IoT trends for 2017

According to Intel IoT is expected to be a multi-trillion-dollar market, with 50 billion devices creating 44 zettabytes (or 44 trillion gigabytes) of data annually by 2020. But that widely cited 50 billion IoT devices in 2020 number is clearly not correct! Forecast of 50 Billion Devices by 2020 Is Outdated. In 2017 we should be talking about about some sensible numbers. The current count is somewhere between Gartner’s estimate of 6.4 billion (which doesn’t include smartphones, tablets, and computers), International Data Corporation’s estimate of 9 billion (which also excludes those devices), and IHS’s estimate of 17.6 billion (with all such devices included). Both Ericsson and Evans have lowered their expectations from 50 billion for 2020: Evans, who is now CTO of Stringify, says he expects to see 30 billion connected devices by then, while Ericsson figures on 28 billion by 2021.

Connectivity and security will be key features for Internet of Things processors  in 2017. Microcontroller (MCU) makers will continue to target their products at the Internet of Things (IoT) in 2017 by giving more focus on battery life, more connectivity of various types, and greater security. The new architectures are almost sure to spawn a multitude of IoT MCUs in 2017 from manufacturers who adopt ARM’s core designs.

ARM will be big. Last year, ARM’s partners shipped 15 billion chips based on its architectures. The trend toward IoT processors will go well beyond ARM licensees. Intel rolled out the Intel Atom E3900 Series  for IoT applications. And do not forget MIPS an RISC-V.

FPGA manufacturers are pushing their products to IoT market. They promise that FPGAs solve challenges at the core of IoT implementation: making IoT devices power efficient, handling incompatible interfaces, and providing a processing growth path to handle the inevitable increase in device performance requirement.

Energy harvesting field will become interesting in 2017 as it is more broadly adopted. Energy harvesting is becoming the way forward to help supplement battery power or lose the need for it altogether. Generally researchers are eyeing energy-harvesting to power ultra-low-power devices, wearable technology, and other things that don’t need a lot of power or don’t come in a battery-friendly form factor.

 

Low power wide area networks (LPWA) networks (also known as NarrowBand IoT) will be hot in 2017. There is hope that f LPWA nets will act as a catalyst, changing the nature of the embedded and machine-to-machine markets as NB-IoT focuses specifically on indoor coverage, low cost, long battery life, and enabling a large number of connected devices. The markets will become a kind of do-it-yourselfers paradise of modules and services, blurring the lines between vendors, users and partners.  At the same time for years to come, the market for low power wide area networks (LPWA) will be as fragmented and  is already in a race to the bottom (Sigfox, said to be promising costs approaching $1 per node per year). Competing technologies include Sigfox, LoRa Alliance, LTE Cat 1, LTE Cat M1 (eMTC), LTE Cat NB1 (NB-IoT) and other sub-gigahertz options almost too numerous to enumerate.

We are starting to see a battle between different IoT technologies, and in few years to come we will see which are winners and which technologies will be lost in the fight. Sigfox and Lora are currently starting well, but telecom operators with mobile networks NB-IoT will try hit the race heavily in 2017. Vendors prep Cat M1, NB1 for 2017: The Cat M1 standard delivers up to 380 Kbits/second over a 1.4 MHz channel. NB-1 handles up to 40 Kbits/s over 200 kHz channels.  Vendors hope the 7-billion-unit installed base of cellular M2M modules expands. It’s too early to tell which technologies will be mainstream and which niche. It could be that cellular NB-IOT was too late, it will fail in the short term, it can win in the long term, and the industry will struggle to make any money from it. At $2 a year, 20 billion devices will contribute around 4% of current global mobile subscription revenues.

New versions of communication standards will be taken into use in 2017. For example Bluetooth 5 that adds more speed and IoT functionality. In 2017, we will see an increase in the number of devices with the new Bluetooth 5 standard.

Industrial IoT to gain traction in 2017. Industrial applications ultimately have the greater transformative potential than consumer products, offering users real returns on investment (ROI) rather than just enhanced convenience or “cool factor”. But the industrial sector is conservative and has been slow to embrace an industrial IoT (IIoT), but is seems that they are getting interested now. During the past year there has been considerable progress in removing many of the barriers to IIoT adoption. A global wide implementation of an IIoT is many years away, of course. The issues of standards and interoperability will most likely remain unresolved for several years to come, but progress is being made. The Industrial Internet Consortium released a framework to support development of standards and best practices for IIoT security.

The IIoT  market is certainly poised to grow. A Genpact research study, for instance, indicates that more than 80% of large companies believe that the IIoT will be essential to their future success. In a recent market analysis by Industry ARC, for instance, the projected value of the IIoT market will reach more than $120 billion by 2021. Research firm Markets and Markets is even more optimistic, pegging IIoT growth at a CAGR of 8% to more than $150 billion by 2020. And the benefits will follow. By GE’s estimate, the IIoT will stimulate an increase in the global GDP of $10 to $15 trillion over the next 20 years.

Systems integrators are seeking a quick way to enter the industrial Internet of Things (IIoT) market. So expect to see many plug and play IoT sensor systems unveiled. There were many releses in 2016, and expect to see more in 2017. Expect to see device, connectivity and cloud service to be marketed as one packet.

IoT analytics will be talked a lot in 2017. Many companies will promise to turn Big Data insights into bigger solutions. For industrial customers Big Data analytics is promised to drive operational efficiencies, cut costs, boosting production, and improving worker productivity. There are many IIoT analytic solution and platform suppliers already on the market and a growing number of companies are now addressing industrial analytics use.

In 2016 it was all bout getting the IoT devices connected to cloud. In 2017 we will see increased talk about fog computing.  Fog computing is new IoT trend pushed by Cisco and many other companies. As the Internet of Things (IoT) evolves, decentralized, distributed-intelligence concepts such as “fog computing” are taking hold to address the need for lower latencies, improved security, lower power consumption, and higher reliability. The basic premise of fog computing is classic decentralization whereby some processing and storage functions are better performed locally instead of sending data all the way from the sensor, to the cloud, and back again to an actuator. This demands smarter sensors and new wireless sensor network architectures. Groups such as the Open Fog Consortium have formed to define how it should best be done. You might start to want to be able to run the same code in cloud and your IoT device.

 

The situation in IoT security in 2016 was already Hacking the IoT: As Bad As I Feared It’d Be and there is nothing that would indicate that the situation will not get any better in 2017.  A veritable army of Internet-connected equipment has been circumvented of late, due to vulnerabilities in its hardware, software or both … “smart” TVs, set-top boxes and PVRs, along with IP cameras, routers, DSL, fiber and cable modems, printers and standalone print servers, NASs, cellular hot spots, and probably plenty of other gear. IoT world at the moment is full of vulnerable devices, and it will take years to get then replaces with more secure devices. Those vulnerable devices can be used to make huge DDoS attacks against Internet services.  The 2016 October 21 cyberattacks on Dyn brought to light how easily many IoT devices can be compromised. I expect that kind of incidents will happen more in 2017 as DDoS botnets are pretty easy to build with tools available on-line. There’s no question that everyone in the chain – manufacturers, retailers and consumers – have to do a better job securing connected devices.When it comes to IoT, more security is needed.

 

2,275 Comments

  1. Tomi Engdahl says:

    Five reasons why system integrators are critical assets for the IIoT
    http://www.controleng.com/single-article/five-reasons-why-system-integrators-are-critical-assets-for-the-iiot/3c4ebb561a2f5f7730cd74be638c0caf.html

    System integrators can help expand the Industrial Internet of Things (IIoT) for companies because they have a deep understanding of many systems and can work as a go-between for many departments as an independent and powerful voice.

    1. The IoT is an ecosystem project. IoT is a complex organism with many parts—sensors, gateways, the platform, analytics engine and enterprise/business apps. No single vendor can offer a complete end-to-end solution that can cover all of this.

    2. Connectivity across departments. Currently, the information technology (IT) and operations technology (OT) departments work in silos with hardly any information being shared, much less in real time.

    3. Start small and scale. The complexity of the IoT project often means that the end user prefers to start small and then scale it up. They usually start with a proof-of-concept or a small goal oriented problem and then expand across departments.

    4. Domain knowledge. Typically, the IoT solution providers have in-depth knowledge about the technology and its facets, but not the implementation. They may have some understanding of the problems and issues, but they have little deep knowledge of the applications and the business.

    5. Trust factor. IoT is uncharted territory for most enterprises and they are hesitant to entrust a new set of vendors with an unused technology for achieving their critical goals. This is why integrators are useful because they already have a relationship with enterprises because they already have an established and trusted relationship with them.

    As the scope and demand for the IIoT increases, the role of integrators in bridging the gap between the solution providers and their targeted marketing segments will be increasingly important. In the age of collaborative manufacturing, the hardware and software vendors with the most robust integrator will be the one to lead the IIoT game.

    Reply
  2. Tomi Engdahl says:

    An integrated network for Industrie 4.0
    System integration via the cloud makes networking at the production level easy and secure by vertically integrating management and systems as well as providing a security function for Industrie 4.0
    http://www.controleng.com/single-article/an-integrated-network-for-industrie-40/9c30f6893fdf7090d973a80aefd33958.html

    The implementation of smart factory technologies and platforms, such as Industrie 4.0, is attracting a great deal of attention and requires integration and optimization of the information technology (IT) systems used at the management, production, and field levels. However, integrating field networks with higher levels using IT can pose problems for the network’s speed and capacity.

    Integration

    Seamless message protocol (SLMP) is defined as a mechanism for integrating and seamlessly connecting different types of field networks. This protocol enables connection from a higher-level system to field devices without considering the differences.

    Ethernet is adopted as the lower-level communication layer and a token passing method is its higher-level communication control method. In the token passing method, data transmission rights-tokens-are relayed around the network between stations following a designated route. Only those stations having data transmission right can transmit data.

    Currently, tokens are circulated around a statically determined route, but technically, it also is possible to change this route dynamically at random intervals. In the future, this will enable route switching depending on the product to be manufactured (Figure 2).

    Simultaneous troubleshooting also is important in network configuration. It must be possible to easily find the location of trouble on the network. Management tools for network event history and a network diagnostic tool can help users find the cause quickly.

    Reply
  3. Tomi Engdahl says:

    Time-sensitive networking’s benefits for the IIoT and manufacturing
    http://www.controleng.com/single-article/time-sensitive-networkings-benefits-for-the-iiot-and-manufacturing/4ac1787f8e6de89ad0df89ba3934721e.html

    Technology Update: Time-sensitive networking (TSN) is moving from the idea stage to deterministic networking and the result of widespread adoption will lead to the Industrial Internet of Things (IIoT).

    Time-sensitive networking (TSN) is finally moving from the idea stage to the main stage of deterministic networking. The IEEE TSN working group has completed the core set of standards required to implement TSN, the industry has developed the first products to support the technology, and simulations and demos are taking place. Widespread adoption of these technologies is the full-blown Industrial Internet of Things (IIoT) revolution that has been talked about.

    Full TSN implementation will take place over several phases. Because the switch to TSN requires a phased approach, companies won’t be able to just retrofit the technology into legacy systems. While companies won’t be able to immediately replace the existing machines, they must change infrastructures in a way that allows machines to communicate with each other more effectively. Many manufacturers have seen the benefits of standardized Ethernet within operations, and with TSN disparate networks aren’t needed to support time-critical and best-effort Ethernet traffic.

    Standard Ethernet

    The promise of TSN is twofold. First, it’s based on standard Ethernet. The traffic found on standard Ethernet, such as video and HTML, can share the physical network with high-priority deterministic Ethernet, such as motion control. This is important because those industrial products that need deterministic services are now part of the network, requiring attention to latency and jitter. With TSN, all devices that are connected to the network can be part of a validated architecture, rather than being siloed.

    TSN isn’t bogged down by always having to go at the set speeds at all times because it is part of the Ethernet. Instead, precise scheduling is used to speed up or slow down, and prioritize the delivery of whatever packet of information needs to be delivered. It also offers no jitter, even in an atmosphere where it can accommodate more devices. Instead of treating every packet the same, it can receive and interpret all data at once, calculate the maximum amount of time that can be expended before transmission, and disseminate all the information where it needs to go, seamlessly.

    This technology is essential because as more devices come onto a network, the need for that central “hub” to direct all the trains—and ensure they come in on time—becomes more important.

    One of the most important concepts of Industrie 4.0 is the need for standard technologies that all vendors can operate.

    The first step in this line of disruption will be the continued adoption of OPC Unified Architecture (OPC-UA). Once OPC-UA integrates functionality into one framework, it should carry TSN with it.

    Reply
  4. Tomi Engdahl says:

    IoT Security Costs are Manageable
    https://www.eetimes.com/author.asp?section_id=36&doc_id=1332412&

    Internet of Things device security has become more critical than ever, as the risks now outweigh the opportunities when it comes to potential threats to an individual or even an entire government.

    Reply
  5. Tomi Engdahl says:

    LED lighting design considerations for smart cities
    https://www.edn.com/electronics-blogs/led-diva/4458839/LED-lighting-design-considerations-for-smart-cities

    “Smart City” refers to the integration of communications and physical assets into a cohesive network to facilitate a safer, more livable, and more energy-efficient environment for the people who live there.

    In a Smart City, real-time information is provided to administrators from a city-wide deployment of sensors and monitors. Depending on the design, the collected data can enable any number of capabilities, such as monitoring weather and air quality, adjusting traffic signals to relieve congestion, adjusting mass-transit schedules to meet changing demand, and more rapid deployment of emergency responders.

    Kansas City has realized one of the more well-known examples of the Smart City concept in a two-mile corridor. The implementation uses sensors integrated into outdoor street lighting to generate a real-time picture of traffic patterns, street car transit, and even open parking spaces.

    Reply
  6. Tomi Engdahl says:

    First Widely Available SoC Bundle with a Dev Kit for AVS Has Launched
    https://developer.amazon.com/blogs/alexa/post/d1789e3e-6441-45d8-8281-cbccc774d092/first-avs-dev-kit-with-production-ready-silicon-and-client-application

    New Production-Ready Offering with NXP ARM-based SoC is Primed for Commercial Developers

    Development kits for AVS are designed for developers to evaluate the full potential of integrating Alexa into a variety of connected devices, and to give them a jumpstart in prototyping. The ultimate goal is to get product ideas into production faster and more cost-effectively. This is why we’re excited to highlight the first broadly available dev kit for AVS with a production-ready SoC, voice input processor, and device application built with the AVS Device SDK. The Synaptics AudioSmart 2-Mic Development Kit for AVS with NXP SoC

    Reply
  7. Tomi Engdahl says:

    Researchers propose an open ‘internet of water’ tracking use, quality and costs
    https://techcrunch.com/2017/10/13/researchers-propose-an-open-internet-of-water-tracking-use-quality-and-costs/?ncid=rss&utm_source=tcfbpage&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&sr_share=facebook

    Where did the water coming out of your tap come from? How is it filtered and purified? How much does it cost the city and state per gallon to deliver? How can they improve that? These and other questions come naturally as fresh water becomes more and more valuable a resource — and we need a shared, open ‘internet of water’ to answer them, say researchers from Duke University and the Aspen Institute.

    “Our water world is data rich, but information poor,” explained Martin Doyle, of Duke’s Nicholas Institute. “If water data were shared openly and then integrated in a common digital platform, there would be game-changing opportunities ranging from private citizens’ ability to gauge the quality of local water to public officials’ ability to warn populations of water-borne public health hazards.”

    Internet of Water Could Revolutionize Water Management
    https://nicholasinstitute.duke.edu/articles/internet-water-could-revolutionize-water-management

    To realize the dormant value of the data, say some producers and users, would require making them widely shareable in standardized digital formats, thereby allowing their real-time aggregation for a host of purposes beyond those that spurred their original collection. They believe that opening the data and investing in water data infrastructure would set in motion a wave of innovation, leading to more sustainable management of our water resources. They envision creation of an Internet of Water.

    The Need for an Internet of Water

    In the United States, water management is hindered by decision makers’ inability to answer three fundamental questions about our water systems in a timely way: How much water is there? What is its quality? How is it used (withdrawn, consumed or returned for different purposes)?

    “It’s not that the data aren’t being collected,”

    First, water is undervalued—and water data even more so. Moving water from its source, treating it, and delivering it to faucets has a cost. Similarly, collecting data, “cleaning” or standardizing them, and delivering them to an end user has a cost. But unlike water utilities, most public agencies know neither the full cost of their data infrastructure nor the water and cost savings of putting the data to timely use. This blind spot has discouraged public agencies from further investing in data infrastructure.

    Second, there’s a need to make existing public water data more accessible. The data’s value in decision making is diminished if the data are hard to share across platforms.

    Third, the appropriate architecture for an Internet of Water is a federation of data producers, hubs, and users—entities often isolated from one another. Initially, some overarching governance structure is needed to intentionally connect data hubs and to help coordinate adoption of shared metadata and data standards to ensure that data hubs can talk to one another.

    Within the proposed framework, data relevant to sustainable water management would be shared by communities with specific roles and responsibilities.

    “With finite water resources and growing demand for them, we need open and accessible data to help us navigate tradeoffs,”

    Reply
  8. Tomi Engdahl says:

    Why KRACK could hit your smart home’s Wi-Fi the hardest
    https://www.cnet.com/news/why-krack-wi-fi-attack-could-hit-your-smart-home-hardest/

    Smart devices and appliances, everything from your refrigerator to your television, are ideal targets for hackers thanks to the KRACK exploit.

    The latest massive security vulnerability hits close to home.

    It’s called KRACK, short for Key Reinstallation Attack, and it’s a vulnerability that affects any Wi-Fi connection using the common encryption method WPA2. That means pretty much any device using Wi-Fi is fair game.

    The good news is your phones and laptops are likely safer from attacks thanks to rapid security updates. The bad news: your smart home gadgets may not be so lucky.

    The attack is the latest reminder of the pitfalls we face when it comes to our increasingly smart, connected devices. When your television and refrigerator hold sensitive information like Netflix or Amazon logins, they become potential targets for hackers. It’s a problem that’s going to get worse as the internet of things grows and we further surround ourselves with gadgets that talk to each other.

    Reply
  9. Tomi Engdahl says:

    Canonical CEO Mark Shuttleworth: IoT, Ubuntu and the yogurt of the future
    https://www.networkworld.com/article/3233945/internet-of-things/canonical-ceo-mark-shuttleworth-iot-ubuntu-and-the-yogurt-of-the-future.html

    “Raspberry Pi plus Ubuntu plus an app makes a huge difference” in the world of IoT, he says

    Canonical founder and CEO Mark Shuttleworth is one of the most prominent people in open source software.

    Sign In | Register
    network world
    Search for
    Go
    Careers
    Cloud Computing
    Data Centers
    Disaster Recovery
    Home Tech
    Hybrid Cloud
    Internet of Things
    Infrastructure Management
    Linux
    Mobile & Wireless
    Networking
    SDN
    Security
    Small Business
    Software
    Storage
    Unified Communications
    Virtualization
    WAN
    Cisco Subnet
    Microsoft Subnet
    Tech Primers
    News
    Reviews
    Insider
    Blogs
    Resources/White Papers
    Newsletters
    Video
    Network World Events
    Canonical CEO Mark Shuttleworth: IoT, Ubuntu and the yogurt of the future
    “Raspberry Pi plus Ubuntu plus an app makes a huge difference” in the world of IoT, he says

    By Jon Gold
    Senior Writer, Network World
    OCT 18, 2017 3:00 AM PT

    Nitot via Creative Commons

    Canonical founder and CEO Mark Shuttleworth is one of the most prominent people in open source software.

    ADVERTISING

    Ubuntu, the GNU/Linux-based operating system that he helped birth in 2004 is now one of the best-known open source projects in the world, accounting for a vast proportion of the Linux VMs in the public cloud and huge numbers of connected devices.

    He sat down with Network World Senior Writer Jon Gold to talk about the future of IoT and the evolution of technology.

    NW: One thing that’s interesting about IoT is that new tech is coming from companies that you wouldn’t consider traditional IT vendors.

    MS: The thing I personally love about IoT is that it’s genuine entrepreneurship – but the thing about IoT is that literally anybody that finds themselves in a particular situation is able to see how taking a small piece of electronics and some software in a particular context to make something better. So that makes it just a lot of fun from an entrepreneurial point of view.

    MS: Exactly! For me, it’s just an example of the contrast with the other half of the house – in the cloud space, we’re working with Google, Amazon, Netflix, Uber – a lot of the guys who are thinking of global operations. But that’s completely abstract – it’s hundreds of thousands of VMs running containers for fractions of a second…

    NW: Canonical is a software company, but it’s got a prominent role in IoT thanks to Ubuntu Core – are you guys going to need additional hardware expertise to keep up?

    network world
    Search for
    Go
    Careers
    Cloud Computing
    Data Centers
    Disaster Recovery
    Home Tech
    Hybrid Cloud
    Internet of Things
    Infrastructure Management
    Linux
    Mobile & Wireless
    Networking
    SDN
    Security
    Small Business
    Software
    Storage
    Unified Communications
    Virtualization
    WAN
    Cisco Subnet
    Microsoft Subnet
    Tech Primers
    News
    Reviews
    Insider
    Blogs
    Resources/White Papers
    Newsletters
    Video
    Network World Events
    Canonical CEO Mark Shuttleworth: IoT, Ubuntu and the yogurt of the future
    “Raspberry Pi plus Ubuntu plus an app makes a huge difference” in the world of IoT, he says

    By Jon Gold
    Senior Writer, Network World
    OCT 18, 2017 3:00 AM PT

    Nitot via Creative Commons

    Canonical founder and CEO Mark Shuttleworth is one of the most prominent people in open source software.

    ADVERTISING

    Ubuntu, the GNU/Linux-based operating system that he helped birth in 2004 is now one of the best-known open source projects in the world, accounting for a vast proportion of the Linux VMs in the public cloud and huge numbers of connected devices.

    He sat down with Network World Senior Writer Jon Gold to talk about the future of IoT and the evolution of technology.

    NW: One thing that’s interesting about IoT is that new tech is coming from companies that you wouldn’t consider traditional IT vendors.

    MS: The thing I personally love about IoT is that it’s genuine entrepreneurship – but the thing about IoT is that literally anybody that finds themselves in a particular situation is able to see how taking a small piece of electronics and some software in a particular context to make something better. So that makes it just a lot of fun from an entrepreneurial point of view.

    NW: What are the most noteworthy pieces of entrepreneurship you’ve seen around IoT?

    MS: Thermal pumping of yogurt.

    NW: Thermal pumping of yogurt.

    RELATED
    Canonical’s eyes are on IoT
    VMware embraces cloud during VMWorld, CEO Gelsinger says
    Life as an IT contractor
    VIDEO
    What’s next in IoT innovations?
    MS: Yeah, it’s not as sleazy as it sounds. If you’ve ever seen yogurt, it has a little film of water on top of it – the yogurt’s fine, it’s just that temperature variations in transit or wherever have essentially squeezed the water out of the jelly. And the net effect is yogurt that people are more inclined to think has turned, and it gets wasted.

    If you imagine an economy with 300 million people eating yogurt, it turns into an enormous amount of waste and, therefore, a nice big opportunity for someone who can put the right device in the right place at the right time and line up all the pieces.

    (Ed. – the company Shuttleworth is referring to is IMS-Evolve, and there are further details available from IoT-Now here.)

    NW: I have to be honest, this is not what I imagined we were going to talk about.

    MS: Exactly! For me, it’s just an example of the contrast with the other half of the house – in the cloud space, we’re working with Google, Amazon, Netflix, Uber – a lot of the guys who are thinking of global operations. But that’s completely abstract – it’s hundreds of thousands of VMs running containers for fractions of a second…

    NW: Sort of a ghost data center.

    MS: Exactly so. As a result, it’s the domain of a very few people, who compete ferociously with the idea that, in the back of their minds, the winner takes all. And that pays the bills for us. … but in IoT, what I love about it is that it’s literally real people looking at a real problem and thinking how, like, Raspberry Pi plus Ubuntu plus an app makes a huge difference. They’re not competing with Google, they’re not waking up every day thinking, “How do I get a billion dollars out of Silicon Valley?” But it’s real, and it’s real money, too – millionaires will be minted this way, and they’ll deserve it, and their stories are interesting.

    NW: Any particular verticals that are more likely than others to mint those millionaires?

    MS: Just follow your own day, is what I would say – you wake up at home and have a bunch of transport, have a bunch of communications, you work in an office, you socialize in another kind of structure somebody else is building, you move through public spaces, and end up back at home. Every phase of that, whether it’s retail or entertainment or commercial or personal, you’re surrounded by the opportunity to make things smarter, whether that’s smarter control over lighting and energy or security access control, or whatever.

    NW: Is this where you saw Ubuntu even five years ago?

    MS: So I’m an investor, and I got very lucky when I was young, with security on the Internet. But if you look at everything I’ve done, you look at the world and say, “What are the deep things that will take five or 10 years to play out?” Because if you’re reading about something that’s, right now, imminent and hot, it’s generalized enough that the winners and losers are probably already at the table.

    So you kind of have to spot stuff before it’s mainstream news, and be willing to run with that stuff, right or wrong, for four or five years or a decade. What was clear to me was that the open source approach to technology would be much more than hobbyists. It would really come to define, first, the Rebels, and then the Galactic Empire.

    NW: (Quietly assumes that Shuttleworth just saw the new trailer for “Last Jedi”)

    There was a time when open source was really about independent experts who were getting things right on their own time. But now, Microsoft, Google, Amazon are falling over themselves to give away as much open source on machine learning – this is the crown jewels, effectively, and they’re trying to give it away as open source. It’s the industrialization of that prospect.

    NW: That would have been tough to predict a few years ago.

    MS: I would say it was a fairly cogent bet that if I could focus on professionalizing free software and finding economics that didn’t interfere with the flow of it being free, then that would be [a winner.] I did not predict cloud, but we were in the right place at the right time.

    NW: Canonical is a software company, but it’s got a prominent role in IoT thanks to Ubuntu Core – are you guys going to need additional hardware expertise to keep up?

    RELATED ARTICLES
    Review: Microsoft Azure IoT Suite
    The CSO IoT security basics survival guide
    IoT standards battles could get messy
    See all Insider
    MS: The trend is to standardize the modules. So if you think about the original PC, what really made it was that it’s a form factor where you had the expectation that you could plug into it. That’s really what differentiated the PC from other personal computers that had come before. You could take the lid off the box, and there was a bus there and you could plug something into it. It didn’t have to be designed by the same people that designed the box.

    Now it’s kind of going the other way – the PC is the thing that you plug in.

    “here’s the size and space where the brain is going to go.” And they don’t necessarily know in advance what kind of brain it’s going to be, and if they can say to the developers, “it’s going to be ARM, it’s going to be x86, but it’s going to be Ubuntu,” the developers can start creating and testing software in the cloud

    Reply
  10. Tomi Engdahl says:

    Zizmos Continues Its Quest to Create an IoT Earthquake-Warning Network
    https://spectrum.ieee.org/view-from-the-valley/at-work/start-ups/zizmos-continues-its-quest-to-create-an-iot-earthquake-warning-network

    A few smartphone users in the Mexico City area were running the Zizmos app, described below, when this week’s magnitude-7.1 earthquake struck, Zizmos founder Battalgazi Yildirim reports, but not enough to issue a warning, although Zizmos did register the shaking.

    Yildirim says he’d like to be able to get 50 fixed sensors installed in Mexico City—enough to reliably give warnings of aftershocks.

    Reply
  11. Tomi Engdahl says:

    Nathan Ingraham / Engadget:
    Sonos One review: the Alexa-enabled speaker has better sound than Google Home or original Echo, works with most music services, but setup process is complicated — When Sonos released the Play:5 speaker in late 2015, the Amazon Echo was still an unproven tech curiosity.

    Sonos One review: The best-sounding smart speaker you can buy
    If you want clearer music than you can get from an Echo or Google Home, look no further.
    https://www.engadget.com/2017/10/18/sonos-one-review/

    Reply
  12. Tomi Engdahl says:

    Karissa Bell / Mashable:
    Samsung announces Bixby 2.0 update with better voice recognition and more, will bring it to IoT devices, and plans to open it to third-parties in “near future”

    Samsung wants to put its digital assistant in fridges and TVs
    http://mashable.com/2017/10/18/samsung-bixby-sdk/#K_YUToD1POq3

    It was only a matter of time: Samsung’s Bixby assistant isn’t confined to just phones anymore.

    The company will soon bring its digital assistant to appliances, starting with its own refrigerators and smart TVs. Samsung is also working with third-party developers to open up Bixby to non-Samsung products “in the near future.”

    The news is part of Samsung’s “Bixby 2.0″ update, announced today at the company’s developer conference in San Francisco. The revamped Bixby is smarter, has better voice recognition capabilities, and has improved personalization features.

    It’s also the first time Samsung has started to bring its much-hyped assistant to devices other than its smartphones — a significant move for the company, whose assistant lags behind Amazon and Google.

    Adding Bixby to appliances, though, stands to eventually give Samsung a leg up over Amazon and Google, which have already been slowly integrating with home appliances. But given that Samsung already sells a whole lot of its own washers, dryers, TVs, and fridges, the company could easily make up a lot of lost ground fairly quickly — at least in theory.

    It’s not clear just how many of Samsung’s appliances will be ready to support Bixby anytime soon. The company says it’s beginning with its smart TVs and Family Hub refrigerator (that’s the camera-equipped fridge that lets you check what’s inside even when you’re not home.)

    Reply
  13. Tomi Engdahl says:

    TechCrunch:
    Swedish lock giant Assa Abloy, which owns Yale and other brands, acquires smart lock maker August Home, which had raised around $75M

    Swedish lock giant Assa Abloy acquires smart lock maker August Home
    https://techcrunch.com/2017/10/19/swedish-lock-maker-assa-abloy-set-to-acquire-august-home/

    The smart home market continues to heat up, and the legacy giants do not want to get locked out: quite literally. This morning, Assa Abloy, the $23 billion Swedish lock giant that owns Yale and many other brands — announced that it is buying US-based smart lock maker August Home to double down on new technology.

    Terms of the deal are not being disclosed but we have asked both August and Assa Abloy and will update this post as we learn more. Pending regulatory approvals, Assa Abloy says the acquisition will close in the fourth quarter of 2017.

    “We have always admired the design and quality of Yale locks,” said Jason Johnson, CEO of August, in a statement. “This is a great opportunity for us to work with the world’s largest lock and access company.”

    Assa Abloy is the very definition of an old-guard giant that is now figuring out its steps in a new world very much being shaped by technology. The company has been in business in some form since 1881 (although the currently publicly traded company has been around since 1994). The company employs 47,000 people and has annual sales of about $8 billion.

    August, in contrast, has been around since 2013 and has 90 employees. But it has become a market leader in the emerging connected security space, courtesy of its smart home locks and door bells.

    The smart lock market is still a relatively nascent area. To put this deal into some context, August Home’s revenues for 2018 are expected to be $60 million, Assa Abloy noted today, or 0.75% of Assa Abloy’s entire current business.

    August had raised around $75 million in venture funding, with the most recent round closing only in July of this year.

    August has been growing fairly quickly on its own in recent years, courtesy of distribution deals with mega-retailers in the U.S. like Best Buy.

    Reply
  14. Tomi Engdahl says:

    Comparing Alexa, Google Assistant, Cortana and Siri smart speakers
    https://techcrunch.com/2017/10/08/comparing-alexa-google-assistant-cortana-and-siri-smart-speakers/

    The smart home assistant race has been building to a fever pitch over the course of the last couple of years. Things really came to head this past two weeks, when Amazon, Google and Sonos all held big events highlighting their latest smart speaker plays, making the already busy field a heck of a lot more crowded.

    The burgeoning category can be a tough one to navigate. A lot of picking the right speaker for your own needs comes down to your assistant of choice — that, in turn, has a lot to do with both feature sets and your own mobile operating system loyalties. Each has benefits and drawbacks — Amazon has cornered the home, Apple has done a good job in mobile and Google has straddled the two better than anyone else. And Microsoft, well, a lot of people own Windows computers, at least.

    Reply
  15. Tomi Engdahl says:

    Alex Webb / Bloomberg:
    Apple partners with General Electric to develop industrial mobile apps for managing machinery, factories, and power plants

    GE Joins With Apple to Make Industrial Apps for Mobile Devices
    https://www.bloomberg.com/news/articles/2017-10-18/ge-joins-with-apple-to-make-industrial-apps-for-mobile-devices

    General Electric Co. is teaming up with Apple Inc. to develop mobile apps for managing machinery, factories and power plants as the industrial giant steps up efforts to sell software and services.

    Reply
  16. Tomi Engdahl says:

    https://www.edn.com/electronics-products/other/4458959/Wireless-transceiver-supports-dual-standards?utm_content=buffer0c698&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer

    The ML7404 RF transceiver from Lapis Semiconductor boasts LPWA (low power wide area) dual-mode functionality to enable new wireless IoT applications. This LSI device supports both Sigfox (subscription-based LPWA using unlicensed sub-GHz frequency bands), which has been adopted in more than 30 countries, and the IEEE 802.15.4k long-range wireless standard, which provides robust interference from the same system and has the capacity to cover more terminals under one network.

    Reply
  17. Tomi Engdahl says:

    Aussies Propose Crackdown On Insecure IoT Devices
    https://hackaday.com/2017/10/16/aussies-propose-crackdown-on-insecure-iot-devices/

    We’ve all seen the stories about IoT devices with laughably poor security. Both within our community as fresh vulnerabilities are exposed and ridiculed, and more recently in the wider world as stories of easily compromised baby monitors have surfaced in mass media outlets. It’s a problem with its roots in IoT device manufacturers treating their products as appliances rather than software, and in a drive to produce them at the lowest possible price.

    The Australian government have announced that IoT security is now firmly in their sights, announcing a possible certification scheme with a logo that manufacturers would be able to use if their products meet a set of requirements. Such basic security features as changeable, non-guessable, and non-default passwords are being mentioned, though we’re guessing that would also include a requirement not to expose ports to the wider Internet. Most importantly it is said to include a requirement for software updates to fix known vulnerabilities. It is reported that they are also in talks with other countries to harmonize some of these standards internationally.

    Web-connected household devices to face mandatory rating over spying fears
    http://www.smh.com.au/federal-politics/political-news/webconnected-household-devices-to-face-mandatory-rating-over-spying-fears-20171013-gz08jp.html

    Internet-connected products from baby monitors to sports shoes will soon bear a mandatory Australian cyber security consumer rating amid growing alarm at hacking of everyday devices.

    The Turnbull government is pushing the technology industry to come up with its own consumer advice rating that could be a “cyber kangaroo” logo giving a tick of approval or a star system similar to the health stars on some packaged food, and energy stars on electrical appliances.

    The regime would cover the so-called “Internet of things” – or IoT – referring to everyday goods that are connected to the web. Tipped to number 50 billion by the end of this decade, they range from cars and household appliances such as fridges, microwaves and televisions, through to children’s toys and sports shoes and socks.

    Reply
  18. Tomi Engdahl says:

    iDONT (Internet Doorbell ON/off Trigger)
    iDon’t as in I don’t want my doorbell to ring.
    https://hackaday.io/project/20545-idont-internet-doorbell-onoff-trigger

    Using an ESP8266, two relays, five ICs, and some R and Cs, the iDONT is placed between the doorbell transformer and existing wiring to the doorbell and chimes. The iDONT not only silences the doorbell on command from a smart phone, but sends a message when the doorbell is pressed even when the chimes are off!

    Overview

    Problem: A ringing doorbell at the wrong time can wreck meals, naps, or a once in a life time moment (queue dramatic music). Furthermore, when you’re away, how can you know whether you’ve had any visitors, packages, or neighbors stop by.

    Solution: You need a way to route the switch off the doorbell, but still know if someone is delivering the pizza. Don’t just cut the doorbell cord, leaving your friends hanging out in the cold, make it smart enough to send you a text or email you when they arrive. All while the baby is still sleeping upstairs.

    Take the current doorbell system and break the connection after the 16-24VAC transformer. Relays controlled by an ESP8266 connect:

    The doorbell and bell/ringer to the ESP8266 for logging and sending information to a phone OR
    The doorbell and bell/ringer to the transformer for normal operation

    Reply
  19. Tomi Engdahl says:

    Duncan Riley / SiliconANGLE:
    Intel and Amazon partner to release a new development kit enabling Alexa voice-control capabilities in third-party smart home devices

    Intel teams with Amazon on Alexa development kit for third-party devices
    https://siliconangle.com/blog/2017/10/20/intel-teams-amazon-deliver-alexa-development-kit-third-party-devices/

    Intel Corp. and Amazon.com Inc. said Thursday they’re teaming up to deliver a new development kit that allows developers to embed Amazon’s Alexa voice-control capabilities in third-party smart home devices.

    The Intel Speech Enabling Developer Kit provides an audio front-end solution for far-field voice control and is claimed to be the first audio front-end solution that combines far-field voice processing and the “Alexa” wake word detection on a single chip.

    On the tech side, the chip is based on a new digital signal processor architecture from Intel with an inference engine that optimizes the process of adding far-field voice recognition to connected products. In addition, the “high-performance” algorithms are said to be designed to allow for acoustic echo cancellation and noise reduction to enable speech capture in noisy environments. For those who are looking to build prototypes, the chip is compatible with Raspberry Pi 3 miniature computer running AVS audio client software.

    Reply
  20. Tomi Engdahl says:

    Edge centers: hyperconverged technology for IIoT&P
    https://siliconangle.com/blog/2017/06/29/edge-centers-hyper-converged-technology-iiotp/

    IIoT&P edge computing is gaining traction in business. New hyperconverged infrastructure technologies can be employed to add scale and flexibility to most complex edge environments.

    The Industrial Internet of Things and People, or IIoT&P, is reshaping business. Once the province of supervisory control and data acquisition, known as SCADA, in discreet and process manufacturing verticals, businesses of all sizes and shapes are exploring use cases for combining IIoT&P sensor, actuator, analytic and cloud technologies into differentiated business systems that can reduce costs, improve operations and enhance customer experience.

    However, as IT leaders plow the application greenfield for IIoT&P, they are encountering physical, infrastructure, cost and organizational realities that demand considerate, architectural treatment. A new set of technology choices and disciplines – edge computing – is emerging to address these realities.

    But what is edge computing? Is it just general-purpose SCADA? A last-ditch attempt by information technology traditionalists to hold back cloud advances into businesses? As an IT professional, is there something deeper that you need to understand to help you choose outcomes, guide strategy and lead changes related to edge computing?

    IIoT&P forces a rethinking of the relationship between business and information technology. For most of the first 50 years or so of the IT industry, business applied relatively known processes to relatively unknown technology. For example, accounting processes were codified as accounting software packages on rapidly evolving hardware technologies. While the characteristics of the application processes evolved, often in response to technology possibilities, generally these systems used highly stylized data and process structures that were defined by conventions and rules that could be, and were, established by human institutions.

    Today, through IIoT&P, businesses are trying to use relatively well known cloud, sensor, and robotic technologies to execute unknown processes – like customer journeys or the paths taken by autonomous vehicles.

    Welcome to the ‘edge’ of technology architecture

    IIoT&P’s impact on business will be significant; according to the Wikibon community, its impact on technology architecture will be even greater (see Figure 2). IIoT&P systems frequently must distribute data, processing, and control out to where the action is. This is what is meant by “IIoT&P edge”: The resources required to process and perform IIoT&P events typically must be proximate to sites where the events take place. This is in direct opposition to the notion that all processing will move to central, cloud locations.

    The edge involves unprecedented architectural constraints. Applications at the edge often demand extremely low latency, capture highly sensitive data, operate in environmentally challenging and remote locations, and require extreme security.

    Data movement costs are significant and likely to rise. However, even when an edge implementation features more normal constraints, the costs of data movement from edge to cloud can be prohibitive, forcing architectural designs to keep data at the edge.

    Edge technology options are packaged and priced right. It used to be that robust, scalable hardware technologies couldn’t operate without significant administrative attention and purified environmental. That no longer is the case. The computing technologies that have taken over the data center – virtualized and software-defined, rack-based CPU, flash storage and integrated networking platforms – are being packaged to support edge computing needs at almost any scale and environmental conditions. For example, Dell EMC’s VxRail appliance can be pre-configured to support a range of analytics, automation and lights-out operation requirements. These hyper-converged platforms enable data center performance and administrative control at the edge, limiting the need for trading off processing quality, cost and IIoT&P fidelity. Wikibon calls them “edge centers.”

    The factors driving edge technology selection

    Edge computing sites often comprise sensors and devices from dozens of operational technology (OT) vendors, each utilizing different interface specifications, communications protocols, analytic models, and control mechanisms. Gateways have been used to mediate these differences, translating protocols and managing data flows within the edge site and from the site back to central locations. However, gateways typically provide limited capacity for general purpose computing, complex analytics processing or supporting software-defined resources. Moreover, software-defined edge gateways are emerging from companies like Microsoft, providing additional incentives to consider more powerful hyper-converged infrastructure (HCI) platforms that can concurrently run a range of gateway, sensor stream, analytic and management workloads.

    As edge computing gains business visibility, old rules-of-thumb – and some newer cloud-oriented assumptions – for architecture, system design, sourcing relationships, and technology selection fail. Legacy IIoT&P investments ensure that most edge investments are brownfield. However, technology leaders must presume that software-defined IIoT&P will be combined with advances in sensor technology to dramatically enhance the flexibility and applicability of edge technology to a burgeoning group of use cases.

    Reply
  21. Tomi Engdahl says:

    A New IoT Botnet Storm is Coming
    https://blog.checkpoint.com/2017/10/19/new-iot-botnet-storm-coming/

    A massive Botnet is forming to create a cyber-storm that could take down the internet.
    An estimated million organizations have already been infected.
    The Botnet is recruiting IoT devices such as IP Wireless Cameras to carry out the attack.

    New cyber-storm clouds are gathering. Check Point Researchers have discovered of a brand new Botnet evolving and recruiting IoT devices at a far greater pace and with more potential damage than the Mirai botnet of 2016.

    While some technical aspects lead us to suspect a possible connection to Mirai, this is an entirely new and far more sophisticated campaign that is rapidly spreading worldwide. It is too early to guess the intentions of the threat actors behind it, but with previous Botnet DDoS attacks essentially taking down the Internet, it is vital that organizations make proper preparations and defense mechanisms are put in place before an attack strikes.

    Ominous signs were first picked up via Check Point’s Intrusion Prevention System (IPS) in the last few days of September. An increasing number of attempts were being made by hackers to exploit a combination of vulnerabilities found in various IoT devices.

    With each passing day the malware was evolving to exploit an increasing number of vulnerabilities in Wireless IP Camera devices such as GoAhead, D-Link, TP-Link, AVTECH, NETGEAR, MikroTik, Linksys, Synology and others. It soon became apparent that the attempted attacks were coming from many different sources and a variety of IoT devices, meaning the attack was being spread by the IoT devices themselves.

    So far we estimate over a million organizations have already been affected worldwide, including the US, Australia and everywhere in between, and the number is only increasing.

    Reply
  22. Tomi Engdahl says:

    Dan Seifert / The Verge:
    Review of Harman Kardon Invoke on sale Oct. 22: great sound, sharp design, supports only Microsoft calendars, twice as costly as Echo, no multi-account support

    Harman Kardon Invoke review: Cortana gets a speaker of its own
    A smart speaker for Microsoft’s world
    https://www.theverge.com/2017/10/20/16505468/harman-kardon-invoke-cortana-microsoft-smart-speaker-review

    For a company that makes a voice-controlled assistant, it has become table stakes to have a smart speaker for the home that uses it: Amazon’s Alexa debuted on the Echo smart speaker three years ago, Google now has a complete lineup of Home speakers that use the Google Assistant, and Apple’s forthcoming HomePod is powered by, you guessed it, Siri.

    Not one to be left out of the party, there’s now a smart wireless speaker that uses Microsoft’s Cortana assistant. The $199 Harman Kardon Invoke is not hugely different than the Amazon Echo or Google Home. It has seven far-field microphones to hear your voice commands from across the room. It has a circular light on top that illuminates when it hears its wake word or is responding to a request. And it can be used to deliver facts, perform unit conversions, set timers or alarms, look up directions, control smart home gadgets, or add things to a to-do or shopping list.

    Reply
  23. Tomi Engdahl says:

    Brandon Butler / Network World:
    Cisco to acquire machine learning startup Perspica and integrate its real-time data processing tool into AppDynamics

    Cisco snaps up streaming-data startup Perspica
    Real-time data processing tool will be integrated with AppDynamics
    https://www.networkworld.com/article/3234329/lan-wan/cisco-snaps-up-streaming-data-startup-perspica.html

    Cisco today announced plans to acquire San Jose-based startup Perspica, a company that specializes in using machine learning to analyze streams of data.

    Cisco says it will integrate the Perspica technology into its AppDynamics product, which provides network and application monitoring and analytics.

    One of the reasons it was attracted to Perspica is because of the company’s ability to monitor data in real-time, Cisco says. Being able to process data as it’s created or very soon afterwards can speed the time that end users are able to gain insights from the data, the company says. “Perspica is known for its stream-based processing with the unique ability to apply machine learning to data as it comes in instead of waiting until it’s neatly stored,” says Bhaskar Sunkara, VP of Engineering at AppDynamics.

    Reply
  24. Tomi Engdahl says:

    Jarvis Access Control System
    https://www.hackster.io/austinn/jarvis-access-control-system-2f55ed?ref=explore&ref_id=trending___&offset=0

    Next generation commercial access control for the IoT era.

    Using a Raspberry Pi running Android Things, I have created an authentication back-end service using Firebase Realtime Database and a generic keypad with RFID tags. The keypad is set into reader mode which passes data to the Raspberry Pi using the Weigand 26 protocol. The user is identified as an access key in Firebase and is either allowed access or denied based on rules stored in Firebase. There is an Android app available that allows provisioning of access keys as well as other functions such as opening the door, creating new PINs, provisioning new RFID tags, and setting your access key’s “boom music”.

    Reply
  25. Tomi Engdahl says:

    How Eclipse is advancing IoT development
    https://opensource.com/article/17/10/eclipse-and-iot?sc_cid=7016000000127ECAAY

    Open source organization’s modular approach to development is a good match for the Internet of Things.

    September’s Eclipse IoT Day, held in conjunction with RedMonk’s ThingMonk 2017 event, emphasized the big role Eclipse is taking in IoT development. It currently hosts 28 projects that touch a wide range of IoT needs and projects.

    Ian notes that many factories still are not connected.

    Additionally, he says, “SCADA [supervisory control and data analysis] systems and even the factory floor technology are very proprietary, very siloed. It’s hard to change it. It’s hard to adapt to it… Right now, when you set up a manufacturing run, you need to manufacture hundreds of thousands of that piece, of that unit. What [manufacturers] want to do is to meet customer demand, to have manufacturing processes that are very flexible, that you can actually do a lot size of one.” That’s a big piece of what IoT is bringing to manufacturing.

    Eclipse’s approach to IoT

    He describes Eclipse’s involvement in IoT by saying: “There’s core fundamental technology that every IoT solution needs,” and by using open source, “everyone can use it so they can get broader adoption.” He says Eclipse see IoT as consisting of three connected software stacks.

    functions of this three-layer model:

    A stack of software for constrained devices (e.g., the device, endpoint, microcontroller unit (MCU), sensor hardware).
    Some type of gateway that aggregates information and data from the different sensors and sends it to the network. This layer also may take real-time actions based on what the sensors are observing.
    A software stack for the IoT platform on the backend. This backend cloud stores the data and can provide services based on collected data, such as analysis of historical trends and predictive analytics.

    Eclipse’s IoT projects

    Of Eclipse’s many IoT projects currently in use, Ian says two of the most prominent relate to MQTT, a machine-to-machine (M2M) messaging protocol for IoT. Ian describes it as “a publish‑subscribe messaging protocol that was designed specifically for oil and gas pipeline monitoring where power-management network latency is really important. MQTT has been a great success in terms of being a standard that’s being widely adopted in IoT.” Eclipse Mosquitto is MQTT’s broker and Eclipse Paho its client.

    Eclipse Kura is an IoT gateway that, in Ian’s words, “provides northbound and southbound connectivity [for] a lot of different protocols” including Bluetooth, Modbus, controller-area network (CAN) bus, and OPC Unified Architecture, with more being added all the time. One benefit, he says, is “instead of you writing your own connectivity, Kura provides that and then connects you to the network via satellite, via Ethernet, or anything.”

    A newer project, Eclipse Kapua, is taking a microservices approach to providing different services for an IoT cloud platform.

    Ian says Eclipse hawkBit, which manages software updates, is one of the “most intriguing projects. From a security perspective, if you can’t update your device, you’ve got a huge security hole.”

    Reply
  26. Tomi Engdahl says:

    Ry Crist / CNET:
    Amazon Echo (2017) review: better-looking than the original and less expensive at $99, with comparable sound quality; addition of an aux output is handy

    Amazon Echo (2017) review:
    New Amazon Echo: New look, new price, same Alexa smarts
    https://www.cnet.com/products/amazon-echo-2017/review/

    Alexa is still the most compelling voice control platform, and the new and improved Echo should only boost her momentum. It’s well worth $100.

    Reply
  27. Tomi Engdahl says:

    Real-Time Energy Monitor with Arduino and LabVIEW
    https://www.open-electronics.org/real-time-energy-monitor-with-arduino-and-labview/

    This is a simple power meter to analize the current consuming in a house using the led indicator of a house energy meter.

    Reading the red led of a home energy counters the system detects the corrent consumption in a house.

    It is a noninvasive method

    The system consists of two parts: the Arduino board that detects the led pulses and sends the data via the XBee module, and a PC that recive the data through a USB/Xbee module and processes the data with LabVIEW so you can prepare and study the consumption in a very instant.
    Arduino sends two datas to the PC:
    1 – Real time datas
    2 – Average consumption measured in a time of 5 minutes.

    Reply
  28. Tomi Engdahl says:

    The Web Clock You Can Control Over a LAN
    https://hackaday.com/2017/10/22/the-web-clock-you-can-control-over-a-lan/

    Not every project is meant to solve a new problem. Some projects can be an extension of an existing solution just to flex the geek muscles. One such project by [limbo] is the Web Clock 2.0 which is an internet-connected clock.

    Yes, it uses a WEMOS D1 mini which is equipped with an ESP-12F (ESP8266) and yes, it uses an LCD with an I2C module to interface the two. The system works by connecting to the Google servers to get GMT and then offsets it to calculate the local time. It also has the hourly nagging chime to let you know that another precious hour of your life has gone and you need to set it up.

    What [limbo] adds to the conventional functionality is a LAN application to send custom messages to the LCD. The software is called ‘Clock Commander’ and can be downloaded as a Windows binary through the source code is unavailable for now. Simply point it to the correct IP address and you can then send it commands to display stuff as well as control the sound. The project comes with Lua scripts and instruction how to DIY.

    Web Clock Version 2.0 (ESP8266 – Wemos)
    http://www.instructables.com/id/Web-Clock-Version-20/

    Features

    LCD screen of various sizes supported. 2×8 or 2×16 LCD Screen is recommended
    Displays time and date
    Web based time synchronization (No RTC Required)
    Super accurate time keeping
    Hourly chimes
    Time zone friendly
    DST switch for summer time
    12/24 switch
    WiFi connection to access web
    It can powered via micro USB cable or other 5V source
    WiFi custom message/reminder receiver (Windows software is available to send messages to device)
    Acknowledge/display last message button

    Reply
  29. Tomi Engdahl says:

    The Week in Review: IoT
    IoT market growth; investments in IoT; Cambium products.
    https://semiengineering.com/the-week-in-review-iot-67/

    International Data Corp. (IDC) forecasts the worldwide Internet of Things market will double from $625.2 billion in 2015 to $1.29 trillion in 2020 for a compound annual growth rate of 15.6%. Aeris collaborated with IDC on its report, which predicts the installed base of IoT endpoints will increase from 12.1 billion at the end of 2015 to more than 30 billion by 2020.

    Dell Technologies announced it will spend $1 billion over the next three years on new IoT products, along with its ecosystem, partners, and laboratories. The company is forming an IoT Division

    Salesforce is launching IoT Explorer Edition on Tuesday, October 17, offering enterprise customers a way to analyze IoT data and make use of it.
    It builds on the Salesforce Internet of Things Cloud, launched two years ago.

    Samsung Electronics will next week reportedly introduce its b.IoT technology for smart buildings. The b.IoT system will monitor and adjust lighting and temperatures in buildings. The technology could also improve the security of enterprise facilities.

    Ericsson is working with SoftBank Group’s PS Solutions unit and CKD Corp. to update the “e-kakashi” platform, which offers artificial intelligence and IoT technologies for agricultural processes. The second-generation platform will launch in March of next year.

    SAP and VMware are partnering to help customers with their IoT device and network management. SAP’s analytics for business transactions will be paired with VMware’s operational systems and holistic analytics.

    Reply
  30. Tomi Engdahl says:

    Teardown: Smart switch provides Bluetooth power control
    https://www.edn.com/design/consumer/4458922/Teardown–Smart-switch-provides-Bluetooth-power-control

    The BT4101 smart switch that’s the subject of today’s teardown

    Reply
  31. Tomi Engdahl says:

    What’s in store for optical biosensors? Part 1
    https://www.edn.com/design/medical/4458938/What-s-in-store-for-optical-biosensors–Part-1

    Optical sensors represent the most common type of biosensor. This two-part series provides a technical background on how optical techniques are used for bioanalytical applications. This article provides an overview on using reflectometry for a pulse plethysmograph (PPG) waveform and describes the physical and physiological principals at work. Part 2 will look at common noise and error sources affecting optical sensors in mobile and wearable applications, including the effects of confounders from the environment captured in the measurement and the physiological variations among the user population. It also provides a summary of current capabilities of wearable biosensors and the future direction of optical biosensing applications.

    Reply
  32. Tomi Engdahl says:

    Solving the IoT sensor design challenges. But can all the data be communicated?
    https://www.electropages.com/2017/10/solving-iot-sensor-design-challenges-data-communicated/?utm_campaign=&utm_source=newsletter&utm_medium=email&utm_term=article&utm_content=Solving+the+IoT+sensor+design+challenges.+But+can+all+the+data+be+communicated%3F

    mproved sensor technology is a key element driving forward the creation of IoT systems and devices but the monumental amounts of data they will create has to be communicated and this raises some serious worries about whether the Internet in its current form will cope.

    On the sensor side of things a technology collaboration aimed at solving what the participating partners see as IoT sensor design challenges has been formed by chip company Analog Devices (ADI) and nanotech and digital technologies research organization Imec.

    According to the two organizations continued development of IoT related products and devices is hampered because the underlying sensors, and the chips upon which they are built, are often too big, too expensive and not sufficiently accurate. The joint research initiatives that have already been started in the framework of the strategic collaboration will focus on what it describes as localization sensor technology.

    Figures from industry analysts certainly make it clear just how massive the IoT market will be for sensor components. A report from analysts Business Insider goes as far to say it will become the largest global market for devices and that by 2019 it will be over twice the market size of the smart phone, automotive electronics and tablet sectors. And according to Garner Incorporated the worldwide number of connected IoT devices and systems will reach 20.4 billion by 2020.

    There is no doubt that improved sensor technology is a fundamentally important design challenge if the full potential of IoT connectivity is to be achieved.

    However, having collected colossal amounts of IoT sensor created data it has to be communicated and here lies one of the major technology hurdles that could seriously hindered IoT progress.

    Many industry pundits argue that unless we see IPv6 (Internet Protocol version 6) implemented, the Internet as it stands with its existing IPv4 structure will be incapable of handling the constant deluge of IoT data. The point is that IPv6 has a much larger address space. The length of an IPv6 address is 128 bits, compared with 32 bits in IPv4 and this would provide the Internet with far greater data communication capacity.

    Reply
  33. Tomi Engdahl says:

    DALI (digital addressable lighting interface) technology has long been a mainstay of the connected lighting sector in Europe, but has not been widely used in the US, and frankly gets dismissed quite often in discussion of which wired and wireless network technologies will become ubiquitous in solid-state lighting (SSL). But the group behind DALI has formalized a marketing push and also expanded the scope of the scheme with the new DALI-2 standard.

    DALI-2 boosts lighting control systems with certification, control devices, and improved interoperability
    http://www.ledsmagazine.com/articles/print/volume-14/issue-7/features/lighting-controls/dali-2-boosts-lighting-control-systems-with-certification-control-devices-and-improved-interoperability.html?eid=293591077&bid=1895825

    DALI-2 brings new functionality to DALI lighting control systems by standardizing devices such as application controllers and inputs. As TIM WHITAKER and SCOTT WADE explain, DALI-2 certification will also lead to improved interoperability.

    Digital addressable lighting interface (DALI), the digital lighting control protocol, is currently going through a period of significant change, which will see the introduction of the first DALI-2 certified products, as well as the first standardized DALI control devices such as occupancy sensors and application controllers.

    Many of the first DALI-2 certified products are likely to be LED drivers (or, in IEC language, control gear for LED modules). In due course, these will be joined by drivers enabling color control; control gear for self-contained emergency lighting; application controllers; and input devices such as light sensors and occupancy sensors. Meanwhile, a DALI wireless network is also on the horizon.

    Why DALI?

    As standardized in IEC 62386, DALI is a dedicated protocol for lighting control that enables the easy installation of robust, scalable, and flexible lighting networks. It was originally developed to allow digital control, configuration, and querying of fluorescent ballasts, replacing the simple, one-way, broadcast-like operation of 0/1–10V analog control. With DALI, the broadcast option is also available. In addition, with simple configuration, each DALI device can be assigned a separate address, allowing digital control of individual devices. Furthermore, the DALI devices can also be programmed to operate in groups.

    The original DALI logo is used widely throughout the global lighting industry to indicate products that are in compliance with the older version 1 of the DALI standard. This logo usage will continue in the short term. However, DALI version-1 compliance testing is based on self-declaration by manufacturers
    Also, testing is based on the older, outdated versions of IEC 62386, and the testing procedures have various gaps. For both of these reasons, there can be interoperability issues in the field for DALI version-1 products from different manufacturers.

    In contrast, DALI-2 certification involves a verification step, in which the test results are checked to confirm that the correct tests have been carried out, and that the results are all successful.

    Interoperability

    DALI-2 certification brings the promise of significantly improved interoperability, meaning there is a much greater likelihood that certified DALI-2 products are interoperable with each other. DALI-2 test sequences — the software that enables testing on approved test equipment — are much more detailed than for DALI version-1, and fill in many of the gaps that can cause interoperability problems.

    Color control and wireless

    Color control of lamps and luminaires has many applications; it can enable the optimization of color temperature of white lighting, for example, in offices and commercial buildings, as well as mood lighting and scene setting in high-end architectural projects. DALI color control is already covered by part 209 of IEC 62386, which defines four color types, but IEC has plans to separate the two most popular types into separate parts for ease of use. These are xy chromaticity, which allows selection of a color within the CIE 1931 chromaticity diagram, and color temperature (Tc), which allows selection of the correlated color temperature with reference to the black-body line.

    And what about wireless? A new part 104 of IEC 62386 is under development, and is based on replacing the lower layers of the protocol stack that are currently described in the system part (101) of IEC 62386. Bluetooth Mesh or other wireless technologies are possible candidates. Most of the DALI protocol will be retained, maintaining the major DALI advantages: control, configuration, and querying.

    Reply
  34. Tomi Engdahl says:

    IoV = Internet of Vehicles

    Securing the Internet of Vehicles Is Possible
    https://www.securerf.com/securing-internet-vehicles-possible/?utm_campaign=Email%20Newsletter&utm_source=hs_email&utm_medium=email&utm_content=57468636&_hsenc=p2ANqtz-8JUmlzWeiBHaW-z_v8NzDDh5BavLsq0YkCnEm7Aw6ZVrf3n9xv6r7xHl9ZAeK01G88NOaw7rI4wrWR-EtXK1_RnE6MUZD8RAjAuxbwrgFnHZM_Q-A&_hsmi=57468636

    Another month and yet another story about the vulnerability of modern vehicles to hackers looking to take control of our automobiles. According to a recent Trend Micro report, a security research team found that it is possible to turn off a vehicle’s key automated components—including safety mechanisms such as the antilock braking system (ABS) and door locks—by accessing its internal controller area network (CAN) bus, which is the network that connects all of a vehicle’s devices. The team, which included researchers from Politecnico di Milano, Linklayer Labs, and Trend Micro, concluded that the new denial of service (DoS) attack was vendor neutral and “indefensible by modern car security technology.”

    Unfortunately, the DoS attack described in Trend Micro’s report is just the latest in a long list of examples (e.g., the 2015 Jeep hack and the recent Telsa Model X hack) showing how determined hackers can gain access to a connected car. With each newly uncovered vulnerability, the lack of sufficient vehicle security becomes an even more critical issue for the automotive industry to address. Manufacturers must quickly find a solution, especially if they want to convince consumers that semi- and fully-autonomous vehicles are safe.

    Connected vehicles are another manifestation of the Internet of Things (IoT), and securing the “Internet of Vehicles” (IoV) is rapidly growing in importance for a host of security-, safety-, and privacy-related reasons.

    Reply
  35. Tomi Engdahl says:

    The Week in Review: IoT
    August Home acquisition; Arm TechCon; Samsung Connect Tag.
    https://semiengineering.com/the-week-in-review-iot-68/

    ASSA ABLOY has agreed to acquire August Home, a startup providing home security products; the purchase price wasn’t revealed. August Home, which raised $75 million in private funding, should fit well with the Scandinavian conglomerate’s Yale lock business. The transaction is subject to regulatory approval and customary closing conditions; it is expected to close by the end of this year.

    Reply
  36. Tomi Engdahl says:

    Hardware IoT Development as Simple as Drag and Drop
    https://www.designnews.com/iot/hardware-iot-development-simple-drag-and-drop/165472481057633?ADTRK=UBM&elq_mid=1481&elq_cid=876648

    Earlier this year Google held its IO 2017 conference where the latest in Android and Artificial Intelligence tools where presented through demonstrations to attending developers.

    Reply
  37. Tomi Engdahl says:

    The Week in Review: IoT
    https://semiengineering.com/the-week-in-review-iot-68/

    ASSA ABLOY has agreed to acquire August Home, a startup providing home security products;

    The LoRa Alliance this week released new technical specifications at its 9th All Members Meeting in Suzhou, China, hosted by ZTE. The new specs are LoRaWAN 1.1, LoRaWAN Backend Interfaces 1.0, and LoRaWAN 1.1 Regional Parameters rev. A.

    Apple and General Electric are collaborating on bringing GE’s Predix Industrial IoT platform to iPhones and iPads. The companies will offer a software development kit for IIoT applications to run on Apple’s iOS operating system. GE will standardize on iPhone and iPad for mobile devices, while Apple will tout Predix to its developers and customers.

    The Samsung Connect Tag was introduced this week by Samsung Electronics. The consumer device uses narrowband IoT technology to link itself with Samsung’s SmartThings Hub and the Samsung Connect mobile application. The tracker is 4.21 centimeters wide and 1.19cm thick. It has an embedded, programmable, virtual SIM that cannot be removed from the device.

    CENTRI Internet of Things Advanced Security – IoTAS now supports the Arm Mbed IoT Device Platform, according to CENTRI,

    Reply
  38. Tomi Engdahl says:

    Hardware IoT Development as Simple as Drag and Drop
    https://www.designnews.com/iot/hardware-iot-development-simple-drag-and-drop/165472481057633?ADTRK=UBM&elq_mid=1481&elq_cid=876648

    Earlier this year Google held its IO 2017 conference where the latest in Android and Artificial Intelligence tools where presented through demonstrations to attending developers.

    Earlier this year Google held its IO 2017 conference where the latest in Android and Artificial Intelligence tools where presented through demonstrations to attending developers.

    Some of the software tools discussed at the event were Tensorflow, Kotlin, and Android Things platform using Android Studio. The Android Things session presented new coding features of Android Studio that allow hardware developers to build IoT devices.

    At first glance, high level coding may sway novice IoT developers because of the steep learning curve in using traditional programming languages such as XML, Javascript, and C++ used to build wireless devices. Cayenne has removed this coding roadblock by creating an online and mobile development platform where IoT applications can be built by dragging and dropping device widgets onto a dashboard.

    To gain access to the online IoT development tools requires a simple registration. Once registered, you have the complete online IoT development tools suite at your disposal. The mydevices Cayenne website provides an introduction video which shows the key features of the mydevices IoT platform and how to setup the hardware and download the programming tools to your microcontroller development platform. The Raspberry Pi, and Arduino microcontroller-based platforms, along with the LoRa devices, are compatible with the mydevices IoT development tool suite.

    For the Raspberry Pi, the tools can be installed by a communications terminal using SSH (Secure Shell), or using the Cayenne Mobile app. The installation process can take up to 10 minutes.

    After the tools have been installed, an online dashboard will appear on the desktop PC or notebook computer’s screen.

    Building the IoT application is as simple as dragging and dropping a device widget onto a dashboard. To expedite the IoT build, Cayenne provides a variety of widgets. Also, project templates for actuator, sensor devices are provided to help assist in building IoT concepts quickly. In addition, the look and functionality of the actuator or sensor can be changed by selecting from a list of event and visual attributes.

    The software tools were installed on my Raspberry Pi 3 by SSH and the Tera-Term communication terminal. Once installed, I selected the simple LED light template for mydevices IoT project. I built the LED circuit using an Adafruit T-Cobbler breakout board and a solderless breadboard. I selected a pushbutton to activate the LED and placed it on my project dashboard. Also, I added a LED icon to the pushbutton to reflect the IoT project’s control function.

    Toggling the pushbutton on the dashboard with the mouse turns on and off the wired LED circuit on the solderless breadboard. The total development time of this project was 30 minutes.

    https://mydevices.com/cayenne/lora/

    Reply
  39. Tomi Engdahl says:

    Ask SecureRF: AES for Authentication?
    https://www.securerf.com/ask-securerf-aes-authentication/?utm_campaign=Email%20Newsletter&utm_source=hs_email&utm_medium=email&utm_content=57468636&_hsenc=p2ANqtz-8JUmlzWeiBHaW-z_v8NzDDh5BavLsq0YkCnEm7Aw6ZVrf3n9xv6r7xHl9ZAeK01G88NOaw7rI4wrWR-EtXK1_RnE6MUZD8RAjAuxbwrgFnHZM_Q-A&_hsmi=57468636

    Question: AES is used successfully all the time. Why shouldn’t we use AES for authentication?

    SecureRF: AES is a range of symmetric encryption mechanisms widely available on many devices—for free. You can use AES to authenticate a device, but it typically requires the connection to a database or network and lot of other processing that makes it impractical for just authentication. In short, you use AES by having the same key on two endpoints (Alice and Bob), and then use the keys to encrypt and then decrypt the messages. But the implementation challenge is how did these two endpoints get their keys? And if you have millions of devices, you need to maintain a database of all the keys so you can look up the correct keypair. Maintaining these key databases securely—anywhere in the world the device might appear—and immediately serving up the necessary key is impractical, if not impossible. This is not what AES is intended for.

    In contrast, a public key method, like those from SecureRF, enables two entities to meet (that have never connected before) and authenticate (one-way or mutually) without the need to retrieve a key from a database or connect to a network.

    Reply
  40. Tomi Engdahl says:

    Study: Use of IoT in corporate networks is soaring
    7% of large IoT users say security is still a top concern.
    https://www.networkworld.com/article/3232358/internet-of-things/study-use-of-iot-in-corporate-networks-is-soaring.html

    We’ve reached the sharp part of the adoption curve for IoT, as a recent study shows skyrocketing adoption of the technology across all business sectors for a huge range of different purposes.

    Vodafone’s annual IoT barometer this month found that 84% of the 1,278 senior IT decision-makers who responded had increased their adoption and use of IoT solutions in the past year. 12% of the respondents had at least 10,000 connected devices in use at their company, while 6% had more than 50,000 in operation.

    Big adoption numbers underline that companies are seeing tangible upsides from their IoT deployments. The survey found that virtually all – 95% – of respondents said they had realized measurable advantages from their implementation of the technology. Just over half said that IoT is either enhancing existing revenue streams or opening up new ones, which could help explain why 88% of those experiencing benefits from IoT report ploughing additional investment into the technology in the past year.

    Large-scale IoT use doubles, generates revenue for companies
    https://www.networkworld.com/article/3230522/internet-of-things/large-scale-iot-use-doubles-generates-revenue-for-companies.html

    Use of IoT in the enterprise is increasing — and making money. It will grow even faster as more people understand and implement LPWAN, experts say.

    Over a half of worldwide Internet of Things (IoT) adopters say they’re making money out of the technology, according to a new report from Vodafone. Hiked revenue and a burgeoning return on investment (ROI) is becoming widespread, the telecommunications company says.

    Reply
  41. Tomi Engdahl says:

    3 real-world examples of IoT rolled out in the enterprise
    https://www.networkworld.com/article/3213868/internet-of-things/3-real-world-examples-of-iot-rolled-out-in-the-enterprise.html

    Without network support, businesses may not be able to reap all the benefits of the data IoT generates.

    Buying into IoT comes with a wealth of benefits, but adopting heavy use of the internet of things means more than plugging in devices and waiting for the data to pour in; it means modifying network infrastructure to accommodate them.

    This is not a trivial consideration. If the network doesn’t adequately support all aspects of IoT, a company may be unable to take advantage of all that data and will fail to realize the return on investment it was hoping for.

    Reply
  42. Tomi Engdahl says:

    Security Researchers Hacked a Bluetooth-Enabled Butt Plug
    The quest for a secure wireless sex toy continues.
    https://motherboard.vice.com/en_us/article/ne788b/hackable-bluetooth-buttplug-hush-lovense

    The rectums of the world are clenched in fear after Italian infosec researcher Giovanni Mellini revealed just how easy it is to hack a Bluetooth-enabled butt plug in a blog post on Tuesday.

    As detailed by Mellini in his blog post, he was able to hack the butt plug using a Bluetooth Low Energy (BLE) scanner developed by Simone Margaritelli and freely available on Github. Bluetooth is considered to not be the most secure way to send information wirelessly, but its low energy version is even more vulnerable to attacks. Still, it has found wide use in Internet of Things (IoT) devices because it drains less battery to use.

    Hack a BT Low Energy (BLE) butt plug
    https://scubarda.wordpress.com/2017/10/17/hacking-a-bt-low-energy-ble-butt-plug/

    Few weeks ago I bought a Bluetooth Low Energy (BLE) butt plug to test the (in)security of BLE protocol.

    This caught my attention after researchers told us that a lot of sex toys use this protocol to allow remote control that is insecure by design.

    Reply
  43. Tomi Engdahl says:

    BLE SoC senses tire pressure
    https://www.edn.com/electronics-products/other/4458877/BLE-SoC-senses-tire-pressure

    The SmartBond DA14585 BLE (Bluetooth Low Energy) SoC from Dialog Semiconductor monitors the air pressure and temperature inside automotive tires. Instead of using proprietary or nonstandard sub-GHz radios to transfer information to the automobile’s computer, the DA14585 TPMS (tire pressure monitoring system) sensor uses Bluetooth connectivity to communicate with the computer.

    A BLE-enabled TPMS built with the DA14585 does not require a microcontroller. The part handles all of the processing for a TPMS, while bringing the added benefits of security, upgradable firmware, and connectivity to automobile computers via a single node for all Bluetooth Low Energy functions.

    SmartBond™ DA14585
    Smallest, lowest power and most integrated Bluetooth 5 SoC
    https://www.dialog-semiconductor.com/products/da14585

    Reply
  44. Tomi Engdahl says:

    How To Build A Trillion Connected Things
    Will there be enough resources and designers to make this concept work?
    https://semiengineering.com/how-to-build-a-trillion-connected-things/

    A trillion is a big number.

    A broadcaster reads about 1,000 words in a five-minute newscast. At that rate, it would take 6,000 years at that rate to finish a trillion-word newscast.

    We’re on a path in the technology industry to build and connect a trillion devices in the coming years. How are we going to do that, given the scale and sheer size of the task? Is it achievable in the time frame allotted?

    If we assume 2 square millimeters per IoT sensor device, or 35,000 packed onto a 300mm wafer, a trillion devices require 28 million wafers. That’s three times the annual capacity of the industry’s largest foundry, but just 30% of today’s total annual worldwide production. So in this context, it’s achievable.

    The resource challenges
    Energy on the other hand, is more of a challenge, given that the vast majority of these devices are expected to require battery power. A 240 mAh coin cell weighs 3g and contains about 109mg of lithium. One trillion cells contain 109 billion grams, which is 109,000 metric tons. The world’s annual lithium production today is one third of that. In this case, it appears we’re going to have to rely heavily on energy harvesting for these IoT devices, which has its own set of challenges I’ll reference below.

    Add to that engineering resources. Someone has to design the trillion sensors. What does that entail? There are roughly 5,000 people worldwide who can design a radio for a sensor node. Spread across a trillion sensors, that’s 200 million sensors per designer. That suggests a small number of platforms that would be re-used in many applications.

    There are roughly 20 million people worldwide who can write code. If they were all designing sensors, and made 50,000 copies of each of their designs, we’d still get to a trillion.

    Regardless, engineers are a resourceful bunch and we’ve overcome the “impossible” countless times in the history of electronics by focusing on essentials. We’re doing the same as the IoT evolves, and IoT needs four crucial elements. It needs to:

    • Work separately
    • Work together
    • Work automatically
    • Work resiliently, securely and safely

    Separate
    Nobody wants to connect a thing if that thing does not perform some useful function in the first place.

    Together
    For the promise of IoT scale to be realized, these trillion devices need to communicate with each other and with the cloud to make the most (and most efficient) use of collected data.

    Automatic
    Artificial intelligence and machine learning play an enormous role along this road to a trillion devices.

    Resilient
    Lastly, in a world of a trillion connected IoT devices, we need resiliency. Think about safety-critical systems—pumps, robots, locks and so forth—where failure can be catastrophic.
    Here is where we need a stepped-up focus—an industry collaboration—to improve security from edge to cloud. Part and parcel of this is to make the user do much less of the work in the security chain, and to make it invisible for him or her as part of daily routines.

    Reply
  45. Tomi Engdahl says:

    Narrowband-IoT tests started in Finland

    This week, Finland successfully transferred Internet data from objects via the Narrowband-IoT technology to Telia’s mobile network. Previously, transfers were made only in laboratory conditions. In addition to Telia, Nokia, Keysight and iProtoxi were included.

    NB-IoT can achieve 250 kbps in LTE network. The test also succeeded in transferring data with an LTE-M solution that allows 1 Mbps transmission speed. Both technologies were tested in Vallila by commercial LTE network devices supplied by Nokia.

    The test utilized the Keysight-developed NB-IoT network simulation environment and testing software that enabled device testing and network operation testing before the commercial availability of NB-IoT products .

    Finnish iProtoXi has developed a sensor solution that was first tested in a simulated environment.

    Source: https://www.uusiteknologia.fi/2017/10/24/narrowband-iot-testit-alkoivat/

    Reply
  46. Tomi Engdahl says:

    The K-dealer is a mumble – a forgotten device disturbs passers-by from the competitor’s premises

    Jouni Tuominen, the seller of K-supermarket at Kamppi, received remarkable contacts on Friday. It was rumored that the business had begun to impractantly and unlawfully impede coffee ads for the passers-by of mobile phones.

    An interesting turn is that the lighthouse with its advertisements is dating back to 2011. It is still a bit odd that the device seems to work from the premises of a former competitor.

    “Originally, the device had to ask if the customer would want to bid through Bluetooth. Only after giving the answer he would have received an offer on the phone, “says Tuominen.

    “The device vendor disappeared right after the installation and also my device included the device at that time” Tuominen continues. “Certainly, someone has put the forgotten device on the wall in the case of remodeling, and it has awakened to life.”

    Kamp’s K-supermarket has commissioned experts to locate and destroy the device.

    Source: http://www.tivi.fi/Kaikki_uutiset/k-kauppias-aiman-kakena-unohdettu-laite-hairikoi-ohikulkijoita-kilpailijan-tiloista-6683382

    Reply
  47. Tomi Engdahl says:

    IoMT = Internet of Moving Things

    Reply
  48. Tomi Engdahl says:

    Smart Cities Use Low-Power Networks to Flourish
    http://www.sealevel.com/community/blog/smart-cities-use-low-power-networks-to-flourish/

    Internet of Things (IoT) and Industrial Internet of Things (IIoT), at the core, are communications technologies. Data is transmitted between objects, and devices communicate with users using cloud services. Thus far, IoT and IIoT applications have relied heavily on cellular 3G/4G, Bluetooth and Wi-Fi for their networks.

    As with all tech, limitations to those methods exist. Distance can present an issue. High power costs and subscription fees present budget challenges. Security may be a concern. There is a gap between the three services, but Low-Power, Wide-Area Network (LPWAN) technology has filled it.

    The Things Network and the LoRa Alliance are initiatives dedicated to increasing LPWAN usage. They see the huge potential LoRa and other LPWANs present for ultra -connected smart cities. It provides a way for public programs to answer the question, “where can I park,” quickly, efficiently and easily. Through LoRa, parents can know local parks are safe for kids 24/7. Even sanitary workers can ask, “What trash cans need to be emptied?” without driving all over town. Of course, these aren’t the only questions to which LoRa provides an answer. Where could LoRa make your city, or your facility, smarter and better?

    Reply

Leave a Comment

Your email address will not be published. Required fields are marked *

*

*