IoT trends for 2018

Here is a list f IoT predictions for year 2018. With the number of connected devices set to top 11 billion – and that’s not including computers and phones – in 2018, Internet of Things will clearly continue to be a hot topic. Here is my prediction list:

1. Artifical Intelligence – it will be talked a lot

2. Blockchain – blockchain will be hyped to be a solution for many IoT problems, and it will turn out that it is not the best solution for most of problems it is hyped for – and maybe it will find few sensible uses for it in IoT. Blockchain can add immutability and integrity to some IoT transactions.

3. 4G mobile for IoT: NB-IoT and LTE-M are ready to be tested or used in many markets

4. 5G will be hyped a lot for IoT applications but it is nowhere near for any real big IoT use cases

6. Security issues will be talked a lot. IoT security is far from solved issue.

7. Privacy issues of IoT will be talked a lot when our homes and pockets are starting to be filled with ever listening digital assistants.

8. Industrial Internet of Things (IIoT) will be massive

9. More CPU power will be added or used in the edge. Pushing processing power to the “edge” brings a number of benefits and opportunities.

10. Hardware based security: Hardware based security on microprocessors will be talked a lot after “Meltdown” and “Spectre” disaster

Links to more predictions:

https://www.networkworld.com/article/3245528/internet-of-things/7-iot-trends-that-will-define-2018.html

https://www.information-management.com/opinion/predictions-2018-5-trends-driving-the-internet-of-things-and-industrial-internet-of-things

https://www.forbes.com/sites/danielnewman/2017/12/19/the-top-8-iot-trends-for-2018/#17a9943267f7

https://www.ibm.com/blogs/internet-of-things/top-5-iot-trends-in-2018/

https://www.inc.com/james-paine/3-internet-of-things-trends-to-watch-in-2018.html

https://www.i-scoop.eu/iot-2018-1/

https://www.computerworlduk.com/iot/iot-trends-2018-artificial-intelligence-security-edge-solutions-3669388/

https://dzone.com/articles/iot-trends-for-2018

https://www.forbes.com/sites/bernardmarr/2018/01/04/the-internet-of-things-iot-will-be-massive-in-2018-here-are-the-4-predictions-from-ibm/

 

1,393 Comments

  1. Tomi Engdahl says:

    A LONG-AWAITED IOT CRISIS IS HERE, AND MANY DEVICES AREN’T READY
    https://www.wired.com/story/upnp-router-game-console-vulnerabilities-exploited

    YOU KNOW BY now that Internet of Things devices like your router are often vulnerable to attack, the industry-wide lack of investment in security leaving the door open to a host of abuses. Worse still, known weaknesses and flaws can hang around for years after their initial discovery. Even decades. And Monday, the content and web services firm Akamai published new findings that it has observed attackers actively exploiting a flaw in devices like routers and video game consoles that was originally exposed in 2006.

    Over the last decade, reports have increasingly detailed the flaws and vulnerabilities that can plague insecure implementations of a set of networking protocols called Universal Plug and Play. But where these possibilities were largely academic before, Akamai found evidence that attackers are actively exploiting these weaknesses not to attack the devices themselves, but as a jumping off point for all sorts of malicious behavior, which could include DDoS attacks, malware distribution, spamming/phishing/account takeovers, click fraud, and credit card theft.

    “We started talking about how many of these vulnerable devices are out there and what can they be leveraged for, because most people seem to have forgotten about this vulnerability,”

    Down With UPnP
    UPnP helps devices on a network find and essentially introduce themselves to each other, so that a server, say, can discover and vet the printers on a network.

    When IoT devices expose too many of these mechanisms to the open internet without requiring authentication—or when credential checks are easily guessable or can be brute forced—attackers can then scan for devices that have implemented a few of these protocols badly all in one device, and then exploit this series of manufacturer missteps to launch an attack.

    That’s also how the Akamai researchers found the malicious UPnP proxy schemes. Akamai says it found 4.8 million devices on the open internet that would improperly return a certain query related to UPnP. Of those, about 765,000 also had a secondary implementation issue that created a bigger network communication vulnerability. And then on more than 65,000 of those, Akamai saw evidence that attackers had exploited the other weaknesses to inject one or more malicious commands into the router mechanism that controls traffic flow. Those final 65,000 devices were grouped together in various ways and ultimately pointed to 17,599 unique IP addresses for attackers to bounce traffic around to mask their movements.

    “In particular it’s annoying to build these attacks against hundreds of personal routers, and testing these attacks is hard too,”

    Notably, the Akamai researchers saw evidence that UPnP proxying isn’t just being used for malicious activity. It also seems to be part of efforts to skirt censorship schemes in countries like China to gain unfettered web access.

    Users won’t realize if their devices are being exploited for UPnP proxy attacks, and there is little they can do to defend themselves if they have a vulnerable device besides getting a new one. Some devices will allow users to disable UPnP, but that can lead to functionality issues.

    Akamai found 73 brands and almost 400 IoT models that are vulnerable in some way.

    Internet of Threats
    Internet of Things security is still not enough of a priority-A big part of the problem is that every device is a black box, we don’t know what code these things are running and it’s all proprietary (aka unvetted)

    Reply
  2. Tomi Engdahl says:

    Benchmarking Bluetooth Mesh, Thread, and Zigbee Network Performance
    https://www.silabs.com/products/wireless/learning-center/mesh-performance

    Bluetooth mesh , Thread, and Zigbee are popular mesh networking standards used to add wireless connectivity to building and home automation products. Silicon Labs conducted mesh network performance testing to help developers better understand difficult-to-predict wireless behavior and make more informed choices when designing products for the IoT.

    Reply
  3. Tomi Engdahl says:

    Dotdot is the universal language of the Internet of Things, making it possible for smart objects to work together on Zigbee, IP, and other networks.
    http://www.zigbee.org/zigbee-for-developers/dotdot/

    Why Dotdot

    In the Internet of Things, every smart device must understand and speak the same language at the application layer. How else is a smart hub expected to know how to communicate and control an off-the-shelf door lock or thermostat? Without a common application layer, devices from different networks (Wi-Fi, Thread, Bluetooth, Zigbee) can’t communicate.

    Dotdot is an open standard that can run over many networks allowing smart objects to communicate. Dotdot is based on the mature, proven solutions of the Zigbee Alliance. It is the product of 10+ years of work and experience from hundreds of innovative Zigbee Alliance member companies from across the industry and around the world.

    Reply
  4. Tomi Engdahl says:

    Social Networking Robot Actually Respects Privacy
    https://hackaday.com/2018/04/09/social-networking-robot-actually-respects-privacy/

    [Fribo] the robot is a research project in the form of an adorable unit that hears and speaks, but doesn’t move. Moving isn’t necessary for it to do its job, which is helping people who live alone feel more connected with their friends. What’s more interesting (and we daresay, unusual) is that it does this in a way that respects and maintains individuals’ feelings of privacy. To be a sort of “social connector and trigger” between friends where every interaction is optional and opt-in was the design intent behind [Fribo].

    Fribo: A Robot for People Who Live Alone
    https://spectrum.ieee.org/automaton/robotics/home-robots/fribo-a-robot-for-people-who-live-alone

    This little robot listens to what goes on in your life and helps to keep you connected with your friends

    Reply
  5. Tomi Engdahl says:

    Are There Too Many Short-Range Wireless Standards?
    Regardless of whether you agree or disagree, you’re certainly not lacking for choices.
    http://www.mwrf.com/community/are-there-too-many-short-range-wireless-standards?NL=MWRF-001&Issue=MWRF-001_20180410_MWRF-001_860&sfvc4enews=42&cl=article_1_b&utm_rid=CPG05000002750211&utm_campaign=16493&utm_medium=email&elq2=9a74588541294da0887674fa505f87ca

    Anyway, we have the IoT movement to thank (or curse) for this abundance of choices. For your enlightenment, I have compiled a comprehensive list that will at least give you the awareness you need to stimulate your design selection.

    ANT+
    Bluetooth (Multiple versions 4.0/4.1/4/2/5.0/LE)
    C-V2X (Vehicle communications standard)
    EC-GPRS
    EnOcean
    HaLow (Wi-Fi version 802.11ah)
    Ingenu
    ISA 100.11a
    LoRaWAN
    LTE MTC Cat 0 (cellular)
    LTE eMTC Cat M (cellular)
    MiWi
    NB-IoT
    Near Field Communications (NFC)
    Positive Train Control
    Sigfox
    Telensa
    Thread
    WAVE (Wi-Fi version 802.11p or DSRC for vehicle communications)
    Weightless (Multiple versions N, P, W)
    White Space (Wi-Fi version 802.11af)
    Wi-SUN
    Wi-Fi (Multiple versions 802.11a/b/g/n/ac/ax)
    WiGig (802.11ad)
    WiMAX
    WirelessHART
    ZigBee
    Z-Wave

    Impressive, huh? And I have probably forgotten some. Just remember the whole idea here is that you become aware of your options.

    Anyway, if you are trying to decide, here are a dozen key questions to ask as you do your design comparisons and due diligence.

    What is the maximum range of a link?
    What is the maximum data rate used in the application?
    Is power consumption an issue?
    What is the frequency band of operation?
    How many nodes are to be used? Is a large network needed?
    What other wireless services/devices are nearby that could cause interference?
    Are licensing and certification required to use the standard?
    Are chips and/or modules available from multiple vendors?
    Are related connections such as cellular services needed?
    Are reference designs, development kits, and other design support available?
    Is your application unique? Maybe you do need to create your own standard with RF in one of the ISM bands with a protocol optimized for your use cases.
    How big a factor is cost to develop, deploy, and maintain?

    Reply
  6. Tomi Engdahl says:

    What can the IIoT do?
    https://www.controleng.com/single-article/what-can-the-iiot-do/3d930bbed329958cffa16a141235bf9c.html?OCVALIDATE&[email protected]&ocid=101781

    The Industrial Internet of Things (IIoT) enhances manufacturing operations by enhancing connectivity, equipment management, monitoring production, and customer relationships. Nine additional IIoT benefits are highlighted.

    Beyond smart devices, and collecting and sharing data, most people haven’t heard what the IIoT can do. Nine additional IIoT benefits are highlighted below.

    1. Monitor production
    2. Manage equipment remotely
    3. Equipment maintenance
    4. Item identification and communication
    5. Continuous improvement with data analysis
    6. Autonomous material handling
    7. Improved communication with suppliers
    8. Improved customer relationships
    9. Enhanced management decisions

    Reply
  7. Tomi Engdahl says:

    Have Wearables Found Their True Killer App?
    https://www.eetimes.com/author.asp?section_id=36&doc_id=1333171

    So far, wearable technology has consisted almost exclusively of fitness trackers and smart watches. There’s cooler stuff coming, right?

    Putting future development in the context of the fourth industrial revolution, he said the next generation beyond smartphones will involve a convergence of hardware focused nanotech and biotech, with software-based infotech and cognotech (see slide below).

    Describing the SHAs, Wood said that these devices will observe what we are doing by listening to us and what we are listening to, seeing us and what we’re seeing, and feeling what we’re feeling more accurately than our own senses. These will utilize speech and sound recognition, computer vision, information from sensors embedded in the environment, communications within IoT systems, contextual knowledge and computer general common sense.

    The big thing though is power consumption, according to Bennett. “There is a bunch of technology that consumes battery, so until you get that right, you won’t get newer form factors. And with AI, you will need processor farms to address that requirement,” he said.

    Healthcare, AI and power management were also major themes at last month’s Wearable Technology Show. Oticon, the hearing aid provider, highlighted how hearing aids are now powerful processors providing information on overall brain health and not just hearing.

    Finnish wearable tech company Oura Health’s Chief Scientific Officer Hannu Kinnunen also emphasized its power management design as being vital for its infrared PPG sensor (PPG stands for photoplethysmography, a simple optical technique used to detect volumetric changes in blood in peripheral circulation, a technique providing valuable information related to the cardiovascular system).

    The company was due to start shipping its most recent version of its Oura Ring, which measures some of the physiological signals within a body (such as ECG-level resting heart rate (RHR), interbeat interval (IBI), heart rate variability (HRV), respiratory rate and breathing variance) and sleep tracking to inform lifestyle choice. The ring incorporates a dual-core Arm Cortex based microcontroller, with proprietary pulse waveform and pulse amplitude variation detection infrared PPG sensor, body temperature sensor, and 3D accelerometer and gyroscope.

    Adi Chhabra, a senior product manager for AI at Vodafone, also said the future of wearables is moving away from screen interactions to surface interactions. “Any screen or surface can be your interface, which can be voice-enabled, touch enabled, or gesture-enabled. Google Glass was the first generation, but it wasn’t the answer for wearables. However, it’s giving us a sense of where we will be in 15 years,” he said.

    Wearables were touted in the early days as smart watches and fitness trackers. But as the multiple use-cases evolve, some of the killer applications are becoming clearer. It’s currently trending towards health applications, not just in the fitness tracker sense, but in more sophisticated healthcare, as we have seen above.

    This is certainly backed up by recent market research. Juniper Research says that while the market is currently dominated by smartwatches and activity trackers, growth will slow, with around 190 million of these devices shipping by 2020. Its research argues that as device types broaden and purchase cycles lengthen, companies will begin to focus on software and data services to maintain their revenues, with the largest market for subscription services being healthcare.

    So how far can wearable tech and AI go in healthcare? Quite far, actually. A paper published last month in Scientific Reports shows how biological age can be extracted from biomedical data via deep learning.

    Reply
  8. Tomi Engdahl says:

    The internet of beds is already available at Meilahti – this is how the hospital uses wireless positioning

    With one building, 15 floors and work to treat sick people, critical care tools should be kept in hand. For this reason, the medical facilities at the Meilahti Tower Hospital in Helsinki and Uudenmaan sairaanhoitopiiri are being watched. For example infusion equipment, Defibrillators, oxygen bottles, brain circulation measuring equipment and patient beds are equipped with small position transmitters.

    Each transmitter has its own id code and is connected to a real-time and automated indoor positioning system. It is based on the hospital’s wireless telecommunications network, optimized for positioning. The accuracy of the system provided by Elisa depends on the application range from a few feet to a few meters.

    Carita Mattsson, Product Manager at the Indoor Positioning System, takes care that HUS understands the possibilities of the system and people are able to use it.

    “There are about one thousand of the medical devices, aids and other equipment in the tower hospital. One third is patient beds. ”

    HUS units can utilize spatial information for example in inventory, internal billing, and service interval definition.

    Alarms may also be combined with asterisks: if there is not enough wheelchairs in the lobby, an e-mail or SMS message will be sent.

    “The challenge of information management in the use of the system is related to its utilization. Since users are the best interpreters and data analysts in their own processes, the best thing would be if every building would always have a dedicated data analyst who knows their own specialty and unit performance well. ”

    Source: https://www.tivi.fi/Kaikki_uutiset/sankyjen-internet-loytyy-jo-meilahdesta-nain-sairaala-kayttaa-langatonta-paikannusta-6719596

    Reply
  9. Tomi Engdahl says:

    The Internet of Broken Things?

    Even 64 percent of businesses have somehow accessed the Internet of Things. Over the next year, the share will increase by 20 percentage points to over 80%. Still, it is about technology that is highly questionable at security level, says Ian Kilpatrick, Senior Vice President of Information Security at Nuvias Group.

    When dozens, hundreds or even thousands of unprotected dots are attached to a business network, cyber criminals cheat. Still, many companies turn their backs on the problem, putting their heads in a bush.

    Kilpatrick points out that any IP device with a IP address is a potential door to hackers and cyber criminals. Many of the IoTs are not intended to be protected or upgraded after commissioning. This means that no later vulnerabilities can be repaired later.

    Business IT organizations are more used to protect PCs than IoT nodes. They are not expected to become experts in intelligent lighting, heating and air conditioning systems, not to mention the CCTV systems.

    Many organizations use IoT technology without a security strategy or even risk profiling. This is done even though the number of DDoS service attacks is increasing all the time. An unprotected IoT device is often easy to harness these attacks.

    The PInnign Down the IoT report on the security of Finnish F-Secure IoT devices said that IoTs typically use a manufacturer’s default password

    Source: http://etn.fi/index.php?option=com_content&view=article&id=7837&via=n&datum=2018-04-11_15:06:02&mottagare=30929

    Reply
  10. Tomi Engdahl says:

    Friday Hack Chat: Talking MQTT With The Community
    https://hackaday.com/2018/04/11/friday-hack-chat-talking-mqtt-with-the-community/

    The Internet of Things is just around the corner, and somehow or another, all these bits of intelligent dust and juice bag squeezers will have to talk to one another. One of the better ways to get IoT bits talking to each other is MQTT, Message Queuing Telemetry Transport, a protocol designed for small code footprints and limited network bandwidth. It gets a lot of IoT hype, but it’s a great alternative to HTTP for your own small projects

    MQTT is based on a very simple publish and subscribe model with ‘topics’ that allow you to configure where messages should be sent. It is an extremely simple protocol, but with MQTT, you can set up a complete home automation system that opens the garage door, turns on a lamp, or pings a few weather sensors.

    https://hackaday.com/2016/05/09/minimal-mqtt-building-a-broker/

    Comments:

    Alternative protocols include the Advanced Message Queuing Protocol (AMQP), Streaming Text Oriented Messaging Protocol (STOMP), the IETF Constrained Application Protocol, XMPP, DDS,OPC UA, and Web Application Messaging Protocol (WAMP).

    XMPP is a frickin’ overcomplicated mess! MQTT is simple and efficient and can be used on MCUs with very limited resources, making it great for remote sensors and stuff,

    Reply
  11. Tomi Engdahl says:

    Intelligent sensors provide unlimited opportunities to create unique solutions in the IoT and Industrial IoT markets. But, the average selling price of individual sensors is below $1.

    Reply
  12. Tomi Engdahl says:

    Isn’t It about Time the Internet of Things Lived up to Its Promise?
    https://www.electropages.com/2018/04/isnt-it-about-time-the-internet-of-things-lived-up-to-its-promise/?utm_campaign=&utm_source=newsletter&utm_medium=email&utm_term=article&utm_content=Isn%27t+It+about+Time+the+Internet+of+Things+Lived+up+to+Its+Promise%3F

    Too often we’re told that the Internet of Things will revolutionise everything. IoT devices have been widely available for half a decade now, yet there is no sign of them breaking through and fulfilling their promise. Sporadic use across smart homes, new smart offices, healthcare applications and more does not look like a brave new era for technology.

    So when is the Internet of Things going to get its act together?

    Increasingly, Internet of Things devices are being used across industry, science research, healthcare, and even retail, and government. They’re usually a world away from domestic IoT devices, but ultimately, the purpose is the same: inter-connectivity and the exchange of data. Collected from user interaction, sensors, actuators and other components, by 2020 it is estimated that data will be amassed from 30 billion objects. That’s a massive amount of data on a daily basis.

    If you’ve ever worn a fitness tracker, the information collected from this will be stored online; you’ve probably analyzed it. Similarly, connected devices in a smart office (printers, automated door security, etc.) will have a trail of data that they collect. Much of this might prove quite dry to the untrained eye, but it’s archived, nonetheless.

    Reply
  13. Tomi Engdahl says:

    Mocana Launches Supply Chain Integrity Platform to Secure IoT, ICS Devices
    https://www.securityweek.com/mocana-launches-supply-chain-integrity-platform-secure-iot-ics-devices

    Mocana TrustCenter Manages Security Across IoT and ICS Device Lifecycles

    Securing the supply chain, and securing industrial IoT devices and industrial control systems (ICS) are two of security’s biggest challenges today — but securing the supply chain of industrial IoT is particularly challenging.

    Manufacturers are beginning to add security capabilities to the devices. Mocana’s security software sits on around 100 million devices, and the company’s customers include manufacturers such as Siemens, GE, Bosch and Panasonic. “Companies have begun to add security to IoT at the network level, and many have Mocana security onboard,” Mocana’s VP of marketing, Keao Caindec, told SecurityWeek; “but what is still missing is really a focus on protecting the supply chain.”

    Mocana Logo

    A primary problem is a lack of essential security on the devices. Manufacturers still cut corners to keep costs down and speed of delivery up; while users tend to spend their security budget on threat detection and firewalls surrounding the devices rather than ensuring that the device has its own security. Mocana’s device security can add security capabilities to the device. Now, with the launch of a new TrustCenter platform, it can also ensure that firmware updates and patches are genuine and not compromised by man-in-the-middle attacks.

    Reply
  14. Tomi Engdahl says:

    The Week in Review: IoT
    Startup funding; Carbon Black IPO; cybersecurity doctrine.
    https://semiengineering.com/the-week-in-review-iot-93/

    Nike bought Invertex, a computer vision startup based in Tel Aviv, Israel. Financial terms weren’t revealed. The activewear company will use Invertex’s technology to increase its capabilities in artificial intelligence and computer vision.

    The U.S. doesn’t have a national cybersecurity doctrine, more than a year after President Donald Trump took office. Tom Kellermann, chief cybersecurity officer of Carbon Black, is concerned that Russia will retaliate with cyberattacks in response to the Trump administration’s most recent sanctions.

    Qualcomm introduced the QCS603 and QCS605 system-on-a-chip devices for IoT applications, such as smart security cameras, smart displays, robotics, sports cameras, wearable cameras, and virtual reality. Both SoCs pair a multicore Arm processor with an artificial intelligence engine and an image signal processor.

    Mocana rolled out the Mocana TrustCenter services platform for managing security in IoT devices and industrial control systems. The new offering is meant for manufacturers and operators of IoT devices and industrial equipment; it complements the company’s TrustPoint IoT endpoint security software.

    Telit Communications reports its LE866A1-NA LTE Category 1 and ME866A1-NA LTE-M modules are certified to operate on AT&T’s nationwide LTE network for data-only applications.

    Siemens Healthineers is using SAS Institute’s IoT and machine learning capabilities to analyze data from its medical equipment installed around the world, such as magnetic resonance imaging and computerized tomography systems. SAS says it is also helping Lockheed Martin, Octo Telematics, and Western Digital for IoT analytics of data from their connected devices.

    Cloudflare Spectrum was unveiled by Cloudflare to protect and accelerate email services, gaming servers, IoT devices, and any Internet-connected product from distributed denial-of-service attacks. Spectrum, now available to enterprise customers, is said to work with any Internet protocol.

    Reply
  15. Tomi Engdahl says:

    A long-foreseen IoT crisis is here — and many devices aren’t ready: Wired
    http://www.cablinginstall.com/articles/pt/2018/04/a-long-foreseen-iot-crisis-is-here-and-many-devices-aren-t-ready-wired.html?cmpid=enl_cim_cim_data_center_newsletter_2018-04-16&pwhid=6b9badc08db25d04d04ee00b499089ffc280910702f8ef99951bdbdad3175f54dcae8b7ad9fa2c1f5697ffa19d05535df56b8dc1e6f75b7b6f6f8c7461ce0b24&eid=289644432&bid=2068760

    As noted in new reporting by Wired’s Lily Hay Newman, “Some network communication protocol vulnerabilities have been known for more than a decade and still aren’t fixed. Now they’re being exploited.”

    You know by now that Internet of Things devices like your router are often vulnerable to attack, the industry-wide lack of investment in security leaving the door open to a host of abuses. Worse still, known weaknesses and flaws can hang around for years after their initial discovery. Even decades. And Monday, the content and web services firm Akamai published new findings that it has observed attackers actively exploiting a flaw in devices like routers and video game consoles that was originally exposed in 2006. Over the last decade, reports have increasingly detailed the flaws and vulnerabilities that can plague insecure implementations of a set of networking protocols called Universal Plug and Play (UPnP).

    A Long-Awaited IoT Crisis Is Here, and Many Devices Aren’t Ready
    https://www.wired.com/story/upnp-router-game-console-vulnerabilities-exploited/

    Over the last decade, reports have increasingly detailed the flaws and vulnerabilities that can plague insecure implementations of a set of networking protocols called Universal Plug and Play.

    Reply
  16. Tomi Engdahl says:

    Hacked Aquarium Controller Used In Casino Cyber Attack!
    https://reefbuilders.com/2017/08/07/aquarium-controller-used-to-hack-casino/

    An internet connected aquarium controller has just been confirmed as the gateway into the secure network of a casino, and it was used to steal up to 10 gigabytes of data! We knew this day would inevitably come, and it’s actually a surprise that it’s taken this long to happen.

    The internet of things (IOT) has been seeping into our daily lives as well as the aquarium hobby since the beginning, and it’s pretty common to hear about some of these devices used as bots to perform DDOS attacks. But a recent cyber-attack on a casino used an aquarium controller as a portal to funnel data out of a private network, the damage it caused has not been reported but it can’t be good.

    Darktrace co-founder Dave Palmer was quoted as saying:

    “We’ve seen insiders sneak data out of heavily-protected organizations by attacking digitally-connected fish tanks. Completely blew my mind. Who would plug their fish tank into the internet? Well it turns out lots of people do.”

    It turns out that our highly capable and internet connected fish tank controllers can be a gateway for much more surreptitious cyber activities.

    Apparently this is not even the first time a ‘smart fish tank’ has been used in cyber crimes! The report goes on to mention that the controller was equipped “with advanced sensors that automatically regulate temperature, salinity, and feeding schedules“. The device in question was not named but we do know the casino is in North America.

    The three main companies with internet connected aquarium controllers in the North American market are the Digital Aquatics ReefKeeper, GHL Profilux, and by far the most common in the U.S. is the Apex by Neptune Systems.

    Reply
  17. Tomi Engdahl says:

    SuperIoT Alliance: Lack of NB-IoT modules

    The lack of new NB-IoT modules limits the introduction of IoT solutions in Finland, was reported last week at the SuperIoT Alliance seminar in Oulu. “Fortunately, the situation is getting easier,” said Tuomas Kolkka, DNA . Still, the pricing of IoT services confuses developers.

    NB-IoT radiomodules were not enough for the smaller Finnish markets. One of the slowing factors has been, among other things, China’s strong investments in NB-IoT technology. A good example is the 1.2 million cow tracking pilot in China. However, telecom operators are still waiting for NB-IoT devices to be added more this year.

    The main event of the Hilla program seminar in Oulu was the status of the operators. According to the three largest players are investing in network technology and coverage in Finland for half a billion in euros per year annually.

    all the major operators have adopted their NB-IoT network. LTE-M technology is also presently in the finishing stage by operators at the event.

    Source: https://www.uusiteknologia.fi/2018/04/17/seminaaritieto-nb-iot-moduuleista-pulaa/

    Reply
  18. Tomi Engdahl says:

    Security Model Targets Industrial IoT
    https://www.eetimes.com/document.asp?doc_id=1333164

    The Industrial Internet Consortium (IIC) rolled out its next step in an effort to deliver guidelines for securing the IoT in business settings. A new white paper lays out a process for companies to define and deliver levels of security appropriate for their situations.

    The so-called security maturity model follows a security framework that the IIC rolled out in late 2016. The trade group, formed in 2014, will now turn its focus to delivering a document on best practices and a set of industry profiles.

    http://www.iiconsortium.org/pdf/SMM_Description_and_Intended_Use_2018-04-09.pdf

    Reply
  19. Tomi Engdahl says:

    NB-IoT

    It covers a wide area even in difficult conditions where ordinary cellular networks do not work
    Low equipment costs
    Low power consumption (battery life of 10+ years)
    Easy scalable technology that enables multiple IoT devices to be connected to ordinary cellular networks
    Does not support Voice over LTE technology or full mobility
    Suitable for stationary sensors with a battery life of several years

    LTE M

    Cover the wider area of ​​traditional cellular networks
    Low equipment costs
    Lower power consumption than conventional mobile networks (battery life 5-10 years)
    Supports Voice over LTE technology and full mobility
    Ideal for applications that require mobility and lower power consumption than traditional cellular networks

    Source: https://www.uusiteknologia.fi/2018/04/13/suomalainen-nb-iot-ja-lte-m-alusta/

    Reply
  20. Tomi Engdahl says:

    Frederic Lardinois / TechCrunch:
    Twilio makes its SIM-based Programmable Wireless service for IoT developers generally available

    Twilio’s wireless platform hits general availability
    https://techcrunch.com/2018/04/17/twilios-wireless-platform-hits-general-availability/

    For a communications platform like Twilio, getting into wireless always seemed like a logical next move and a year ago, the company did just that with the beta launch of its SIM-based Programmable Wireless service for IoT. Now, a year later, the company is taking this service out of beta and making it generally available.

    With this product, Twilio hopes to become the de facto standard for IoT developers — just like it did for developers who want to add text messaging, notifications and calls to their services.

    Reply
  21. Tomi Engdahl says:

    Aaron Tilley / The Information:
    Sources: Intel to shut down its New Devices Group, which was formed in 2013 and made fitness trackers and smart glasses — Intel’s long-failing foray into wearables and augmented reality is officially dead. — The chip giant’s new devices group will shut down, according to people familiar with the situation.

    Intel Plans to Shut Down Smart Glasses Group
    https://www.theinformation.com/articles/intel-plans-to-shut-down-smart-glasses-group

    Reply
  22. Tomi Engdahl says:

    PR Newswire:
    RapidSOS, whose platform links IoT devices to first responders, raises $16M in round with participation from Microsoft Ventures, total raised now $30M+
    https://www.prnewswire.com/news-releases/rapidsos-raises-16m-to-provide-life-saving-data-to-first-responders-300631998.html

    Reply
  23. Tomi Engdahl says:

    IoT: A View from the Trenches
    https://www.eetimes.com/author.asp?section_id=36&doc_id=1333189

    A conversation with a manager building an Internet of Things business unit inside a traditional embedded system supplier gives a view of IoT from the trenches.

    “I’m wearing jeans here in a test lab for an automated warehouse, helping make boxes and running wiring harnesses for smart cameras,” said Rob Risany, introducing himself. He joined ADLink Technology last July from IBM’s Watson group to help the board and gateway vendor create a new IoT group.

    The Taiwan-based company helped automate more than a dozen factories last year and has several smart city projects in Asia. Deployments are often trying to add a data-based service to a customer’s existing hardware products or squeeze costs out of a process.

    ADLink’s traditional business hums along, selling single-board computers and rugged PCs made to fit the technical requirements of customers. But IoT is a different kind of gig.

    “It’s not driven by product engineers writing specs but by definitions of business problems … people won’t invest in technology for technology’s sake, but on the other hand, it seems like all CTOs need to have digital experiment in IoT running by end of year or they will be gone,” said Risany.

    One of the biggest pain points is “connecting the unconnected.” Linking industrial assets such as diesel engines to a cloud service for remote monitoring can be “difficult and awkward because protocols are often obfuscated by vendors so they can maintain control of assets.”

    Reply
  24. Tomi Engdahl says:

    Microsoft, MediaTek Team on IoT SoC
    https://www.eetimes.com/document.asp?doc_id=1333194

    MediaTek is working with Microsoft to deliver this year the first Azure Sphere chip, the MT3620 that the partners expect to drive IoT innovation with built-in security and connectivity.

    Azure Sphere is designed for highly secured, connected MCU-powered devices at a price that the companies expect will make enterprise-class security affordable for an array of cloud-connected gadgets.

    MediaTek and Microsoft have worked together to develop a specialized chipset with a Wi-Fi connected controller built around a processor designed to run Azure Sphere’s IoT operating system that includes support for Microsoft’s latest security protocols. The chipsets will be sold as part of the Azure Sphere solution, enabling customers to connect their MCU-powered products and devices with protection and security provided by Microsoft.

    MT3620
    Microsoft Azure Sphere Secure IoT Platform with vast I/O peripheral subsystem for diverse IoT applications
    https://www.mediatek.com/products/azureSphere/mt3620

    Reply
  25. Tomi Engdahl says:

    Abner Li / 9to5Google:
    Nest says it will donate 1M smart thermostats to low- and moderate-income Americans over the next five years, as part of its new Power Project initiative

    Nest ‘Power Project’ donating one million thermostats to help U.S. families save energy
    https://9to5google.com/2018/04/19/nest-power-project-million-thermostats/

    The smart home is often touted as delivering conveniences like automation and remote control. One often overlooked aspect of installing a smart thermostat is power savings, with Nest launching a new Power Project initiative to help low-income Americans with their electric bills.

    Ahead of Earth Day this weekend, Nest is announcing an ambitious project to donate one million smart thermostats over the next five years. The soon-to-be Google division highlights how there are vast discrepancies in energy bill costs across American households.

    We know the burden of energy costs in America is disproportionately high for those least able to afford it. Families are spending more than 20% of their income on home energy bills – sometimes as much as 50%. And this impacts 22 million children. We’re committed to addressing this issue that affects so many through the Power Project. Because we believe everyone deserves warmth in the winter and lights in the dark.

    Reply
  26. Tomi Engdahl says:

    Sarah Perez / TechCrunch:
    Amazon introduces Alexa Blueprints that let anyone create custom Alexa skills and responses without coding

    Amazon’s new ‘Alexa Blueprints’ let anyone create custom Alexa skills and responses
    https://techcrunch.com/2018/04/19/amazons-new-alexa-blueprints-let-anyone-create-custom-alexa-skills-and-responses/

    Amazon this morning is introducing “Alexa Blueprints,” a new way for any Alexa owner to create their own customized Alexa skills or responses, without needing to know how to code. The idea is to allow Alexa owners to create their own voice apps, like a trivia game or bedtime stories, or teach Alexa to respond to questions with answers they design – like “Who’s the best mom in the world?,” for example.

    You could also create a skill that includes helpful information for the babysitter, which could be triggered by the command, “Alexa, open My Sitter,” Amazon suggests.

    “Alexa Skill Blueprints is an entirely new way for you to teach Alexa personalized skills just for you and your family,”

    To build your own skill or custom Alexa response, users will visit the website blueprints.amazon.com and select a template.

    At launch, there are over 20 templates across categories like Fun & Games, At Home, Storyteller, and Learning & Knowledge.

    Reply
  27. Tomi Engdahl says:

    The smart home: Part data mine, part minefield
    http://www.broadbandtechreport.com/articles/2018/04/the-smart-home-part-data-mine-part-minefield.html?cmpid=enl_btr_weekly_2018-04-19&pwhid=6b9badc08db25d04d04ee00b499089ffc280910702f8ef99951bdbdad3175f54dcae8b7ad9fa2c1f5697ffa19d05535df56b8dc1e6f75b7b6f6f8c7461ce0b24

    According to ABI Research, smart home devices and systems promise to deliver a new world of detailed consumer data and insight. Retailers, advertisers and service providers are keen to leverage their insights from their smart home customers to improve existing offerings and bring in new revenue streams. However, consumer sensitivity about the collection and use of their personal data could be a concern.

    “The smart home is the battleground for a range of players across multiple industries looking to secure a valuable grip on understanding the end-user through a growing pool of smart home data,” said Jonathan Collins, research director at ABI. “Smart home data offers a wealth of insights able to be used to improve existing offerings, help develop new offerings, and underpin a range of services for smart home players and their partners.”

    In their own efforts to capture smart home data, the fourth quarter last year saw Amazon and Google deeply discount their Echo and Home voice-control devices with pricing on some devices close to the cost of the components within them.

    Consumer sensitivity regarding personal data collection may yet change, especially given the revelations regarding the collection and use of Facebook data.

    “The ongoing exchange of data between home and device/system provider is at the heart of the modern smart home. Understanding how that data can and will be used will likewise remain at the heart of the impetus behind smart home investment,” said Collins.

    Reply
  28. Tomi Engdahl says:

    How to transition from traditional to digital plant-floor technologies
    https://www.controleng.com/single-article/how-to-transition-from-traditional-to-digital-plant-floor-technologies/8fbc73bfa6157fd1b294a1823ef4199e.html?OCVALIDATE&[email protected]&ocid=101781

    Improving plant efficiencies starts with bridging the gap between workforce generations. Generation X can help connect traditional industrial applications with digital manufacturing. See three benefits of mobility on the plant floor and implementation advice.

    By leveraging Generation X’s interpersonal skills, the understanding of processes before and after technological advancements, and the patience acquired during times of transition, manufacturers can use Gen Xers to facilitate mentoring programs between older and younger workers to keep everyone engaged with new technologies—mobile industrial technologies specifically.

    The narrative of differences should change to focus on Gen X and the connections they can build. Gen X wasn’t born with technology; technology grew with Gen X.

    Three benefits of going mobile

    Going mobile offers many potential advantages such as increased safety, convenience, productivity, and efficiency. While the individual benefits vary depending on the application and the client’s needs, see three common benefits below.

    1. Plant-floor mobility saves time.

    Most industrial controls systems rely on operator interface screens to monitor and control a system or process. Typically, these interfaces run on a PC or industrial computer installed in a fixed location such as inside a control room or mounted to the front of an industrial enclosure. Having to monitor and control the system from a fixed location can have an adverse impact on productivity and troubleshooting.

    The addition of a mobile tablet allowed operators to monitor and control the system from anywhere in the production area eliminating safety concerns and the time wasted walking back and forth to check screens.

    2. Remote monitoring and notifications decrease travel.

    With remote access, managers can receive alarm notifications and real-time status updates on their mobile devices, which assists with troubleshooting, reduced downtime, and help eliminate travel time. For example, remote monitoring and notifications were set up for an original equipment manufacturer (OEM) client that produces and maintains machines throughout the United States.

    3. Data collection and sharing identify bottlenecks.

    Going mobile also permits data from the plant floor to be collected, analyzed, and merged with data from the business side. Machine data previously invisible or not tracked can now be seen in real-time and increase efficiency.

    For example, a cloud-based mobile data collection system was designed for an industrial manufacturer.

    Implementing a mobile system

    A common misconception is the customer will have to perform a major or expensive upgrade of existing equipment to go mobile. However, this is often not the case. When it comes to older equipment and non-Ethernet protocols such as serial, Profibus and DeviceNet, a variety of communications gateways can be added to enable mobile communications without having to upgrade existing equipment. While it is often a good idea to upgrade legacy equipment, a pre-configured mobile interface can be added to many legacy systems without having to perform expensive upgrades if cost is a prohibiting factor.

    Strong security involves a layered approach and begins with the basic network architecture. One common misconception related to the network architecture is that to facilitate mobile access, the existing controls equipment should be placed on the business/enterprise network or given direct internet access.

    In most cases, this is not necessary and would also be inconsistent with best cybersecurity practices. Controls equipment such as programmable logic controllers (PLCs) and supervisory control and data acquisition (SCADA) computers often exist on a private network and, in most cases, should remain on a private network.

    Gen X has the skills needed to build that bridge between the divide between the baby boom and millennial generations.

    Reply
  29. Tomi Engdahl says:

    LPWA (Low Power Wide Area) Will Be the Key to Efficient, Affordable and Globally Available IoT
    https://blog.paessler.com/lpwa-low-power-wide-area-can-be-the-key-to-efficient-affordable-and-globally-available-iot?utm_source=facebook&utm_medium=cpc&utm_campaign=Burda-Blog-Global&utm_content=lpwa

    In the age of the Internet of Things (IoT), everything that can be networked and monitored in a meaningful way is connected to each other. The basis for all this is usually the mobile network. Although they provide good coverage, WLAN, Bluetooth and the like are not suitable for sporadically sending a small amount of data over many miles. LPWA is the remedy. In this article, we explain exactly what LPWA is and why this technology is celebrated as a core enabler of IoT.

    Reply
  30. Tomi Engdahl says:

    Android Things Release Candidate
    https://android-developers.googleblog.com/2018/04/android-things-release-candidate.html?m=1

    Production-focused console enhancements

    With an eye towards building and shipping production devices with the upcoming LTS release, we have made several updates to the Android Things developer console:

    Enhanced OTA: Unpublish the current OTA build when issues are discovered in the field.
    Visual storage layout: Configure the device storage allocated to apps and data for each build, and get an overview of how much storage your apps require.
    Font/locale controls: Configure the set of supported fonts and locales packaged into each build.
    Group sharing: Product sharing has been extended to include support for Google Groups.

    Permissions

    On mobile devices, apps request permissions at runtime and the end user grants them. In earlier previews, Android Things granted these same permissions automatically to apps on device boot. Beginning in DP8, these permissions are granted using a new interface in the developer console, giving developers more control of the permissions used by the apps on their device.

    App launch behavior

    Embedded devices need to launch their primary application automatically after the device boots, and relaunch it if the app terminates unexpectedly.

    Reply
  31. Tomi Engdahl says:

    Masha Borak / TechNode:
    Alibaba is developing its own neural network chip, the Ali-NPU, and has acquired Chinese IoT chip designer C-SKY Microsystems

    After launching its own chip, Alibaba buys Chinese AI chipmaker
    https://technode.com/2018/04/20/alibaba-ai-chipmaker-c-sky/

    Reply
  32. Tomi Engdahl says:

    Sean O’Kane / The Verge:
    A look at the different methods and technologies that Waymo and Tesla use to collect data from the billions of miles their self-driving vehicles have driven

    How Tesla and Waymo are tackling a major problem for self-driving cars: data
    https://www.theverge.com/transportation/2018/4/19/17204044/tesla-waymo-self-driving-car-data-simulation

    Autonomous cars won’t happen without tons of data, but Tesla and Waymo have a big head start

    Reply
  33. Tomi Engdahl says:

    Alibaba acquires Chinese microchip maker to boost its IoT business
    https://venturebeat.com/2018/04/20/alibaba-acquires-chinese-microchip-maker-to-boost-its-iot-business/

    (Reuters) — E-commerce titan Alibaba Group Holding has bought a Chinese microchip maker to further its cloud-based “internet of things” (IoT) business, underscoring its commitment to the chip industry, an Alibaba spokeswoman said on Friday.

    Reply
  34. Tomi Engdahl says:

    FDA Reveals New Plans for Medical Device Security
    https://www.securityweek.com/fda-reveals-new-plans-medical-device-security

    The U.S. Food and Drug Administration (FDA) this week announced its medical device safety action plan, which includes seeking additional funding and authorities that would help it improve cybersecurity in the healthcare industry.

    The FDA’s plan focuses on five key areas and medical device cybersecurity is one of them. As part of its efforts to keep up with emerging threats and vulnerabilities, the agency wants the authority to require medical device manufacturers to include updating and patching capabilities into the design of their products.

    The organization also wants vendors to create a “Software Bill of Materials,” which should help medical device customers and users determine which systems may be impacted by vulnerabilities.

    “The additional authorities we seek are to further strengthen medical device security by directly addressing challenges healthcare delivery organizations and providers have encountered as a result of cyber campaigns and attacks such as WannaCry,” an FDA spokesperson told SecurityWeek.

    The agency would require that “new devices entering the market have a demonstrated capability of patchability and updatability built into the design architecture of the device, and that a patch management process and plan is provided by the manufacturer for premarket review,” the spokesperson said.

    As for the Software Bill of Materials, the measure is inspired by one of the recommendations made recently by the Health Care Industry Cybersecurity Task Force.

    https://www.fda.gov/downloads/AboutFDA/CentersOffices/OfficeofMedicalProductsandTobacco/CDRH/CDRHReports/UCM604690.pdf

    Reply
  35. Tomi Engdahl says:

    The Week in Review: IoT
    Security focus; BeBop funding; Qualcomm-NXP.
    https://semiengineering.com/the-week-in-review-iot-94/

    Cybersecurity
    The U.S. and U.K. governments collaborated on an unprecedented message on Monday, together warning that Russian cyberattacks may extend beyond government and private organizations to individual homes and offices. The attacks may focus on Internet of Things devices, said Rob Joyce, the cybersecurity coordinator for the National Security Council

    Donald Trump named John Bolton as his third national security adviser. Bossert and Joyce were working on a national cybersecurity doctrine, which may finally be released this summer

    Microsoft this week unveiled Azure Sphere, a bundle of products and services meant to provide greater security for IoT devices. They include a microcontroller design with a custom Linux kernel, a Linux-based Azure Sphere operating system to help secure the microcontrollers, and the Azure Sphere Security Service.

    Thirty-four companies signed the Cybersecurity Tech Accord, agreeing to work together on cyberattack defense, refusing to help governments launch cyberattacks, empowering developers to work in the field, and taking collective action with a variety of parties. Companies participating include Arm, Cisco Systems, Facebook, Hewlett Packard Enterprise, Microsoft, Nokia, Oracle, and Trend Micro.

    Meanwhile, the Broadband Forum debuted its User Services Platform, a standard for implementing, deploying, and managing IoT devices in a broadband-enabled home network. USP builds on the established TR-069 protocol used by Internet service providers.

    Silicon Labs completed its acquisition of the Z-Wave business of Sigma Designs for $240 million in cash. The Austin, Texas-based buyer is taking on about 100 Z-Wave employees in the deal.

    The Arm SDK-700 System Design Kit was launched this week, providing help in system-on-a-chip device design for rich IoT nodes and gateways, using the company’s Platform Security Architecture. The SDK-700 is said to provide a secure SoC foundation for Microsoft’s Azure Sphere offering.

    Sundelin & Kouri Engineering introduced the Frostbite development board for working with IoT devices and embedded systems. The board is based upon Nordic Semiconductor’s nRF52840 SoC. It can be programmed with Nordic’s software development kit or the Snowflake IoT framework, supporting C++17 standards.

    Reply
  36. Tomi Engdahl says:

    Molex, TTTech announce collaboration to develop industrial IoT platforms
    http://www.cablinginstall.com/articles/2018/04/molex-tttech-iiot.html?cmpid=enl_cim_cim_data_center_newsletter_2018-04-23&pwhid=6b9badc08db25d04d04ee00b499089ffc280910702f8ef99951bdbdad3175f54dcae8b7ad9fa2c1f5697ffa19d05535df56b8dc1e6f75b7b6f6f8c7461ce0b24&eid=289644432&bid=2076803

    Molex and TTTech have announced a collaboration based on the companies’ shared vision of open, flexible and interoperable systems in the Industrial Internet of Things (IIoT). The first results of this collaboration will be demonstrated at Hannover Messe, April 23-27, 2018 in Hannover, Germany.

    Per a statement from the companies: “Today, the industrial automation market is experiencing a tectonic shift towards more openness and tighter integration. Existing inflexible infrastructures are struggling to keep up with the changing demands of this increasingly digitized business environment. Molex and TTTech have agreed to address these demands for greater interoperability, information transparency and connectivity by leveraging their combined OT (Operational Technology) and IT expertise. A demonstration that integrates innovative technologies such as OPC UA (Unified Architecture), TSN (Time Sensitive Networking) and edge/fog computing will be shown at the fair and serves as an indication of the two companies’ plans.”

    Reply
  37. Tomi Engdahl says:

    Alibaba Adds Embedded CPU Core Designer
    https://www.eetimes.com/document.asp?doc_id=1333203

    China’s internet behemoth, Alibaba Group, announced on Friday the acquisition of C-Sky Microsystems, a designer of China’s home-grown 32-bit embedded CPU processing core.

    Alibaba did not disclose terms of the acquisition.

    The move underscores a growing trend among companies, such as Google, Amazon, and Alibaba, who are eager to swallow up chip companies with a goal to design chips that fit their businesses.

    Reply
  38. Tomi Engdahl says:

    Inside Lab126 with Amazon’s Alexa
    Web giant gears up for the voice-interface wars
    https://www.eetimes.com/document.asp?doc_id=1333201

    In a rare move, Amazon escorted a dozen tech journalists into the secretive bowels of Lab126, its client hardware division here. Its aim was to tell the world that it’s ready to let anyone make any kind of Alexa device they can think of — and fast.

    The smart voice interface is arguably Amazon’s first hit in client devices. Its Kindle peaked early with the e-book category as a whole, and it largely struck out with its Fire tablets and smartphones.

    With a big lead over rivals, the promise of Alexa-powered devices is rising. But it’s still an emerging market that’s a long way from Amazon’s home-run vision — becoming the next interface of choice for client devices and end-user queries.

    Reply
  39. Tomi Engdahl says:

    What’s the Difference Between IEEE 802.11af and 802.11ah?
    http://www.mwrf.com/active-components/what-s-difference-between-ieee-80211af-and-80211ah?PK=UM_Classics04318&utm_rid=CPG05000002750211&utm_campaign=16812&utm_medium=email&elq2=0093aca469c24954849d8dcd169e22d0

    Although IEEE 802.11af and 802.11ah are both sub-1-GHz standards, they are designed to fill different niches in upcoming IoT and wireless-backhaul applications.

    Reply
  40. Tomi Engdahl says:

    Smart sensors tipped to transform UK horticultural sector
    https://www.electropages.com/2018/04/smart-sensors-tipped-to-transform-uk-horticultural-sector/?utm_campaign=&utm_source=newsletter&utm_medium=email&utm_term=article&utm_content=Smart+sensors+tipped+to+transform+UK+horticultural+sector

    As the UK agriculture and horticultural sector ponders its post-Brexit future – with the likely concomitant loss of Eastern European seasonal farm labour – the deployment of precision farming techniques and smart technologies to the UK industry that is now underway looks to be timely. And the mood of optimism in the farm sector is bolstered by a number of recent reports that point to the rapid growth of the smart sensor market over the next decade.

    ‘Market Insight Reports’ forecast a compound annual growth rate (CAGR) rise of 18.64% in the global smart sensors market, from $25.96 billion in 2017 to $72.39 billion by the end of 2023.

    Reply
  41. Tomi Engdahl says:

    Tech Tackles Health Care
    https://semiengineering.com/tech-tackles-digital-health-care/

    Academia, startups and technology giants are addressing health care through collaboration, creativity, and tremendous compute power.

    Can technology make humans healthier? If technology investments in this market are any indication, the answer is a firm “yes.”

    Massive growth in this market has been predicted for years. In fact, it was the initial driver behind many of the initial IoT devices, which fizzled largely because of insufficiently developed end applications and poor battery life of wearable devices. Much has changed since then, and it’s reflected in the most recent market projections.

    Worldwide, the health-care market will grow 4.82% this year to almost $2 trillion, Frost & Sullivan forecasts. Technology’s share in that market will increase. The research firm predicts the global market for health-care cloud computing will be worth nearly $10 billion by 2021 and by 2025, 10% of hospitals around the world will be “smart” facilities, investing more than $11 billion in cloud-based computing and data analytics.

    “Even though 2017 was a year full of spectacular advancements in health care, 2018 will be the year of digital health technologies such as artificial intelligence, Internet of Medical Things, big data analytics, and robotics,” said Kamaljit Behera, industry analyst at Frost & Sullivan, in a statement.

    Reply
  42. Tomi Engdahl says:

    Ry Crist / CNET:
    Inside Amazon’s Lab126 and the Alexa Voice Services team, which has helped manufacturers pack Alexa into more than a hundred consumer devices

    Behind the scenes at Alexa’s laboratory
    https://www.cnet.com/news/behind-the-scenes-at-amazon-alexa-laboratory-lab126/

    The Alexa Voice Service team at Amazon’s Lab126 is busy getting the next generation of Alexa gadgets ready for the real world. The wide majority of them won’t be made by Amazon.

    Reply
  43. Tomi Engdahl says:

    Data Modeling: The “How” of Data Management and Effective Analysis
    http://www.sealevel.com/community/blog/data-modeling-the-how-of-data-management-and-effective-analysis/

    Data modeling is the foundation of 21st century business and data-informed projects. As industry leaders embrace trends such as IoT and digital twins, this process is the key to managing information as a resource. However, this process is complex, which is why this blog will briefly explain the process and how it relates to decision making.

    Data modeling should not be confused with database building or data analytics. Data modeling tells what the business requires while a database and analysis give ideas of how to achieve goals. A database, built on the foundation of the data model, is a structured, visual graphic interface form of the defined data. Analysis is any number of tools used to see the patterns in the displayed data or deliver reports on performance.

    What does the data modeling process look like?

    There are three stages of data modeling. Depending on the purpose of the data modeling, a business team may only go to the logical model. However, most projects will go all the way to the physical data level.

    1. Conceptual data model – This is the first stage of modeling where requirements are outlined. In this stage, entities and subtypes of these entities within the data are defined. Their attributes are outlined, and the relationships between entities are identified. The rules that maintain the integrity of the model are determined as well. At this stage, there is no consideration of how the data is visualized or used.

    2. Logical data modeling – This is the second stage of modeling where the conceptual model is organized in a logical manner. These are descriptions of how the concepts outlined in the first stage are structured. For example, the logical model may say it is tabular data or describe it as object-oriented classes.

    3. Physical data modeling – The final layer, this stage specifies the actual fields created to be displayed in a database. It also details where the data is stored, in what form and to what extent or manner it can be queried.

    What is data modeling for?

    Data modeling is used by information systems. An information system is a process or program that uses information to create tasks that advance the project or company. An example of an information system is a Customer Relationship Management System (CRM). These systems advance marketing and sales efforts in tandem by tracking customer activities and product trends. A single enterprise may have many different information systems in use throughout it.

    Data modeling in action: Digital Twins

    Digital twins, a vital tool for industry, have blossomed in use in transportation, healthcare and military. They use physical data modeling in complex interfaces beyond spreadsheets. Their entities are beyond sensor points and include weather patterns, whole machines and other large items. The living document nature of data modeling and its flexible organization give digital twins its power.

    From a Sealevel blog on the subject: “A digital twin, according to the paper, is an exact digital model of the factory reproduced on a 1:1 scale, using real-time data to ensure that the digital twin (the model) is identical to the physical twin (the manufacturing facility) at all times.”

    Reply
  44. Tomi Engdahl says:

    A Chicken for Every Pot, A Network for Every IoT Application
    http://www.sealevel.com/community/blog/a-chicken-for-every-pot-a-network-for-every-iot-application/

    The internet has moved from sitting on our desk tops to watching over our warehouses, riding in our truck beds, and floating in our underwater farms. Every day, the worldwide IIoT adds new devices that deliver remote monitoring and automated actions via real time data collection and communication. Globally, 20 billion devices are on the Internet of Things, with some experts forecasting an increase to 30 billion connections by the end of 2018.

    However, one size telecommunication network cannot fit all. IIoT devices have a range of bandwidth needs and power requirements; moreover, they may be mobile or operating in degraded conditions. There is a best fit cellular or a wireless network solution.

    Cellular Networks for IIoT

    Wide Band

    Within wide band, the most common choice of network is LTE, which stands for “long term evolution.” It is 4G, or “fourth generation,” cellular technology. 5G technology is expected to release in 2018 and it will featured optimized bandwidth resulting in high data rate speeds. Two subtypes of 4G suit IIoT applications well: CAT1 and M1. They’re good for long-distance communication and reliability. They can also be more expensive.

    CAT1

    This subtype works best for applications that require continuous reporting everywhere, especially mobile. For example, personal mobile phones rely on this standard. Using this technology, a device will constantly attempt to send data, even searching for less busy bands, until the procedure is completed. This can put high pressure on a specific provider’s bands and draw more power, relative to other cellular tech. Thus, it can be expensive and require frequent charging or more durable battery storage.

    M1

    This channel is for devices that don’t need to continuously report. Instead, devices on this channel are pre-programmed to transmit data at specific times. These may be intervals of every 5 minutes or once a day during low-traffic periods. As a result, signals on this channel experience reduced competition, which mitigates device network searches. IIoT devices relying on M1 cellular tech do not consume as much power as their CAT1 peers.

    Narrow Band

    Although narrow band technology has been used preciously, such as for pagers, its repurposing is the newest IoT cellular offering. T-Mobile NarrowBand-IoT will be the first North American plan, starting June 2018.

    NB-IoT is a 4G technology that provides small, consistent data streams at low cost. It has the lowest power requirements of cellular technology. Unlike other cellular tech, devices on NB-IoT cannot be mobile; moreover, they cannot transmit voice data. Ideal applications for this standard are smart city sensors.

    Reply

Leave a Comment

Your email address will not be published. Required fields are marked *

*

*