling can result in incorrect sensor replacement.

    Wireless systems: In a wireless system, nodes integrate to sensors that send data directly to a gateway. When removing sensors for maintenance, the wireless node easily detaches and re-attaches without interference by wires.


    Wired systems: Underground conduit often is ruined by equipment when digging a trench for another underground conduit run. The cost to replace conduit and cable systems can be huge. In addition, lightning strikes on a sensor will propagate along all wires, often destroying equipment attached to the system.

    Wireless systems: With no underground wires, nothing must be dug when going wireless. Once installed, lighting strikes to a sensor may damage the single unit, but not interfere with the complete system.


    Wired systems: Certain locations make it impractical to run wires, such as across a highway or river.

    Wireless systems: A wireless node can be installed easily on the other side of a highway or river. Self-configuring, wireless nodes automatically connect to the network.

  2. Tomi Engdahl says:

    IEEE hones 802.11ah standard for smart grid IoT future, bettering wireless range and energy efficiency in sub 1 GHz band

    - IEEE and the IEEE Standards Association (IEEE-SA), have announced the availability of the IEEE 802.11ah-2016 standard amendment, providing for an extended range Wireless Local Area Network (WLAN) in the sub 1 GHz band.

    According to a press release, IEEE 802.11ah-2016 significantly lowers propagation loss through free space, walls and other obstructions, and offers a networking alternative to augment the heavily congested 2.4 GHz band and the shorter-range 5 GHz band used today. Further, IEEE 802.11ah-2016 defines a narrow-band orthogonal frequency division multiplexing (OFDM) physical layer (PHY) operating in the license-exempt bands below 1 GHz, making it suitable for several potential applications, such as Internet of Things (IoT), smart grid, healthcare, smart appliances and wearables.

    The IEEE 802.11ah-2016 standard amendment offers multiple low rates modes (starting from 150 kb/s) for extended range (up to 1 km outdoors) and higher rate modes (up to 347 Mbps) for applications requiring higher throughput. It supports outdoor deployment and can provide robust performance in large delay spread environments. Low rate modes are suitable for IoT applications, and provide whole-home coverage for battery-operated, small form-factor devices, such as temperature and moisture sensors. Higher rate modes support plug-in devices with a power amplifier, such as video security cameras.

    Additionally, the IEEE 802.11ah-2016 standard amendment is optimized for long battery life and serving an increased number of devices with a MAC layer that enables increased scalability, higher power efficiency, and relay operation (single hop or multi-hop).

    More than 300 individuals from equipment and silicon suppliers, service providers, systems integrators, consultant organizations and academic institutions from more than 20 countries participated in the development of IEEE 802.11ah-2016.

  3. Tomi Engdahl says:

    Fixing cities

    Local information is a mess, but tech and journalism are joining forces to help

    Incremental changes happening across tech, local news and local government are finally making the world around you transparent.

    This isn’t some “smart cities” concept fantasy, like those corporate marketing videos you see from time to time.

    The last big pieces are just now falling into place, with tech companies finally pushing major improvements in two areas:

    Local distribution: Google, Facebook, Nextdoor and other companies with local-facing products are increasingly trying to surface the most relevant data points, articles and other information to their users.

    Local data: Yelp, Foursquare, Trulia and many other local-category tech companies are opening up and analyzing their data for everyone

  4. Tomi Engdahl says:

    Startup Runs MCU on 5 MicroW
    Hot Chips to see demo of 0.25V IoT SoC

    A startup will demo at Hot Chips next week an ARM Cortex-M3 SoC doing useful work while consuming five microwatts. The Dial architecture from Eta Compute represents a new low for the annual event traditionally focused on high-performance processors.

    Eta claims it can enable significantly lower power microcontrollers than are currently available using asynchronous circuits that can operate down to 0.25V. “We think we can make a dent in the way embedded systems are built,” said Paul Washkewicz, one of three co-founders and the vice president of marketing and sales at Eta.

    Eta’s 90nm chip can multiplex between an A/D converter, DSP and Cortex-M3 cores while dissipating less than 50 microwatts. It has a lower power version working in silicon built in a 55nm process.

    The designs aim to enable simple nodes on the Internet of Things such as Bluetooth beacons and LoRa end points running off energy harvesters such as small solar panels. The 90nm design runs the M3 core at a data rate of up to 200 kHz, powered by a solar cell with fluorescent lighting. Washkewicz argues getting rid of batteries will be useful for many kinds of IoT deployments.

    Their Dial architecture uses a novel handshake to wake up circuits resting at power levels below 0.3V. It quickly turns on devices without the set up and wait times associated with synchronous circuits.

    Plenty of microcontrollers support data rates as low as 100 kHz. Only a few such as startup Ambiq can support circuits running as low as 0.9V. Washkewicz claims Eta’s 0.25V technology enables a five-fold improvement in MIPS/Watt compared to today’s MCUs

  5. Tomi Engdahl says:

    What is IoT?
    Beyond being a network of online, connected, smart devices, the internet of things it can be a nightmare for IT

    The Internet of Things, at its simplest level, is smart devices – from refrigerators that warn you when you’re out of milk to industrial sensors – that are connected to the Internet so they can share data, but IoT is far from a simple challenge for IT departments.

    For many companies, it represents a vast influx of new devices, many of which are difficult to secure and manage. It’s comparable to the advent of BYOD, except the new gizmos are potentially more difficult to secure, aren’t all running one of three or four basic operating systems, and there are already more of them.

    A lot more, in fact – IDC research says that there are around 13 billion connected devices in use worldwide already, and that that number could expand to 30 billion within the next three years. (There were less than 4 billion smartphone subscriptions active around the world in Ericsson’s most recent Mobility Report.)

  6. Tomi Engdahl says:

    How to conduct an IoT pen test
    Security experts explain the nuances

    Penetration testing was much like taking a battering ram to the door of the fortress. Keep pounding away and maybe find a secret backdoor to enter through. But what happens if pieces of the network are outside of the fortress? With the flurry of Internet of Things devices, is it harder to conduct a pen test with that many devices and end points?

    Claud Xiao, principal security researcher, Unit 42 at Palo Alto Networks, said for just testing some network services on IoT devices in a black box way, the difficulty level and the steps are similar with regular pen testing. But if you’re discovering vulnerabilities via analyzing firmware or via analyzing wireless communications (e.g., Bluetooth or ZigBee), that’s much harder.

    “Every step above may fail due to diversity existing everywhere during IoT devices’ and embedded Linux system’s design and implementation. Even if a security flaw was discovered, some additional knowledge may be required in order to write a workable exploit code,” Xiao said.

    The benefits to pen testing Iot include strengthening device security, protecting against unauthorized usage, avoiding Elevation of Privileges, Lowerreducing the risk of compromise, better user and data privacy, and settrong Encryptionencryption to avoid man-in-the-middle (MTM) attacks.

  7. Tomi Engdahl says:

    IoT standards battles could get messy
    So many devices, so little time

    As enterprises start to think about building Internet of Things (IoT) networks, the key question becomes: What’s happening on the standards front?

    Without platforms and standards to guide the development of products and services, IoT could become a chaotic mess.

    Widely accepted standards and broad platforms are needed in three key areas:

    1. The instrumented devices themselves, which can include just about anything from smart city street lights to industrial controls to farm equipment.
    2. The network, which will probably be a combination of wired and wireless that brings IoT data back to a data center.
    3. And a system of alerts or analyses or some way to make the data actionable.

    These systems need to work together in order for IoT to be useful for enterprises. While the IoT standards process is still in its infancy, there’s an increasing sense of urgency as the momentum behind IoT continues to build.

    A survey of nearly 1,000 enterprises worldwide conducted by 451 Research from August to October 2016 shows that 71% of organizations are gathering data as part of IoT initiatives today.

  8. Tomi Engdahl says:

    New NIST draft embeds privacy into US govt security for the first time
    Federal agency addresses the new world of Alexa, smart cameras and IoT

    A draft of new IT security measures by the US National Institute of Standards and Technology (NIST) has for the first time pulled privacy into its core text as well as expanded its scope to include the internet of things and smart home technology.

    The proposed “Security and Privacy Controls for Information Systems and Organizations” will be the go-to set of standards and guidelines for US federal agencies and acts as a baseline for broader industry. As such, it has a huge impact on how technology is used and implemented across America.

    This version of the document – its fifth draft – concerns itself with edge computing: the rapidly expanding world of interconnected systems and devices that continue to be added to IT systems and the broader internet.

    Major changes include:

    A focus on improved outcomes rather than a general security overview
    Fully integrating privacy controls into security controls and spending more time digging into the relationship between privacy and security
    Separating the process of selecting of controls from the actual controls – i.e. allowing organizations other than federal agencies to dip in to the document and grab relevant information without having to wade through irrelevant procurement information (that info has been pushed into a separate document).
    Greater integration with other risk management and cybersecurity approaches, including the use of common language
    Updated information on systems used to analyze threats and attacks

    The addition of privacy concerns is especially stark – the word “privacy” appears more than 2,000 times in the 500-page document. It contains information on both philosophical and pragmatic approaches to privacy to help sysadmins balance security and privacy concerns.

    Draft NIST Special Publication 800-53
    Security and Privacy Controls for Information Systems and Organizations

  9. Tomi Engdahl says:

    Update gone wrong leaves 500 smart locks inoperable
    Fatal error leaves customers scrambling for fixes that can take a week or longer.

    Hundreds of Internet-connected locks became inoperable last week after a faulty software update caused them to experience a fatal system error, manufacturer LockState said.

    The incident is the latest reminder that the so-called Internet of Things—in which locks, thermostats, and other everyday appliances are embedded with small Internet-connected computers—often provide as many annoyances as they do conveniences. Over the past week, the Colorado-based company’s Twitter feed has been gorged with comments from customers who were suddenly unable to lock or unlock their doors normally. Complicating the matter: the affected LockState model—the RemoteLock 6i—is included in an Airbnb partnership called Host Assist. That left many hosts unable to remotely control their locks.

    The failure occurred last Monday when LockState mistakenly sent some 6i lock models a firmware update developed for 7i locks. The update left earlier 6i models unable to be locked and no longer able to receive over-the-air updates. LockState Marketing Manager John Cargile told Ars that the failure hit about 500 locks. The company is offering affected customers one of two options: (1) return the back portion of the lock to LockState so the firmware can be updated, with a turnaround time of about five to seven days, or (2) request a replacement interior lock, with a turnaround time of about 14 to 18 days. In the meantime, customers can use a physical key to unlock doors. (Like most hotel rooms, the doors automatically lock each time they’re closed.)

  10. Tomi Engdahl says:

    Helping SMEs Harness the IoT Via PLM
    How to use a PLM system to manage IoT connectivity and smart manufacturing processes.

    The Internet of things (IoT) is becoming the way of the world and because of it, there are now more components being manufactured and more intricate design chain challenges than ever. Original equipment manufacturers (OEMs) will have to learn to trust data and analytics, where once they relied on people. To truly embrace this digital transformation, manufacturers need to step out of their comfort zones to learn new habits, acquire new disciplines, and implement organizational transformation that extends to their supply chain.

    For small- and medium-sized enterprises (SMEs), this may be a bit of a challenge. Turning to their product lifecycle management (PLM) system to manage backend activities typically stored in customer relationship management (CRM), issue tracking, and data collection systems — as well as all the supply chain activities associated with procurement — can help SMEs take advantage of the IoT like larger companies.

    PLM’s Role in Leveraging Big Data

    PLM technology provides a system to centralize product data, standardize business processes and streamline communication of information across distributed product development teams. It helps to shorten development cycles, improve quality and cut the time-to-market by enabling access to current and accurate product data. Anytime. Anywhere.

    Embracing Customer Input

    Customer feedback is commonly used throughout the product development process to ensure that the end product is something that solves a customer’s problem or fulfils a need.

    The Role of Communication Tracking Within PLM Systems

    If a large percentage of customers suggest a product feature or want an additional customer service channel, it has now become possible to capture this information using PLM. PLM provides a communication platform to capture issues, feedback, and discussions from internal resources, customers, suppliers, and devices.

    Better Products Come from the Communication Loop

    SMEs are coordinating 75% or more of their supply chain activity outside their four walls, using data derived from tapping into such areas as IoT, mobility and cloud-based technologies to achieve a more collaborative PLM framework, according to Frost & Sullivan. The results can deliver positive impacts in the design and engineering of products. This information SMEs are now tapping into is providing greater data accuracy, clarity, and insights, leading to better decision-making.

    Extending PLM capabilities to include downstream processes, data sharing and analytics improve insights into customer requirements and make use of product performance data in real life. With PLCs, sensors, and smart devices improving and becoming more affordable and efficient, there are now more opportunities to track and research how devices are performing and how customers are experiencing products in all industries. Meaningful data gathered from customers, devices, suppliers and multiple departments internal to an organization, can seamlessly be filtered and leveraged throughout PLM processes to create better-engineered products.

  11. Tomi Engdahl says:

    De-Risking Design: Reducing Snafu’s When Creating Products
    You can reduce design risk with sound up-front procedures that anticipate and solve potential problems.

    With growing time-to-market pressures and increasingly complex systems within products, the design process has become risky. These risks show up during the process of bringing a product concept into reality. Whether it’s sole-source components that might cause supply chain issues or untested connectivity added at the end to meet competitive pressure, much can go wrong with design. You face the added risk once the product is out in the field and the market reacts to it.

    Throughout the product development and design journey, day-to-day risk decisions get made: Should we add a last-minute feature at launch? Should we use multiple sources for each component? “You have to look at design the way an investor looks at a portfolio, deciding where you want to be on the risk compendium,” Jeff Hebert, VP of engineering at product development firm, Synapse, told Design News .
    Many companies accept a wide range of risks along the way, pushing for shorter timelines and reduced costs. But, Murphy’s Law has a way of catching up. A last-minute feature could delay the launch or expose a bug. A single-source component could experience supply chain woes, threatening a holiday launch. “If you have all the time and money, you can be confident you will get the net results, but it will take a long time and many iterations,” said Hebert. “The question is how do you balance risk and additional cost? Hopefully you can do it in such a way there are no hard trade-offs.”

    Building De-Risk into the Design Process

    Avoiding the hard trade-offs and reducing the likelihood of problems due to untested technology or supply issues is a matter of implementing procedures that identify risk and mitigate as much of it as possible. Hebert calls it de-risking design. He describes it as a combination of up-front analysis and strategic testing. He noted that up-front analysis and test/validation can be done on different aspects of the product simultaneously, avoiding the time-consuming process of doing one consideration at a time. “It’s front loading — a stitch in time saves nine,” said Hebert. “You can do things in parallel. If you have two or three things that have never been tested, you can focus on them in isolation.”

    Gain the Knowledge of the Product’s Technology

    Do you want to add IoT connectivity to your product? Do you want to make sure that connectivity is secure? Then you need to become

    “It’s not just de-risking the system but also understanding it. It’s called knowledge-based product development,” said Hebert. “This involves learning as much as you can about the technology in the product. When the technology changes, you’ll understand the space you’re playing in, so you’ll know how the design needs to be changed.”

  12. Tomi Engdahl says:

    LIFT BIT: the connected sofa

    Design and technology in a perfect marriage: applying the DUST network for internet enabled control of an innovative modular sofa that can be adjusted at will, thanks to an electronic section prototyped with SmartEverything.

    the new SmartEverything family, a wide range of application prototyping boards for the Internet of Things which board/cards are equipped, depending on the model, with various low-power wireless links

    We have already praised the DUST protocol, highlighting its main values, especially for the realization of mesh type WPAN networks, and now it’s time to see a practical example of what we can do with it

    SmartMesh is the only Dust network created to meet IoT’s stringent requirements of reliability and safety for the industrial sector.

    Here is a recap of its features:

    >99.999% network reliability; SmartMesh provides the business-critical data where other solutions fail (please note that industrial applications do not tolerate error percentages over 1%, which means losing 3.65 days of activity per year).
    Safety and encryption with NIST certification: data are protected end-to-end by AES 128-bit encryption, by the integrity check of messages (to prevent messages from being altered) and by authentication (the transmitter must identify itself).
    Scalability up to 10,000 nodes allowed by time-synchronized, channel hopping technology, eliminating data collisions. Data optimization algorithms smartly balance data traffic for an effective re-routing.
    Bidirectional communication for monitoring and controlling application: sensor data acquisition, log file research, sensor configuration, actuator control (alarms, locks, vaults, HVAC regulators etc.).
    Blink mode, allowing support of roaming nodes, safe and reliable communication with an average absorption of 3 µA.

  13. Tomi Engdahl says:

    Experts: The future of IoT will be fascinating and also potentially catastrophic
    Insecurity of IoT is a top concern

    The Internet of Things is going to be inescapable, pervasive, and riddled with insecurity, but it’s at least going to be interesting, according to a raft of prominent technologists surveyed by the Pew Research Center.

    Unsurprisingly, IoT security was the name of the game, the experts agreed, but it’s the effect of the present insecurity in IoT and the possible future effects that have them fascinated. The security breaches that have happened already were clearly on the minds of the respondents. Not only has IoT contributed to general online chaos via the Mirai botnet and other incidents, the trend of integrating connected devices ever more deeply into vital infrastructure reveals the potential for even more destructive attacks.

    “Right now, losing a credit card record costs a firm something like $0.35, plus a six-month gift certificate for a credit-monitoring service. But the data from those breaches, combined with other breach data by crooks, can be used to pull off breathtaking identity theft crimes,” Doctorow said. “If firms had to pay the entire likely lifetime losses from breaches … then no insurer would underwrite companies that were as sloppy as today’s – data collection and retention would be priced accordingly by insurers, at a much higher price than today’s.”

    “There are many risks that reliability and safety will suffer unless the makers are diligent about protecting user interests. It could be impossible to escape increased connectivity. Look at present dependence on Google Maps or generally on mobiles and apps in the last 10 years. Reliability will be key. If such systems prove to be unreliable, people will leave in droves.”

  14. Tomi Engdahl says:

    The Week In Review: IoT
    LightSquared’s revival; Qualcomm, Logicalis team; IoT data management market.

    Longing for LightSquared? The once-bankrupt company that tried to build a network with satellite airwaves and traditional spectrum has been reborn as Ligado Networks, which wants to serve 5G and Industrial Internet of Things applications with a mobile data network, employing satellite communications and other resources.

    Super Micro Computer brought out compact systems and motherboards with Intel’s Atom C3000 system-on-a-chip devices for applications in embedded appliances, intelligent data centers, and network edges. Supermicro’s A2 series motherboards feature two to 16 Atom cores.

    Parks Associates has scheduled its annual CONNECTIONS Summit: IoT and the Smart Home conference for January 9, 2018, during CES 2018 in Las Vegas, Nevada. Topics to be discussed at the one-day conference are Support, Privacy, and Connected Consumers; Smart Home Platforms; Voice Control; Smart Home & Interoperability; Creating Compelling IoT Services with AI and Data Analytics; and Smart Home and IoT.

    Gartner found 75% of end-user respondents said they were willing to pay more for 5G wireless communications, with 57% of those participating in the survey saying their organizations will use 5G for IoT communications. “This finding is surprising, as the number of deployed ‘things’ that need cellular connectivity won’t exceed the capacity of existing cellular IoT technologies before 2023 in most regions,” Gartner’s Sylvain Fabre said in a statement. “And even once fully implemented, 5G will suit only a narrow subset of IoT use cases that require a combination of very high data rates and very low latency. In addition, 5G won’t be ready to support massive machine-type communications, or ultra-reliable and low-latency communications, until early 2020.”

    “Thingbots” are botnets that specifically aim for IoT devices, and they helped to drive a 280% increase in Telnet attack activity during the first six months of 2017, according to F5 Labs. That growth was due to the Mirai malware and subsequent attacks, the organization reports. There’s a new thingbot dubbed Persirai, F5 says.

    Future Market Insights predicts the worldwide IoT security product market will have a 14.9% CAGR over the next decade, increasing from more than $12 billion in 2017 to almost $50 billion by the end of 2027.

  15. Tomi Engdahl says:

    ASC – Alexa Sprinkler Controller
    Low cost, Alexa Enabled IoT 8 zone sprinkler controller based on the ESP8266

    This project aims to produce a low cost replacement for COTS sprinkler timers. ASC or Alexa Sprinkler Controller features an ESP8266 MCU at its core. Alexa voice and web interface will provide control functionality via WIFI.

  16. Tomi Engdahl says:

    Forget Troy. Try HelenOS

    Even though it seems like there are a lot of operating system choices, the number narrows if you start counting kernels, instead of distributions. Sure, Windows is clearly an operating system family, and on the Unix-like side, there is Linux and BSD. But many other operating systems–Ubuntu, Fedora, Raspian–they all derive from some stock operating system. There are some outliers, though, and one of those is HelenOS. The open source OS runs on many platforms, including PCs, Raspberry PIs, Beaglebones, and many others.

    HelenOS is a portable microkernel-based multiserver operating system designed and implemented from scratch. It decomposes key operating system functionality such as file systems, networking, device drivers and graphical user interface into a collection of fine-grained user space components that interact with each other via message passing. A failure or crash of one component does not directly harm others. HelenOS is therefore flexible, modular, extensible, fault tolerant and easy to understand.

  17. Tomi Engdahl says:


    Sensing your surrounding environment and helps you to assist your comprehensive assessment of indoor comfort
    Battery operable 46 x 39 x 15mm small package including 7 sensors
    Based on Bluetooth low energy, sensor beacon can simplify the deployment
    Embedded memory for data logging can keep track of surrounding environment

    Temperature, Humidity, Light, UVI, Absolute pressure, Noise, Acceleration

  18. Tomi Engdahl says:

    Aerohive unveils combo wallplate wireless AP, switch with embedded IoT capability

    Aerohive Networks (NYSE:HIVE) has unveiled the AP150W, billed as the “first small form factor wallplate access point and switch combination with embedded IoT capability.” Designed both for Ethernet-jack wall mounting or placement on a desktop, the AP150W can be installed in less than two minutes, contends the company.

    Every AP150W has anti-counterfeit and platform-integrity measures that protect network secrets and prevent operation without valid access verification. For greater use-case flexibility, the AP150W can power VoIP phones, IoT sensors, and cameras through its integrated PoE switch and Passive Passthrough Port, which provides investment protection for existing cabling and switch infrastructure.”

    “Wi-Fi has become the primary connectivity at work, home, and play,” notes Alan Amrod, senior vice president, Products Organization, Aerohive Networks. “By packing 802.11ac Wave 2 Wi-Fi, Gigabit Ethernet switching, Bluetooth Low Energy (BLE), and ZigBee technologies into a small form factor that can be installed in less than two minutes, Wi-Fi in every room has finally become affordable and easy.”

  19. Tomi Engdahl says:

    IBM Cloud employs 4,000 mi. of fiber at Atlanta’s Mercedes-Benz stadium to support IoT-connected systems

    “The Atlanta Falcons football team and Atlanta United soccer team have a new home — the glass-encased Mercedes-Benz stadium that is located next to their former home in the Georgia Dome. The new stadium uses IBM Cloud as the basis of a converged network with more than 4,000 miles of fiber on a passive optical network to support IoT-connected systems throughout the building.”

    The 71,000-seat stadium has 90 miles of audio cabling and nearly 2,000 wireless access points for Wi-Fi connectivity. The stadium includes a 360-degree, 63,000-square-foot HD Video Halo Board and more than 2,000 video displays throughout the building. The IT infrastructure is the heart and brain to the immense video presence within the stadium.

    Going high tech with IBM Cloud at Atlanta’s new Mercedes-Benz stadium

    The newest professional sports stadium opens next week in Atlanta, and it’s filled with new tech to improve the fan experience as a result of the team’s partnership with IBM.

  20. Tomi Engdahl says:

    Meet the Challenge of Designing Electrically Small Antennas

    Antenna Q diminishes with shrinking antenna size, although it is still possible to achieve acceptable Q performance even as antenna designs become electrically small.

    Antennas are vital for communications devices, although the continuing miniaturization of communications products has forced antenna designers to follow suit. However, due to the fundamental limitations in size and performance (Chu’s limit), achieving miniaturization with good antenna performance is challenging. Electrically small antennas (ESAs) are limited in bandwidth and radiating efficiency.

    By understanding the effects of antenna size reduction on quality factor (Q), bandwidth, efficiency, and gain, it is possible to design a miniature antenna without drastically compromising performance. To demonstrate the effectiveness of this approach, an ESA was designed and developed for GPS (1.575 GHz) at one-tenth the operating wavelength.

    Attempting to miniaturize an antenna by having radiating element(s) very close to the ground plane results in low radiation resistance, high reactance, narrow bandwidth, and poor radiation efficiency. The bandwidth capacity of a small antenna is approximately inversely related to the radiation quality factor (Q). Hence, antenna miniaturization is quite challenging. Metamaterials have been quite popular as far as antenna miniaturization is concerned.

    These artificial structures can be engineered to support negative and zeroth-order modes which were not available in traditional microstrip antennas.
    However, metamaterial-based structures inherently have high Q and narrow bandwidth.

  21. Tomi Engdahl says:

    What CanPredictive MaintenanceMean for Your Bottom Line?

    Unplanned downtime is the enemy of every industry. The earlier a vital repair can be made to a broken piece of machinery,the faster a company can return to profitability

    The Industrial Internet of Things is changing that. MindSphere from Siemens, the open, cloud-based operating system for the IoT, allows historical performance data of each asset to be compared to real-time operating data, meaning subtle changes in system behavior are caught well before reaching critical levels. With this approach, a company’s mindset can go from “repair and replace” to “predict and prevent.”

    The financial benefits for companies that leverage connectivity and digitalization can be staggering. By the year 2025, the total economic impact of the IoT is forecast to be a minimum a $1.2 trillion/year

  22. Tomi Engdahl says:

    Columbus 2020 and the Rise of Smaller Smart Cities

    Forget New York and Los Angeles—it’s really the small to midsize metro areas like Columbus, Ohio, that are successfully implementing smart-city programs.

    Smart-city programs are popping up all over the United States. As we economize the Internet of Things and technology becomes more affordable, cities are taking advantage of the tech boom and looking to instill new programs in their infrastructure. While much of the focus may go to major cities like New York or Los Angeles, medium-sized to smaller cities are actually leading the charge.

    A recent survey by the U.S. Conference of Mayors and the analytics firm IHS Markit revealed that 30% of existing smart-city projects are occurring in small cities with residents of 150,000 or less. The survey concluded that smaller and medium-sized cities may have an easier time implementing new technology. These cities may be more motivated to attract interested companies to be their test beds to bringing investment capital and encourage job growth.

    One such city is Columbus, Ohio, which was recognized as the Intelligent Community of the Year by the Intelligent Community Foundation. The local government for Columbus has launched Columbus 2020. The goal of Columbus 2020 is to serve “as the economic development organization for the 11-county Columbus Region, working in partnership with state and local partners to generate opportunity and build capacity for economic growth.” The goals of the program are as follow:

    Add 150,000 net new jobs
    Generate $8 billion of capital investment
    Raise personal per capita income by 30%
    Earn recognition as a leader in economic development

    The shape and size of small and mid-size cities make great test beds for smart programs because they are large enough to have the resources but contained enough to be a perfect controlled environment. Hopefully, the success of smaller smart cities can eventually be applied to larger areas and the country.

  23. Tomi Engdahl says:

    Machines Text and Tweet, Eliminates Need to Write Custom Code

    Prebuilt software component provides ability for machines to “tweet” or send email using a configurable solution that eliminates the need to write custom code.

    The ability to send to send text messages and/or email from a machine, triggered by specific events, is potentially an effective way to increase machine availability and limit downtime. The idea is that, by providing a configurable software block, users can create messages in just a few clicks.

    A simple, obvious example would be an alarm message notifying a maintenance technician that there is a condition on the machine that demands immediate attention. The new mapp Tweet from B&R Industrial Automation also provides an ability to supplement the message with troubleshooting instructions that allow the technician to quickly and efficiently resolve the cause of the alarm. If the service technician isn’t on site, they can connect to run remote diagnostics and adjust system parameters to resolve the error.

    The mapp Tweet software block is just one example of how B&R has been expanding its mapp Technology software framework. The framework is a set of modular blocks that handle basic machine functions so that users, rather than writing lines and lines of code to create a user management system, alarm system or motion control functions, can simply configure a ready-made component.

  24. Tomi Engdahl says:

    The reindeer got their own IoT transmitters – The IoT network finds the lost reindeer

    Lapland’s reindeer owners in Finland want unresolved reindeer herding. The reindeer of dead reindeer will soon be real-time when the LoRa network built by Digita Oy is piloted in Palojärvi reindeer in Rovaniemi in September.

    “Real-time tracking and positioning reduces the number of hours of job seekers, which is also a big saving for the reindeer,” says Seppo Koivisto, a project leader in Palojärvi Reindeer .

    ” New transmitters in the IoT network do not need SIM cards, they pay a fraction of the stock price, and data traffic charges are a few euros a year. The equipment works with a small kettle for up to ten years, so this is a huge change, “says Särkisaari.

    Palojärvi Reindeer is located in Rovaniemi, Tervola, Ylitornio and Pello. The ground floor area is approximately 4000 square kilometers. There are 5000 reindeers in the area. The new transmitters get hundreds of reindeer, whose movements are tracked up until the spring.

    Digita is piloting reindeer tracking with the reindeer herding lake through the LoRa network. Tracking is important for the reindeer industry. The IoT network allows you to track more and more reindeer and also find the missing individuals.

    IoT network based on digital masts and bi-directional LoRa technology enables the operation of extensive network-connected devices. Also, the battery life of portable devices connected to the IoT network is much better than the older technologies.

    “Compared to earlier reindeer tracking devices, Digita’s IoT network solutions enable even lighter and longer-lasting tracking devices,” says Ari Kuukka, Director of Digita’s IoT Services.


  25. Tomi Engdahl says:

    IIoT and the rise of the cobots

    Though traditional robots remain relevant, collaborative robots are starting to emerge more in the industry, as they should with their small size, low cost, and adaptability to offer.

  26. Tomi Engdahl says:

    PC-based controls: Expanding plant-floor architectures from the edge to IIoT

    Edge devices facilitate data processing at the plant level, increasing security and using Industrial Internet of Things (IIoT) standards.

    “Smart” edge devices facilitate data processing at the plant level. Several tasks must be accomplished before a device can be considered a smart edge device. The first task centers on data collection from the industrial process. Once data has been acquired and stored, the edge device then accomplishes its primary task—data analysis based on preset goals or parameters. These tasks are carried out directly on the device, with the option to move the data vertically to the cloud or to other company databases for filling dashboards used by business and facilities managers.

    Data can be transmitted at the edge and/or to the cloud using recognized IoT and IIoT standards, such as object linking and embedding for process control unified architecture (OPC UA), message queuing telemetry transport (MQTT), and advanced message queuing protocol (AMQP). This creates a seamless migration path for future upgrades, and PC-based control systems are best-suited for these kinds of applications because of inherent openness to IT standards for hardware, software, and networking.


Leave a Comment

Your email address will not be published. Required fields are marked *