Join IoT Central | Join our LinkedIn Group | Post on IoT Central


Devices (332)

A smart, highly optimized distributed neural network, based on Intel Edison "Receptive" Nodes

Training ‘complex multi-layer’ neural networks is referred to as deep-learning as these multi-layer neural architectures interpose many neural processing layers between the input data and the predicted output results – hence the use of the word deep in the deep-learning catchphrase.

While the training procedure of large scale network is computationally expensive, evaluating the resulting trained neural network is not, which explains why trained networks can be extremely valuable as they have the ability to very quickly perform complex, real-world pattern recognition tasks on a variety of low-power devices.

These trained networks can perform complex pattern recognition tasks for real-world applications ranging from real-time anomaly detection in Industrial IoT to energy performance optimization in complex industrial systems. The high-value, high accuracy recognition (sometimes better than human) trained models have the ability to be deployed nearly everywhere, which explains the recent resurgence in machine-learning, in particular in deep-learning neural networks.

These architectures can be efficiently implemented on Intel Edison modules to process information quickly and economically, especially in Industrial IoT application.

Our architectural model is based on a proprietary algorithm, called Hierarchical LSTM, able to capture and learn the internal dynamics of physical systems, simply observing the evolution of related time series.

To train efficiently the system, we implemented a greedy, layer based parameter optimization approach, so each device can train one layer at a time, and send the encoded feature to the upper level device, to learn higher levels of abstraction on signal dinamic.

Using Intel Edison as layers "core computing units", we can perform higher sampling rates and frequent retraining, near the system we are observing without the need of a complex cloud architecture, sending just a small amount of encoded data to the cloud.

Read more…

Originally Posted and Written by: Michelle Canaan, John Lucker, & Bram Spector

Connectivity is changing the way people engage with their cars, homes, and bodies—and insurers are looking to keep pace. Even at an early stage, IoT technology may reshape the way insurance companies assess, price, and limit risks, with a wide range of potential implications for the industry.

Insurers’ path to growth: Embrace the future

In 1997, Progressive Insurance pioneered the use of the Internet to purchase auto insurance online, in real time.1 In a conservative industry, Progressive’s innovative approach broke several long-established trade-offs, shaking up traditional distribution channels and empowering consumers with price transparency.

This experiment in distribution ended up transforming the industry as a whole. Online sales quickly forced insurers to evolve their customer segmentation capabilities and, eventually, to refine pricing. These modifications propelled growth by allowing insurers to serve previously uninsurable market segments. And as segmentation became table stakes for carriers, a new cottage industry of tools, such as online rate comparison capabilities, emerged to capture customer attention. Insurers fought to maintain their competitive edge through innovation, but widespread transparency in product pricing over time created greater price competition and ultimately led to product commoditization. The tools and techniques that put the insurer in the driver’s seat slowly tipped the balance of power to the customer.

This case study of insurance innovation and its unintended consequences may be a precursor to the next generation of digital connectivity in the industry. Today, the availability of unlimited new sources of data that can be exploited in real time is radically altering how consumers and businesses interact. And the suite of technologies known as the Internet of Things (IoT) is accelerating the experimentation of Progressive and other financial services companies. With the IoT’s exponential growth, the ways in which citizens engage with their cars, homes, and bodies are getting smarter each day, and they expect the businesses they patronize to keep up with this evolution. Insurance, an industry generally recognized for its conservatism, is no exception.

IoT technology may still be in its infancy, but its potential to reshape the way insurers assess, price, and limit risks is already quite promising. Nevertheless, since innovation inevitably generates unintended possibilities and consequences, insurers will need to examine strategies from all angles in the earliest planning stages.

To better understand potential IoT applications in insurance, the Deloitte Center for Financial Services (DCFS), in conjunction with Wikistrat, performed a crowdsourcing simulation to explore the technology’s implications for the future of the financial services industry. Researchers probed participants (13 doctorate holders, 24 cyber and tech experts, 20 finance experts, and 6 entrepreneurs) from 20 countries and asked them to imagine how IoT technology might be applied in a financial services context. The results (figure 1) are not an exhaustive compilation of scenarios already in play or forthcoming but, rather, an illustration of several examples of how these analysts believe the IoT may reshape the industry.2

ER_2824_Fig.1

CONNECTIVITY AND OPPORTUNITY

Even this small sample of possible IoT applications shows how increased connectivity can generate tremendous new opportunities for insurers, beyond personalizing premium rates. Indeed, if harnessed effectively, IoT technology could potentially boost the industry’s traditionally low organic growth rates by creating new types of coverage opportunities. It offers carriers a chance to break free from the product commoditization trend that has left many personal and commercial lines to compete primarily on price rather than coverage differentiation or customer service.

For example, an insurer might use IoT technology to directly augment profitability by transforming the income statement’s loss component. IoT-based data, carefully gathered and analyzed, might help insurers evolve from a defensive posture—spreading risk among policyholders and compensating them for losses—to an offensive posture: helping policyholders prevent losses and insurers avoid claims in the first place. And by avoiding claims, insurers could not only reap the rewards of increased profitability, but also reduce premiums and aim to improve customer retention rates. Several examples, both speculative and real-life, include:

  • Sensors embedded in commercial infrastructure can monitor safety breaches such as smoke, mold, or toxic fumes, allowing for adjustments to the environment to head off or at least mitigate a potentially hazardous event.
  • Wearable sensors could monitor employee movements in high-risk areas and transmit data to employers in real time to warn the wearer of potential danger as well as decrease fraud related to workplace accidents.
  • Smart home sensors could detect moisture in a wall from pipe leakage and alert a homeowner to the issue prior to the pipe bursting. This might save the insurer from a large claim and the homeowner from both considerable inconvenience and losing irreplaceable valuables. The same can be said for placing IoT sensors in business properties and commercial machinery, mitigating property damage and injuries to workers and customers, as well as business interruption losses.
  • Socks and shoes that can alert diabetics early on to potential foot ulcers, odd joint angles, excessive pressure, and how well blood is pumping through capillaries are now entering the market, helping to avoid costly medical and disability claims as well as potentially life-altering amputations.3

Beyond minimizing losses, IoT applications could also potentially help insurers resolve the dilemma with which many have long wrestled: how to improve the customer experience, and therefore loyalty and retention, while still satisfying the unrelenting market demand for lower pricing. Until now, insurers have generally struggled to cultivate strong client relationships, both personal and commercial, given the infrequency of interactions throughout the insurance life cycle from policy sale to renewal—and the fact that most of those interactions entail unpleasant circumstances: either deductible payments or, worse, claims. This dynamic is even more pronounced in the independent agency model, in which the intermediary, not the carrier, usually dominates the relationship with the client.

The emerging technology intrinsic to the IoT that can potentially monitor and measure each insured’s behavioral and property footprint across an array of activities could turn out to be an insurer’s holy grail, as IoT applications can offer tangible benefits for value-conscious consumers while allowing carriers to remain connected to their policyholders’ everyday lives. While currently, people likely want as few associations with their insurers as possible, the IoT can potentially make insurers a desirable point of contact. The IoT’s true staying power will be manifested in the technology’s ability to create value for both the insurer and the policyholder, thereby strengthening their bond. And while the frequency of engagement shifts to the carrier, the independent agency channel will still likely remain relevant through the traditional client touchpoints.

By harnessing continuously streaming “quantified self” data, using advanced sensor connectivity devices, insurers could theoretically capture a vast variety of personal data and use it to analyze a policyholder’s movement, environment, location, health, and psychological and physical state. This could provide innovative opportunities for insurers to better understand, serve, and connect with policyholders—as well as insulate companies against client attrition to lower-priced competitors. Indeed, if an insurer can demonstrate how repurposing data collected for insurance considerations might help a carrier offer valuable ancillary non-insurance services, customers may be more likely to opt in to share further data, more closely binding insurer and customer.

Leveraging IoT technologies may also have the peripheral advantage of resuscitating the industry’s brand, making insurance more enticing to the relatively small pool of skilled professionals needed to put these strategies in play. And such a shift would be welcome, considering that Deloitte’s Talent in Insurance Survey revealed that the tech-savvy Millennial generation generally considers a career in the insurance industry “boring.”4 Such a reputational challenge clearly creates a daunting obstacle for insurance executives and HR professionals, particularly given the dearth of employees with necessary skill sets to successfully enable and systematize IoT strategies, set against a backdrop of intense competition from many other industries. Implementing cutting-edge IoT strategies could boost the “hip factor” that the industry currently lacks.

With change comes challenges

While most stakeholders might see attractive possibilities in the opportunity for behavior monitoring across the insurance ecosystem, inevitable hurdles stand in the way of wholesale adoption. How insurers surmount each potential barrier is central to successful evolution.

For instance, the industry’s historically conservative approach to innovation may impede the speed and flexibility required for carriers to implement enhanced consumer strategies based on IoT technology. Execution may require more nimble data management and data warehousing than currently in place, as engineers will need to design ways to quickly aggregate, analyze, and act upon disparate data streams. To achieve this speed, executives may need to spearhead adjustments to corporate culture grounded in more centralized location of data control. Capabilities to discern which data are truly predictive versus just noise in the system are also critical. Therefore, along with standardized formats for IoT technology,5 insurers may see an increasing need for data scientists to mine, organize, and make sense of mountains of raw information.

Perhaps most importantly, insurers would need to overcome the privacy concerns that could hinder consumers’ willingness to make available the data on which the IoT runs. Further, increased volume, velocity, and variety of data propagate a heightened need for appropriate security oversight and controls.

For insurers, efforts to capitalize on IoT technology may also require patience and long-term investments. Indeed, while bolstering market share, such efforts could put a short-term squeeze on revenues and profitability. To convince wary customers to opt in to monitoring programs, insurers may need to offer discounted pricing, at least at the start, on top of investments to finance infrastructure and staff supporting the new strategic initiative. This has essentially been the entry strategy for auto carriers in the usage-based insurance market, with discounts provided to convince drivers to allow their performance behind the wheel to be monitored, whether by a device installed in their vehicles or an application on their mobile device.

Results from the Wikistrat crowdsourcing simulation reveal several other IoT-related challenges that respondents put forward. (See figure 2.)6

ER_2824_Fig.2a

Each scenario implies some measure of material impact to the insurance industry. In fact, together they suggest that the same technology that could potentially help improve loss ratios and strengthen policyholder bonds over the long haul may also make some of the most traditionally lucrative insurance lines obsolete.

For example, if embedding sensors in cars and homes to prevent hazardous incidents increasingly becomes the norm, and these sensors are perfected to the point where accidents are drastically reduced, this development may minimize or eliminate the need for personal auto and home liability coverage, given the lower frequency and severity of losses that result from such monitoring. Insurers need to stay ahead of this, perhaps even eventually shifting books of business from personal to product liability as claims evolve from human error to product failure.

Examining the IoT through an insurance lens

Analyzing the intrinsic value of adopting an IoT strategy is fundamental in the development of a business plan, as executives must carefully consider each of the various dimensions to assess the potential value and imminent challenges associated with every stage of operationalization. Using Deloitte’s Information Value Loop can help capture the stages (create, communicate, aggregate, analyze, act) through which information passes in order to create value.7

The value loop framework is designed to evaluate the components of IoT implementation as well as potential bottlenecks in the process, by capturing the series and sequence of activities by which organizations create value from information (figure 3).

ER_2824_Fig.3

To complete the loop and create value, information passes through the value loop’s stages, each enabled by specific technologies. An act is monitored by a sensor that creates information. That information passes through a network so that it can be communicated, and standards—be they technical, legal, regulatory, or social—allow that information to be aggregated across time and space. Augmented intelligence is a generic term meant to capture all manner of analytical support, collectively used to analyze information. The loop is completed via augmented behavior technologies that either enable automated, autonomous action or shape human decisions in a manner leading to improved action.8

For a look at the value loop through an insurance lens, we will examine an IoT capability already at play in the industry: automobile telematics. By circumnavigating the stages of the framework, we can scrutinize the efficacy of how monitoring driving behavior is poised to eventually transform the auto insurance market with a vast infusion of value to both consumers and insurers.

Auto insurance and the value loop

Telematic sensors in the vehicle monitor an individual’s driving to create personalized data collection. The connected car, via in-vehicle telecommunication sensors, has been available in some form for over a decade.9 The key value for insurers is that sensors can closely monitor individual driving behavior, which directly corresponds to risk, for more accuracy in underwriting and pricing.

Originally, sensor manufacturers made devices available to install on vehicles; today, some carmakers are already integrating sensors into showroom models, available to drivers—and, potentially, their insurers—via smartphone apps. The sensors collect data (figure 4) which, if properly analyzed, might more accurately predict the unique level of risk associated with a specific individual’s driving and behavior. Once the data is created, an IoT-based system could quantify and transform it into “personalized” pricing.

ER_2824_Fig.4

Sensors’ increasing availability, affordability, and ease of use break what could potentially be a bottleneck at this stage of the Information Value Loop for other IoT capabilities in their early stages.

IoT technology aggregatesand communicatesinformation to the carrier to be evaluated. To identify potential correlations and create predictive models that produce reliable underwriting and pricing decisions, auto insurers need massive volumes of statistically and actuarially credible telematics data.

In the hierarchy of auto telematics monitoring, large insurers currently lead the pack when it comes to usage-based insurance market share, given the amount of data they have already accumulated or might potentially amass through their substantial client bases. In contrast, small and midsized insurers—with less comprehensive proprietary sources—will likely need more time to collect sufficient data on their own.

To break this bottleneck, smaller players could pool their telematics data with peers either independently or through a third-party vendor to create and share the broad insights necessary to allow a more level playing field throughout the industry.

Insurers analyze data and use it to encourage drivers to act by improving driver behavior/loss costs. By analyzing the collected data, insurers can now replace or augment proxy variables (age, car type, driving violations, education, gender, and credit score) correlated with the likelihood of having a loss with those factors directly contributing to the probability of loss for an individual driver (braking, acceleration, cornering, and average speed, as figure 4 shows). This is an inherently more equitable method to structure premiums: Rather than paying for something that might be true about a risk, a customer pays for what is true based on his own driving performance.

But even armed with all the data necessary to improve underwriting for “personalized” pricing, insurers need a way to convince millions of reluctant customers to opt in. To date, insurers have used the incentive of potential premium discounts to engage consumers in auto telematics monitoring.10 However, this model is not necessarily attractive enough to convince the majority of drivers to relinquish a measure of privacy and agree to usage-based insurance. It is also unsustainable for insurers that will eventually have to charge rates actually based on risk assessment rather than marketing initiatives.

Substantiating the point about consumer adoption is a recent survey by the Deloitte Center for Financial Services of 2,193 respondents representing a wide variety of demographic groups, aiming to understand consumer interest in mobile technology in financial services delivery, including the use of auto telematics monitoring. The survey identified three distinct groups among respondents when asked whether they would agree to allow an insurer to track their driving experience, if it meant they would be eligible for premium discounts based on their performance (figure 5).11 While one-quarter of respondents were amenable to being monitored, just as many said they would require a substantial discount to make it worth their while (figure 5), and nearly half would not consent.

ER_2824_Fig.5

While the Deloitte survey was prospective (asking how many respondents would be willing to have their driving monitored telematically), actual recruits have been proven to be difficult to bring on board. Indeed, a 2015 Lexis-Nexis study on the consumer market for telematics showed that usage-based insurance enrollment has remained at only 5 percent of households from 2014 to 2015 (figure 6).12

ER_2824_Fig.6

Both of these survey results suggest that premium discounts alone have not and likely will not induce many consumers to opt in to telematics monitoring going forward, and would likely be an unsustainable model for insurers to pursue. The good news: Research suggests that, while protective of their personal information, most consumers are willing to trade access to that data for valuable services from a reputable brand.13 Therefore, insurers will likely have to differentiate their telematics-based product offerings beyond any initial early-adopter premium savings by offering value-added services to encourage uptake, as well as to protect market share from other players moving into the telematics space.

In other words, insurers—by offering mutually beneficial, ongoing value-added services—can use IoT-based data to become an integral daily influence for connected policyholders. Companies can incentivize consumers to opt in by offering real-time, behavior-related services, such as individualized marketing and advertising, travel recommendations based on location, alerts about potentially hazardous road conditions or traffic, and even diagnostics and alerts about a vehicle’s potential issues (figure 7).14 More broadly, insurers could aim to serve as trusted advisers to help drivers realize the benefits of tomorrow’s connected car.15

Many IoT applications offer real value to both insurers and policyholders: Consider GPS-enabled geo-fencing, which can monitor and send alerts about driving behavior of teens or elderly parents. For example, Ford’s MyKey technology includes tools such as letting parents limit top speeds, mute the radio until seat belts are buckled, and keep the radio at a certain volume while the vehicle is moving.16 Other customers may be attracted to “green” monitoring, in which they receive feedback on how environmentally friendly their driving behavior is.

Insurers can also look to offer IoT-related services exclusive of risk transfer—for example, co-marketing location-based services with other providers, such as roadside assistance, auto repairs, and car washes may strengthen loyalty to a carrier. They can also include various nonvehicle-related service options such as alerts about nearby restaurants and shopping, perhaps in conjunction with points earned by good driving behavior in loyalty programs or through gamification, which could be redeemed at participating vendors. Indeed, consumers may be reluctant to switch carriers based solely on pricing, knowing they would be abandoning accumulated loyalty points as well as a host of personalized apps and settings.

For all types of insurance—not just auto—the objective is for insurers to identify the expectations that different types of policyholders may have, and then adapt those insights into practical applications through customized telematic monitoring to elevate the customer experience.

Telematics monitoring has demonstrated benefits even beyond better customer experience for policyholders. Insurers can use telematics tools to expose an individual’s risky driving behavior and encourage adjustments. Indeed, people being monitored by behavior sensors will likely improve their driving habits and reduce crash rates—a result to everyone’s benefit. This “nudge effect” indicates that the motivation to change driving behavior is likely linked to the actual surveillance facilitated by IoT technology.

The power of peer pressure is another galvanizing influence that can provoke beneficial consumer behavior. Take fitness wearables, which incentivize individuals to do as much or more exercise than the peers with whom they compete.17 In fact, research done in several industries points to an individual’s tendency to be influenced by peer behavior above most other factors. For example, researchers asked four separate groups of utility consumers to cut energy consumption: one for the good of the planet, a second for the well-being of future generations, a third for financial savings, and a fourth because their neighbors were doing it. The only group that elicited any drop in consumption (at 10 percent) was the fourth—the peer comparison group.18

Insurers equipped with not only specific policyholder information but aggregated data that puts a user’s experience in a community context have a real opportunity to influence customer behavior. Since people generally resist violating social norms, if a trusted adviser offers data that compares customer behavior to “the ideal driver”—or, better, to a group of friends, family, colleagues, or peers—they will, one hopes, adapt to safer habits.

ER_2824_Fig.7a

The future ain’t what it used to be—what should insurers do?

After decades of adherence to traditional business models, the insurance industry, pushed and guided by connected technology, is taking a road less traveled. Analysts expect some 38.5 billion IoT devices to be deployed globally by 2020, nearly three times as many as today,19 and insurers will no doubt install their fair share of sensors, data banks, and apps. In an otherwise static operating environment, IoT applications present insurers with an opportunity to benefit from technology that aims to improve profits, enable growth, strengthen the consumer experience, build new market relevance, and avoid disruption from more forward-looking traditional and nontraditional competitors.

Incorporating IoT technology into insurer business models will entail transformation to elicit the benefits offered by each strategy.

  • Carriers must confront the barriers associated with conflicting standards—data must be harvested and harnessed in a way that makes the information valid and able to generate valuable insights. This could include making in-house legacy systems more modernized and flexible, building or buying new systems, or collaborating with third-party sources to develop more standardized technology for harmonious connectivity.
  • Corporate culture will need a facelift—or, likely, something more dramatic—to overcome longstanding conventions on how information is managed and consumed across the organization. In line with industry practices around broader data management initiatives,20 successfully implementing IoT technology will require supportive “tone at the top,” change management initiatives, and enterprisewide training.
  • With premium savings already proving insufficient to entice most customers to allow insurers access to their personal usage data, companies will need to strategize how to convince or incentivize customers to opt in—after all, without that data, IoT applications are of limited use. To promote IoT-aided connectivity, insurers should look to market value-added services, loyalty points, and rewards for reducing risk. Insurers need to design these services in conjunction with their insurance offerings, to ensure that both make best use of the data being collected.
  • Insurers will need to carefully consider how an interconnected world might shift products from focusing on cleaning up after disruptions to forestalling those disruptions before they happen. IoT technology will likely upend certain lines of businesses, potentially even making some obsolete. Therefore, companies must consider how to heighten flexibility in their models, systems, and culture to counterbalance changing insurance needs related to greater connectivity.
  • IoT connectivity may also potentially level the playing field among insurers. Since a number of the broad capabilities that technology is introducing do not necessarily require large data sets to participate (such as measuring whether containers in a refrigerated truck are at optimal temperatures to prevent spoilage21 or whether soil has the right mix of nutrients for a particular crop22), small to midsized players or even new entrants may be able to seize competitive advantages from currently dominant players.
  • And finally, to test the efficacy of each IoT-related strategy prior to implementation, a framework such as the Information Value Loop may become an invaluable tool, helping forge a path forward and identify potential bottlenecks or barriers that may need to be resolved to get the greatest value out of investments in connectivity.

The bottom line: IoT is here to stay, and insurers need look beyond business as usual to remain competitive.

The IoT is here to stay, the rate of change is unlikely to slow anytime soon, and the conservative insurance industry is hardly impervious to connectivity-fueled disruption—both positive and negative. The bottom line: Insurers need to look beyond business as usual. In the long term, no company can afford to engage in premium price wars over commoditized products. A business model informed by IoT applications might emphasize differentiating offerings, strengthening customer bonds, energizing the industry brand, and curtailing risk either at or prior to its initiation.

IoT-related disruptors should also be considered through a long-term lens, and responses will likely need to be forward-looking and flexible to incorporate the increasingly connected, constantly evolving environment. With global connectivity reaching a fever pitch amid increasing rates of consumer uptake, embedding these neoteric schemes into the insurance industry’s DNA is no longer a matter of if but, rather, of when and how.

You can view the original post in its entirety Here

Read more…

Originally Posted by: Shawn Wasserman

Shodan search results show that over half a million devices use the 10-year-old OpenSSH 4.3 software. This puts all these devices at risk.

Shodan search results show that over half a million devices use the 10-year-old OpenSSH 4.3 software. This puts all these devices at risk.

One doesn’t have to look too far to realize how vulnerable the Internet of Things (IoT) can be. It just takes a quick search on IoT search engines like BullGuard and Shodan.io.

During a presentation at PTC LiveWorx 2016, Rob Black, senior director of product management at PTC, outlined how black hat hackers could get into over half a million connected devices using an old software known as OpenSSH 4.3.

OpenSSH is a secure shell (SSH) protocol used to allow users access to networks from a remote location. It’s harmless, even useful, if used by the right user in a controlled way.

Unfortunately, a popular version of the software, OpenSSH 4.3, has been out for about a decade. As a result, it has developed a laundry list of vulnerabilities that hackers can use to gain access to systems.

According to the Shodan IoT device search engine, over half a million devices on the ‘net still use this outdated software.

“Half a million devices are on the open Internet with 10-year-old software that allows you to tunnel inside to their network. Who thinks that’s good?” Black rhetorically questioned. “This is one example. One search. One software. One version of a software. There are millions of exposed resources on the Internet.”

The scary thing is that Black explained that some search results will bring up IoT devices associated with power plants and wind tunnels. According to AdaptiveMobile, a mobile network security company, up to 80 percent of connected devices on the IoT do not have the security measures they need to protect us. Once you find a device on Shodan, you can see many characteristics on that device which will help hackers get into it.

These attacks can even prove deadly depending on the IoT application. Take an integrated clinical environment (ICE) like an IoT-enabled hospital. Without proper security, many types of attacks have the potential to risk lives. According to a report published by the Industrial Internet Consortium, these attacks fall into five categories.

 

Five IoT hacking attacks that can risk lives. Examples from an integrated clinical environment (ICE). (Table from the Industrial Internet Consortium.)
Five IoT hacking attacks that can risk lives. Examples from an integrated clinical environment (ICE). (Table from the Industrial Internet Consortium.)

Engineers are designing these IoT devices, sensors and edge points. To ensure that hackers are kept at bay, these engineers need to understand and learn from their software engineer and IT cousins.

“From a design point of view, engineers need to learn about hacking security. You need security at the edge point to make an intelligent analytic device,” said Michael Wendenburg, CEO at Michael Wendendenburg Online Redaktion. “If you hack into that point, you hack into all this data. Engineers are not prepared for that.”

Black agreed, saying, “It’s our role as practitioners of IoT is to really manage those devices that we have in a smart way.”

How Do IoT and Cloud Security Differ?

Black explained that unlike in cloud security, humans may not be in the loop when it comes to IoT security. It’s not feasible for millions of users to be there to hit “Okay” to update software in billions of devices.

Black explained that unlike in cloud security, humans may not be in the loop when it comes to IoT security. It’s not feasible for millions of users to be there to hit “Okay” to update software in billions of devices.

An engineer might think that as long as the cloud system utilized by the IoT device is secure, then all is well. However, there are differences between an IoT system and a cloud system.

Black explained that on the cloud, users and applications are both managed. There are security tools and permissions put into place. On the operations side, servers will be secured and ports will be closed and audited. This takes a lot of testing, but it’s been done before. IoT security, on the other hand, adds complexity.

“Cloud security has been around for a long time and there are lots of good strong practices and management around cloud applications. For IoT, the key difference is we connect things,” clarified Black. “A lot of the challenge is the number of devices to manage and the differences between these devices.”

“There are a bunch of new issues out there like rogue sensors and rogue data sources,” said Andy Rhodes, division head of IoT at Dell. “If you’re orchestrating a turbine or a damn and someone hacks into that and changes the settings, then there are catastrophic issues.”  

Here are some other key differences between cloud and IoT applications:

  • IoT has a stronger potential for damage as water mains can be shut off, power plants can become critical and cars made unresponsive on the road.
  • IoT has a diverse number of devices, operating systems and protocols making it hard to consolidate and standardize as companies grow and products change.
  • Human interactions with all the devices is not scalable. For instance, humans many not be there to hit “Okay” for an update.

The key is to work together. Engineers and IT professionals need to demolish their silos and learn from one another to make the IoT ecosystem secure. However, just because the IT crew has the ecosystem covered on the cloud doesn’t mean the devices and sensors are secure.

“IT [Information Technology] knows how to do security and a lot of this is still traditional IT security working alongside the OT [Operations Technology] people to understand how to secure the sensors as well,” described Rhodes. “You need [security on the device] and network security on the IT side because data flows two ways so you have to secure both ends of that spectrum.”

How to Manage Your Connected Device

Black demonstrating an IoT security architecture.

Black demonstrating an IoT security architecture.

With current IoT trends, if your device isn’t connected to the Internet, it soon will be. Otherwise, it will not keep up with the 30 billion other connected devices Gartner expects to see in the market by 2020.

So the question may not be whether to get into the IoT market given all the security risks. It should be a question of how to manage connected devices with all these security risks.

Black demonstrated what a simple IoT architecture might look like. It includes devices within a firewall, wireless devices outside the firewall and having those devices connecting into the IoT platform. Then, all of this will be used in an application that will use the data from the devices to perform a function. All of these systems, applications and development tools used to make the system must be made secure.

The issue is that because all of these different systems are under the control of various organizations on the vendor, customer and public levels, it can be confusing to establish who is really responsible for all of this IoT security.

“I argue that for IoT we have a shared security responsibility,” noted Black. “This is not a one-entity responsibility. It is shared between the providers of the infrastructure, service, platform, application and the end customers.”

Importance of User Roles on IoT Security

Given all of the organizations and users that might be associated with one IoT system, defining roles for these organizations and users is of high importance.

Each user and organization will have different roles, which will define levels of control over the IoT system. For instance, you don’t want to give your customers visibility into and control over all of the IoT devices on your ecosystem. This could make the data of your other customers insecure, as competitors might gain insights due to the information on your system and the lack of roles governing the system.

However, a maintenance team that services all the devices sent to customers will need to see which devices from each customer will be up for servicing.

The key takeaway is that as your system grows on the IoT, much of this role management should be automated. Otherwise, the role management will not scale with the IoT system if a human remains in the role assignment loop.

“From a visibility and permission standpoint, what you really want are mechanisms to drive that behavior,” instructed Black. “When new devices are added, if you have a manual process, that is not going to scale when you [have] tens of thousands of devices. You are going to need a system that drives this behavior automatically. You just need to set the rules beforehand to ensure the users are put in the right groups.”

Division of Systems is Key to a Secure IoT Ecosystem

The division of permissions shouldn’t just be between roles. It should also be between systems within the IoT device itself. Engineers must design some systems and subsystems to be independent and separate from all other systems. This will ensure that if a hacker compromises your device, they will not be able to take control of key systems.

After all, there is no reason for an entertainment system in a car to be linked to the steering, brakes and accelerator of a car. As the WIRED video below shows, though, this was the case with the Jeep Cherokee. As a result, hackers were able to mess with one reporter’s drive on the highway with hilarious outcomes—but the joke isn’t funny anymore if people actually get hurt.

“The way some of these systems are designed, if you have access to this you have access to multiple design elements in the car,” said Frank Antonysamy, head of engineering and manufacturing solutions at Cognizant. “The way we are dealing with this is to isolate as much as possible and then get the data.”

“When you look at it from a system design [perspective], in an automobile for example, there is still a fair amount of isolation written into the design,” said Antonysamy. “Because I have access to my control panel doesn’t mean I have access to the accelerator. That kind of design-based isolation is critical at least until we get a zero-vulnerability scenario.”

Eric van Gemeren, vice president of R&D at Flowserve, explained that the automobile industry and other IoT device creators can learn a lot from the process industry on the separation of systems within a design.

“In the process industry, it’s different from having a car that’s IoT-enabled and someone can hack into it,” said van Gemeren. “In the process industry, there are well-established IEC [International Electrotechnical Commission] and ISO [International Organization for Standardization] standards for safety and compliance. The control communication network is always separate and independent from the diagnostics and asset management network. It’s very clear that when you design that solution, there are certain features and functions that will never be available through wireless, in a discrete controlled domain, with an entirely different protocols and with robust security on top of it.”

“A lot of the stuff we are talking about in the IoT space is all about gathering outbound asset information,” added van Gemeren. “You can’t send back control information or directions that can hijack the device.”

In other words, van Gemeren explained that if a safety system like fire suspension sprinklers were installed in a process plant, they will need to be on an isolated system.

Do Your Devices Need to Talk to Other Devices?

Black explained the scenarios in which you need to use device-to-device

Black explained the scenarios in which you need to use device-to-device

When people think about the IoT, many of them think of connected devices communicating with each other over the Internet.

Though there are situations when the data should be sent to the cloud, there are also situations where it is faster and more efficient for devices to talk to each other directly.

“You could go up to the cloud and negotiate up there and bring it back down but that is not using bandwidth efficiently and what happens if you lose network connectivity? Will your devices fail? Do you want them to be dependent on the network?” asked Black.

When connected device need to talk directly, you will need a way to authenticate the devices mutually as well as a method of authorizing the devices to an appropriate level of interactions.

“It doesn’t make sense for one car to have the authorization to turn on the windshield wipers for another car,” joked Black.

The Importance of Provisioning and Approval of an IoT Device

This brings us to another key step in setting up a secure IoT system: ensuring your processes can set up provisioning and approval for device-to-device communication, data ownership, de-provisioning and more.

“Any process that runs off of administration approval will fail on an IoT scale,” remarked Black. This is similar to the creation of roles the human needs to be out of the loop. Black added, “You can’t design a process based on admin approval—it might work for a hundred devices but it won’t work on a large-scale system.”

Unfortunately, you can’t just let all devices interconnect without a provisioning and approval process either. Take the Superfish scandal, for example. The program was intended to provide advertisers with a way to show ads based on a user’s Internet searches.

This sounds innocuous enough until you realize that, at the time, all Lenovo laptops had the same self-signed certification key for all the laptops that shipped out with the program. This allowed for man-in-the-middle hacking attacks that could intercept the Internet communications of any Lenovo laptop with the Superfish program still installed.

“Ensuring trust when you’re bootstrapping a device is challenging even big laptop manufacturers can make mistakes,” said Black. “We need to think through some of those processes to see how do we get secrets onto a device. You need a well-defined mechanism for establishing trust on your device.”

One method Black suggested to get your devices onto your IoT system with secure provisioning and approval is to use your enterprise resource planning (ERP) system. If your ERP system were connected to the IoT system, then the provisioning and approval process will expect to see the device. Not only would this system be secure, it can also be made scalable as there will be no need to have a human in the loop.

The Importance of De-Provisioning When You Re-Sell a Connected Device

Black explained the importance of factory resets and de-provisioning when selling used devices.

Black explained the importance of factory resets and de-provisioning when selling used devices.

There is a lot of confidential information that can be stored on a connected device. Therefore, if users aren’t careful, they could be giving a hacker everything they need to get into the system when re-selling these devices.

The average user would know enough to delete their personal and business data from the device, but there still might be information on the re-sold device that can open doors to hackers.

For instance, the device might store digital keys that were used to encrypt the data you were sending and receiving from the Internet. If you were to sell that equipment without changing those keys, then whomever you sold that equipment to could now be able to decrypt all of the data you sent and received while operating the device. Assuming the hacker intercepted that data in full knowledge that you were to sell the equipment, they now have gathered a lot of information on your personal or business operations.

As a result, engineers should design easy to use de-provisioning procedures for the users of their devices.

Whose Data Is It Anyway? Where the Contract’s Made Up and Protection Should Matter.

Black asked the question: Whose data is it anyway?

Black asked the question: Whose data is it anyway?

One point of contention for the development of IoT security is the question of who owns the data.

Is it the device manufacturer, systems operator, device operator or the maintenance operator?

Will the answer be dependent on the IoT device application?

These questions need answers if robust security measures are to be put into place. Otherwise, the right information might end up in the wrong hands.

“We’ve seen a range of responses about data ownership and a lot revolves around privacy,” said Colm Pendergast, director of IoT technology at Analog Devices. “To a large extent, it will come down to negotiations between various partners in an ecosystem.”

“[Who owns the data] is a question that is always on the table,” said Chris May, account executive at ARIDEA SOLUTIONS. “It depends on the type of data being acquired. If it’s general weather data, then people are not very concerned. The weather is the weather… When you get to environmental data, it’s a completely different story. They are very protective of that data. [What] If the wrong person gets that data and they don’t understand how to interpret it? [What] if they can’t understand it’s a sensor being recalibrated and they think a water shed was contaminated? It would be massive lawsuits.”

It appears that though 54 percent of surveyed consumers might be comfortable sharing their data with companies, the reverse is not always true.

Alternatively, Black used an example of a medical device company. If the company is sold, then it makes sense for whomever buys the company to also own the data. After all, it will, in theory, be using said data to service the same clients. It isn’t in the client’s interest for the data to start at point zero.

However, does the answer of selling data ownership change with the scenario? What if, instead of a company being sold, it’s a house? Who owns all the data of the smart home—the previous tenants or the incoming tenants? It might be useful for the new tenants to know the power usage history of the house so they can budget their expenses, but do you want strangers to have data like that?

“When you think about how many different entities are involved with an IoT implementation, there are a lot of them,” said Black. “Some of them probably have rights to some of that data and some it’s probably better if they don’t have it.”

Before security walls are put up for an IoT device, these questions must be answered. Otherwise, an owner of the data might be cut off from their property. This can lead to some serious legal ramifications. On the other hand, not understanding where the line in the sand is for data can also open up security risks.

“If there was one single challenge that people are concerned about and has slowed IoT deployments is the question of security and integrating security solutions all over that technology stack. It is one of the bigger challenges,” said Pendergast.

However, one solutions to the IoT data question may not lie with the engineers, programmers or designers. It might be in the hands of public relations educating the public about IoT security and what data is and isn’t being collected.

“We deal with the medical device market and we constantly face the issue that we can’t send patient data—and we are a cloud-based platform, so that is a challenge,” said Puneet Pandit, CEO of Glassbeam. “We are not taking the patient data; we are taking the operation data. I think that is a constant question. There is a lot of education that has to be done in the industry to clarify what IoT data means at the end of the day. People have created security barriers for all the right reasons, but in the context of IoT you are taking machine and operational data and that isn’t something that is included on data privacy.”

Reducing IoT Attack Surfaces: Do You Need Access to the Open Web?

Shodan is only able to show the IoT devices that are on the open web. The number, as well as types, of devices that it can find is certainly scary.

“[Security is] still the top-two or -three concern of customers when you read surveys and speak to them,” said Rhodes. “What you’ve basically done is you’ve opened up a surface of attack either as a gateway or the things themselves.”

Does your device need to be on the open web? Do multiple surfaces of attack need to exist? The answer is no—not if engineers design the device to be the one to initiate communications.

“Different IoT solutions have the capability to perform device-initiated communication,” said Black. “That means that from a connection standpoint, if your device initiates communications, then that device is exclusively paired with one server on the cloud. That device is only going to communicate with that server.”

In other words, the device won’t be generally available on the Internet.

“It’s something to think about. Can I communicate with this device from every [access point] on the earth or is it tied to a single server? Because you are really reducing your attack surface with that kind of capability,” Black explained. “You reduce your attack surface so you are not worried about everything in the world. You are only connected to a very limited set of servers.”

If your device can connect to any endpoint on the Internet, then any hacker at any location could in theory send a command to that device. However, if the device is connected only to one server via a device-initiated communication, then only that server can send commands. The theory is that your server will be within internal IT infrastructures and securities.

However, there is a downside to device-initiated connectivity. You will have to rely on the device to connect to the system in order to initiate an update or collect data. In other words, you can lose connections to the device as soon as a customer changes firewall securities or the network is interrupted. 

As a result, if engineers chooses to use device-initiated connections for an IoT system, then they will need to inform the customer. The customer will need to understand if the firewall and network connection isn’t interfering with the connection.

“We’ve seen a lot of software partners changing their architecture to support intermittent connectivity,” said Gerald Kleyn, director of engineering at Hewlett Packard Enterprise (HPE). “In some cases, if the weather gets bad and [satellite communication] goes down, then when it comes back up it starts releasing things that have been stored on the edge back up to the cloud.”

What to Do When You Find a Vulnerability on Your Connected Device

The longer your device is in the real world, the more likely it is that a vulnerability will be found. As a result, engineers will need to design software update compatibility into their devices.

“You need a software distribution mechanism that will work for all of your devices that’s scalable, secure, flexible and efficient,” said Black. “It needs to be flexible because all your devices are different, so they need different processes and procedures.”

“You need to be able to say, if the install isn’t going right, that you need to hold back and notify your system. You need to be able to say, ‘do this for North America first, or Europe or everyone but that customer that doesn’t want updates,’” added Black. “Without a plan, you will be sad when the next Heartbleed comes out. You are going to have to patch. So what is the mechanism you are going to utilize?”

This all must seem very complicated, but much of this IoT security issues will be answered when you choose the IoT platform to run, manage design the system. Black says that when choosing your IoT platform, keep these three main security challenges in mind:

  1. Managing the complex interactions between devices and user
  2. Patching security updates to your devices in an easy and secure fashion
  3.  Reducing the risk by mitigating cyber-attacks form finding your device

You can view the original post Here

Read more…

Originally Posted by: Mimi Spier

The Internet of Things (IoT) is here to stay—and rapidly evolving. As we try to make sense of IoT’s impact on our lives and businesses, we also continue grappling with the security challenges.

As the IoT security landscape evolves, here are five key insights for designing and implementing IoT deployments for your enterprise.

5 IoT insights vmware airwatch

1. Protect Your People

IoT has opened up a world of possibilities in business, but it has also opened up a host of ways to potentially harm employees and customers. A security breach is not limited to stealing credit card data, anymore. Anyone with the right access could breach firewalls or steal health records. A key challenge of the IoT world is providing the right access to the right people at the right time.

[Related: 5 Real Ways to Enable IoT Success in Your Enterprise]

2. Watch Your Things

As millions of “things” start joining the enterprise network, it also expands the surface area for hackers to breach your system. All these devices will be leveraging public Wi-Fi, cloud, Bluetooth networks, etc., which will create multiple points of vulnerabilities. Your system needs to be designed for security from the bottom up to account for:

A) Device level: better quality devices

B) Data level: encryption and cryptology

C) Network level: certificates and firewalls

D) Application level: login/authorized access

3. Poor Quality of Things

The standards for IoT hardware and software are still evolving, which means until we have any established guidelines, we need to account for a vast range in the quality of “things.” Some of these may be very sophisticated and hardy, while others may be of the cheap disposable variety. Which devices you pick may depend upon factors like cost, usage and the use case itself. However, be warned that lower-quality devices have been used to gain entry to a secure network.

“By 2020, more than 25% of identified attacks in enterprises will involve the Internet of Things (IoT), although the IoT will account for less than 10% of the IT security budget.” Gartner

4. Is Your Network Ready?

One of the biggest challenge for any IT department implementing company-wide IoT projects will be assessing and managing bandwidth. As millions of devices join your network at increasing rates, scaling your network’s bandwidth will be an ongoing struggle. Your bandwidth needs must remain elastic, so you can support your enterprise needs, while minimizing costs. It is critical to minimize exposure of your networks by using, for example, micro-segmentation.

5. Data Is Your Friend

As with protecting any system, predictive maintenance is the way to stay a step ahead of breaches. The usual ways of pushing out timely security patches and software upgrades will continue to be helpful. However, one big advantage of IoT is the sheer amount of data it generates. You can track operational data to create alerts based on anomalies in the system. For example, if someone logs into the system from Atlanta and then, 30 minutes later, logs in again from Palo Alto, the system should raise a red flag.

You can view the original post by clicking Here.

Read more…

The internet is now a given. It’s something that we don’t even consider. It’s always there and we can depend on it to help us just as we can depend on electricity and natural gas to keep us warm or cool.

 The way in which we use the internet began as communications and has evolved far beyond that to something that is a necessity and something that is changing lives. We are entering a very unique period in the life of the internet.

 IoT is isn't at all new to us though many people are not sure what IoT is and how it’s useful to humanity.  It began at MIT and started nearly 20 years ago, in the early part of 2000s.  IoT, to simplify the explanation, is nothing more than a network that is designed of all kinds of objects that connect to the internet. Refrigerators, cars, trucks, manufacturing computers, watches, tablets, are all examples of the IoT and each of them has unique capabilities.

 Given the changes being made in IoT, this network can now be expanded to include physical items that may not traditionally have been part of the internet. Things like sneakers that count how far you've run or cushion your foot and measure the impact to the body. Street lights connected to the internet can record those who stand beneath them or activity that took place.

 Iot, according to companies such as DHL and Cisco, is firing the imagination and creating a broad and diverse array of new jobs and new methods of accomplishing old tasks.

 IoT offers us a transition in technology that has been impacting many different industries. IT will continue to do so along the way, impacting more tasks and more companies. It will, as it continues to change and evolve—offer huge implications for the movement of goods and services and the business of logistics.

 Today some 15 million devices are connected to the internet. These embed sensors, control computers, help us to analyze our work, to source new data, and to find unparalleled views into operations and information that allow us to improve the speed, improve the products, improve the delivery and improve the overall service to our customers.

 The IoT is already changing the way that we do business and the logistics of storage and delivery. It’s doing that by changing how we are making decisions about how goods are trucked, “stored, monitored, serviced, and delivered to customers.”

Trucks and cars carrying goods are already moving by the use of robotics in countries such as Singapore, the UK and the US.

Units for storage are carefully measuring temperature to ensure that goods are stored in the right way to prevent spoilage and saving money for the companies which are using them.

Vast changes and major impacts in how we buy, sell and use goods and services and improvements in the  ways that they serve mankind are being wrought by the internet of things every day. Expect the future to be more of the same.

For more information check out our website at www.internetofthingsrecruiting.com

Read more…

IoT Central Bi-Weekly Digest, May 20, 2016

We went to IoT World last week in Santa Clara, California, where over 150 vendors and 10,000 attendees were showing their wares and making connections. More posts on that soon. In the meantime, here's our third issue of the IoTC Bi-Weekly Digest. If you're interested in being featured, we always welcome your contributions on all things IoT Infrastructure, IoT Application Development, IoT Data and IoT Security, and more. All members can post on IoT Central. Consider contributing today. Our guidelines are here.

Featured Articles


Who's Your Buddy? An interview with Dave McLauchlan, CEO & Co-Founder, Buddy Platform

By David Oro

Last week at IoT World, I stopped by the Buddy Platform booth (namely because of their killer Lego set-up). Buddy provides data hosting and management solutions for manufacturers and vendors of connected ("IoT") devices. Prior to IoT World, I sent Buddy CEO and Co-Founder Dave McLauchlan a few questions. Here's what he had to say.

People talk about the Internet of Things (IoT) but few know what it even means in practice

By Danielle Storey 

The technology sector is buzzing with predictions and hype about the Internet of Things (IoT), but many people are still confused about what it means, what the real world opportunities are and why businesses should be looking into IoT.

These Are The Weakest Points in Your IoT Security

By Shayla Price

The Internet of Things is changing the world, heralded as one of the most pivotal technology trends of the modern era. We are getting ready to enter a time where everything, quite literally, is connected to the Internet. For the industrial sector, this is a new area of exploration. Factories have smart infrastructures that use sensors to relay data about machine performance. Cities have smart grids that monitor everything from traffic to the energy used by streetlights. Hospitals can monitor the health of high-risk, at-home patients.

In other words, we are entering a hacker's dream world.

The Internet of Things >> Birth of a tech ecosystem purpose-built for disruptive growth

By Roger Attick

The Internet of Things (IoT) concept promises to improve our lives by embedding billions of cheap purpose-built sensors into devices, objects and structures that surround us (appliances, homes, clothing, wearables, vehicles, buildings, healthcare tech, industrial equipment, manufacturing, etc.). What this means is that billions of sensors, machines and smart devices will simultaneously collect volumes of big data, while processing real-time fast data from almost everything and...almost everyone!!! IoT vision is not net reality  Simply stated, the Internet of Things is all about the power of of connections.

Additional Links

Follow us on Twitter | Join our LinkedIn group | Members Only | For Bloggers | Subscribe

Read more…

 

Guest blog post by Vincent Granville

AI was very popular 30 years ago, then disappeared, and is now making a big come back because of  new robotic technologies: driver-less cars, automated diagnostic, IoT (including vacuum cleaning and other household robots), automated companies with zero employee, soldier robots, and much more.

Will AI replace data scientists? I think so, though data scientists will be initially replaced by "low intelligence" yet extremely stable and robust systems. There has been a lot of discussions about the automated statistician. I am myself developing data science techniques such as  Jackknife regression  that are simple, robust, suitable for black-box, machine-to-machine communications or other automated use, and easy to understand and pilot by the layman, just like a Google driver-less car can be "driven" by an 8 years old kid. 

My approach to automating data science and data cleaning / EDA (exploratory data analysis) is not really AI: it's just a starting point, but not a permanent solution. In the long term, it is possible that AI will handle complex regression models, far more complex than my Jackknife regression: after all, all the steps of linear or logistics regression modeling, currently handled by human beings spending several days or weeks on the problem, involve extremely repetitive, boring, predictable tasks, and thus it is a good candidate for an AI implementation entirely managed by robots.  

As machine learning (ML) more and more involves AI, and the blending of ML and AI is referred to as deep learning, I can see data science evolving to deep data science (DDS) or automated data science (ADS), where AI, robots, or automation at large, take a more prominent role. 

 

2023250?profile=RESIZE_1024x1024

True AI systems can even predict travel time in real time based on expected traffic bottlenecks and road closures

Which jobs are threatened by AI?

Just like data science will take years to get a high level automation, where as much as 50% of human tasks are replaced by robots, I believe that these professions are at risk, but the erosion will be modest and slow, taking a lot of time to materialize:

  • Teachers: some topics such as mathematics or computer science can be taught by robots, at least for the 10% of students that are self-learners. Generally speaking, topics that are currently taught by robots include flying a plane, training on an AI-powered simulator. Ironically, planes can be flew without human pilots, but studies have shown that passengers would be very scared to board a pilot-less plane. The biggest threat for teachers is not AI though, it is online training.
  • Grading student papers, detect plagiarism. But students / authors are getting more sophisticated, using article-generating software powered by AI, to avoid detection. This could lead to an interesting war: AI robots designed for fraud detection fighting against AI robots designed to cheat.
  • For publishers, automatically writing high-quality, curated articles in a short amount of time. An article such as this one is a good candidate for automated, AI-powered production. The first step is to identify articles that are good candidates (for curation)  for a specific audience; this is also accomplished using AI. 
  • Can AI writes AI algorithms, or in short, can AI automate AI? I believe so; after all, I was one of the pioneers who wrote programs that write programs (software code compilers or interpreters also fit in this category). I guess this is just an extension of this concept.
  • Automated diagnostic (or automated doctor, but also automated lawyer). I guess this will eliminate a small proportion of these practitioners. But what about a robot performing a brain surgery with higher efficiency than a human surgeon? Or a robot manufacturing an ad-hoc, customized client-specific drug for maximum efficiency? 
  • Automated chefs replacing expensive cooks in a number of restaurants. Or think about a McDonald restaurant where the only human is a security guard - everything else being outsourced to AI-powered robots, including cleaning, preparing food, delivering to customers, processing payments, filing tax returns and accounting, ordering from vendors, and so forth. This would require significant system-to-system communications, but I believe it is feasible.
  • Automated policemen or soldiers is a source of concern, as you would have algorithms that decide who to kill or who to arrest. So this might not happen for a long time, though drones are replacing soldiers in a number of wars, and have the power to kill (based on some algorithm) with no one complaining about, as long as it is not happening in US. Terrorists might be attracted too by this type of technology.
  • AI will be present in many IoT applications such as smart cities, precision farming, transportation, monitoring (detecting when an offshore oil platform is going to collapse), and so on.

AI and automation has already replaced many data science tasks long ago

Many people talk about the threat of AI, but as of today, many jobs have already been automated, some more than 30 years ago. For instance, during my PhD years, a lot of data transited through tapes between big computer systems, and involved trips to the computer center, interacting with a number of people taking care of the data flow. This has entirely disappeared.

We used to have shared secretaries to write research papers (they could write LaTeX documents), I think this has all but disappeared.

One of the applications that I developed in the eighties was a remote sensing software that could perform image segmentation and clustering, for instance to compute the proportion of various crops in a specific area based on satellite images, without human interactions - thus eliminating all the expensive jobs that were previously performed by humans to accomplish this task.

Final note

Those who automate data science are still data scientists. Just like those developing robots to automate brain surgery work in a team, with many members being brain surgeons. it's just shifting the nature of the job rather than eliminating it.

 

Follow us @IoTCtrl | Join our Community

Read more…

Guest blog post by Bernard Marr

In a meeting with Airbus last week I found out that their forthcoming A380-1000 – the supersized airliner capable of carrying up to 1,000 passengers – will be equipped with 10,000 sensors in each wing.

The current A350 model has a total of close to 6,000 sensors across the entire plane and generates 2.5 Tb of data per day, while the newer model – expected to take to the skies in 2020 – will capture more than triple that amount.

In an industry as driven by technology as the aviation industry, it’s hardly surprising that every element of an aircraft’s performance is being monitored for the potential to make adjustments which could save millions on fuel bills and, more importantly, save lives by improving safety.

So I thought this would be a good opportunity to explore how the aviation industry, just like every other industry, is putting data science to work.

There are 5,000 commercial aircraft in the sky at any one time over the US alone, and 35 million departures each year. In other words the aviation industry is big. And given that every single passenger on each of those flights is putting their life in the hands of not just the pilot, but the technology, the safety measures and regulations in place are extremely complex.

This means that the data it generates is big, and complex too. But airlines have discovered that with the right analytical systems, it can be used to eliminate inefficiencies due to redundancy, predict routes their passengers are likely to need, and improve safety.

Engines are equipped with sensors capturing details of every aspect of their operation, meaning that the impact of humidity, air pressure and temperature can be assessed more accurately. It is far cheaper for a company to be able to predict when a part will fail and have a replacement ready, than to wait for it to fail and take the equipment offline until repairs can be completed.

In fact, Aviation Today reported that it can often take airlines up to six months to source a replacement part, due to inefficient prediction of failures leading to a massive backlog with manufacturers.

On top of this fuel usage can be economized by ensuring engines are always running at optimal efficiency. This not only cuts fuel costs but minimizes environmentally damaging emissions.

In the case of Airbus, they partnered with IBM to develop their own Smarter Fuel system, specifically to target this area of their operation with Big Data and analytics.

Additionally, airlines closely monitor arrival and departure data, correlating it with weather and related data to predict when delays or cancellations are likely – meaning alternative arrangements can be made to get their passengers where they need to be.

Before they even take off, taxi times between the departure gates and runways is also recorded and analyzed, allowing airlines and airport operators to further optimize operational efficiency – meaning less delays and less unhappy passengers.

This sort of predictive analysis is common across all areas of industry but is particularly valuable in commercial aviation, where delays of a few hours can cost companies millions in rearrangements, backup services and lost business (The FAA estimates that delayed flights cost the US aviation industry $22 million per year).  

Specialist service providers have already cropped up – masFlight is one – aiming to help airlines and airports make the most of the data they have available to them.

They aggregate data sets including weather information, departure times, radar flight data and submitted flight plans, monitoring 100,000 flights every day, to enable operators to more efficiently plan and deliver their services.

In marketing, too, airlines are beginning to follow the lead of companies such as Amazon by collecting data on their customers, monitoring everything from customer feedback to how they behave when visiting websites to make bookings.

Now we are used to generating and presenting tickets and boarding cards through our smartphones, more information about our journey through the airport, from the time we enter to the time we board our flight can also be tracked. This is useful both to airport operators, managing the flow of people through their facilities, and to airlines who will gather more information on who we are and how we behave.

So businesses in the aviation industry, including Airbus, are making significant steps towards using data to cut waste, improve safety and enhance the customer experience. 10,000 sensors in one wing may sound excessive but with so much at stake – both in terms of profits and human lives – it’s reassuring that nothing will be overlooked.

I hope you found this post interesting. I am always keen to hear your views on the topic and invite you to comment with any thoughts you might have.

About : Bernard Marr is a globally recognized expert in analytics and big data. He helps companies manage, measure, analyze and improve performance using data.

His new book is: Big Data: Using Smart Big Data, Analytics and Metrics To Make Better Decisions and Improve Performance You can read a free sample chapter here.

Follow us @IoTCtrl | Join our Community

Read more…

The observation deck won’t be finished for a few years yet. If you want to see the future of New York, walk north along the High Line, round the curve at the rail yards, and turn your back to the river. Amid the highway ramps and industrial hash of far-west Manhattan, a herd of cranes hoists I-beams into the sky. This is Hudson Yards, the largest private real-estate development in United States history and the test ground for the world’s most ambitious experiment in “smart city” urbanism. 1

Over the next decade, the $20-billion project — spanning seven blocks from 30th to 34th Street, between 10th and 12th Avenues — will add 17 million square feet of commercial, residential, and civic space, much of it housed in signature architecture by the likes of Skidmore, Owings & Merrill; Diller Scofidio + Renfro; and Bjarke Ingels Group. 2But you don’t have to wait that long to see where this is headed. The first office tower, Kohn Pedersen Fox’s 10 Hudson Yards, opens next month, with direct access to the High Line. The new subway stop is already in business (and has already sprung a few leaks); an extension of the 7 train line connects the diverse, middle-class neighborhood of Flushing, Queens, with this emerging island of oligarchs.

Read the complete story here.

Read more…

The Internet of Things (IoT) concept promises to improve our lives by embedding billions of cheap purpose-built sensors into devices, objects and structures that surround us (appliances, homes, clothing, wearables, vehicles, buildings, healthcare tech, industrial equipment, manufacturing, etc.).

IoT Market Map -- Goldman Sachs

What this means is that billions of sensors, machines and smart devices will simultaneously collect volumes of big data, while processing real-time fast data from almost everything and... almost everyone!!!

IoT vision is not net reality

Simply stated, the Internet of Things is all about the power of connections.

Consumers, for the moment anyway, seem satisfied to have access to gadgets, trendy devices and apps which they believe will make them more efficient (efficient doesn't necessarily mean productive), improve their lives and promote general well-being.

Corporations on the other hand, have a grand vision that convergence of cloud computing, mobility, low-cost sensors, smart devices, ubiquitous networks and fast-data will help them achieve competitive advantages, market dominance, unyielding brand power and shareholder riches.

Global Enterprises (and big venture capital firms) will spend billions on the race for IoT supremacy. These titans of business are chomping at the bit to develop IoT platforms, machine learning algorithms, AI software applications & advanced predictive analytics. The end-game of these initiatives is to deploy IoT platforms on a large scale for;

  • real-time monitoring, control & tracking (retail, autonomous vehicles, digital health, industrial & manufacturing systems, etc.)
  • assessment of consumers, their emotions & buying sentiment,
  • managing smart systems and operational processes,
  • reducing operating costs & increasing efficiencies,
  • predicting outcomes, and equipment failures, and
  • monetization of consumer & commercial big data, etc.

 

IoT reality is still just a vision

No technology vendor (hardware or software), service provider, consulting firm or self-proclaimed expert can fulfill the IoT vision alone.

Recent history with tech hype-cycles has proven time and again that 'industry experts' are not very accurate predicting the future... in life or in business!

Having said this, it only makes sense that fulfilling the promise of IoT demands close collaboration & communication among many stake-holders.

A tech ecosystem is born

IoT & Industrial IoT comprise a rapidly developing tech ecosystem. Momentum is building quickly and will drive sustainable future demand for;

  • low-cost hardware platforms (sensors, smart devices, etc.),
  • a stable base of suppliers, developers, vendors & distribution,
  • interoperability & security (standards, encryption, API's, etc.),
  • local to global telecom & wireless services,
  • edge to cloud networks & data centers,
  • professional services firms (and self-proclaimed experts),
  • global strategic partnerships,
  • education and STEM initiatives, and
  • broad vertical market development.

I'll close with one final thought; "True IoT leaders and visionaries will first ask why, not how..!"

Read more…

DIY Home Automation

Home Automation DIY Case Study

The following is from a Mind Commerce interview with residential owner/installer/operator: 

I got into the home automation craze by accident when one of my managers described what he was doing.  After looking at it, the added convenience, security, and cost savings made me a believer.  The overall category of devices that I use are the Internet of Things (IoT).

My setup is as follows:

  • I have an Amazon Echo that allows me to issue voice commands to the majority of my IoT devices.  It also will play music from my Amazon Prime account and allow me to order merchandise (all voice of course).  It additionally allows me to keep a TODO and shopping list that is synchronized to my Alexa app on my iPhone.  As I think of items, I just tell Alexa (the name for the Echo), and she will add the items to the list.  I use this all the time.  You can also set timers and alarms vocally, which is another well-used feature.  There's tons more.  The Echo talks WiFi.
  • I use a Wink Hub to interface the Echo to devices that don't directly talk over WiFi, or that the Echo doesn't directly support.  The Wink Hub talks Z-Wave, Zigbee, WiFi, and Lutron's proprietary communications (dimmers).  The Wink Hub also has a nice APP that lets me control everything directly from my cellphone if I want.
  • I use Luton dimmers that allow me to turn on, turn off, or set the dimming level for my most commonly used lights.  The echo supports this so I can say "Alexa set living room lights to XX%" and it happens.
  • I have a Rain Machine which is a connected sprinkler controller.  I can turn on stations from the Echo, but I don't.  What it allows me to do is to set the watering parameters and then it connects to NOAA and it will modify my preferences based on how much rain has fallen.  Money saver.  It has a great APP and will tell me how much each station actually watered per week.  A real money saver in Florida.
  • The Ecobee 3 thermostat was an expensive but awesome IoT purchase that also saved me a lot of money this past winter.  It is very smart and connects to the Echo directly (WiFi).  I can tell Alexa to raise or lower the temperature by voice.  Setup couldn't be any simpler, and the APP is awesome.  Conventional wisdom in the winter is to lower your temperature at night and then have it increase before you wake to save money.  Wrong!  The Ecobee tracks when your fan and compressor run (view on the website).  I found out that turning the temperature down by 4 degrees overnight was causing my heat strips (expensive) to turn on for a couple of hours around 5AM to bring the temperature back up.  I was much better off just leaving it one degree less all the time.
  • For my garage door controller, I bought an IoT box that allows me to view the status of the garage door and to remotely open or close the door by using the Wink APP.  Really nice when I can't remember if I closed the door, or left it open.  This doesn't work with the Echo by design (having a crook yell into your house "Alexa open the garage door" wouldn't be a good thing).
  • Nest Cam is an awesome security device.  When I'm on travel I can view what's going on in the house and even hear what's going on.  It's got 1080p resolution and night IR capability (see at night with the lights off).  I can even talk to my cat through it.  I pay for the cloud recording service, so when it's on, a month of recording is held on the cloud, which would be useful if the house is ever robbed.  The problem is I don't want it recording while I'm home.  That is solved by...
  • Leviton makes smart bricks that plug into an outlet and let you plug an appliance (anything) into it and control that appliance on/off state through Wink or the Echo.  So when I leave, I can just vocally tell the Nest Cam to turn on, or if I forget, I can just use the Wink APP to turn it on remotely.  I use these to control the Nest Cam, my DirecTV internet device, and my Amazon Fire TV.  Whey have them sucking energy all the time when I use them maybe 2% of the time?

As an advanced user*, he also had this to say:

  • The is a function call IFTT (If This Then That) that works with the Echo, Wink and the IoT devices to allow creation of recipes that handle what to do if something happens.  For example, I set up an IFTT that when I ask the Echo where my cellphone is, the IFTT will call the phone so it rings.  The possibilities are limitless.  Think Geo-fencing or linking input from IoT sensors to automatically cause actions.

*Note: Remember, this is a more advanced, tech user.  However, IoT is increasingly becoming part of the consumer lexicon!!

Read more…

Our second issue of the IoTC Bi-Weekly Digest is below. If you're interested in being featured, we always welcome your contributions on all things IoT Infrastructure, IoT Application Development, IoT Data and IoT Security, and more. All members can post on IoT Central. Consider contributing today. Our guidelines are here.

Featured Articles



An Interview with Ken Finnegan, Chief Technology Officer, IDA Technology Ireland

By David Oro

Just ahead of the Internet of Things World conference taking place May 10–12 at the Santa Clara Convention Center in Silicon Valley, we were lucky enough to catch up with one of the conference speakers, Ken Finnegan, Chief Technology Officer, IDA Technology Ireland. We asked Mr. Finnegan about IoT and Smart Cities, IoT implementations in Dublin, and his thoughts on making cities smarter.  Here’s what we learned.




Profile of an IoT Developer: Results of the IoT Developer Survey

By Ian Skerrett

Today we release the results of our second annual IoT Developer Survey. Like last year it provides an interesting insight into how developers are building IoT solutions.  This year the Eclipse IoT Working Group partnered with IEEE IoT and theAGILE-IoT research project to expand the scope and respondent pool for the survey. Thanks to this partnership, we had 528 participants in the survey, up from 392 last year. The partnership also allowed us to analyze the data to look for any significant difference between the different IoT communities.

What options do you have for remotely monitoring water and fluids with Industrial IoT sensor telemetry?

By Pawei Sasik

IIoT or Industrial IoT (Internet of Things) is everywhere. It’s across all industries, from high tech transport, to natural resources and governments. IIoT software and hardware is deployed for numerous, varying applications, and it’s critical to understand just what the customer needs. One of the areas that we’ve seen recent growth is water and fluid monitoring. Water comes to us as a life sustaining asset and also as a force of destruction. The utility of water needs to be measured and monitored in order to effectively and efficiently use our greatest natural resource. Similarly, monitoring the destructive force of water can be just as important. Let’s talk about the different ways that you can measure and monitor water!

Platforms instead of products: the new normal

By Thierry Lillete

As the platform race continues to mature for the IoT, we found a great post by by Thierry Lillette that looks into the platforms, ecosystems and products. Good reading for any IoT and digital professional.

The Next Big Thing In Big Data: BDaaS

By Bernard Marr

We’ve had software as a service, platform as a service and data as a service. Now, by mixing them all together and massively upscaling the amount of data involved, we’ve arrived at Big Data as a Service (BDaaS).  It might not be a term you’re familiar with yet – but it suitably describes a fast-growing new market. In the last few years many businesses have sprung up offering cloud based Big Data services to help other companies and organizations solve their data dilemmas.

The IoT Database

By David Oro
Phillip Zito at the highly resourceful blog Building Automation Monthly has consolidated multiple IoT Frameworks and Offerings into the IoT Database. You will see links to the Frameworks and Offerings below. He says over time that he will be working on providing summary articles on each Framework and Offering. He could use your help. If you have an offering/framework you would like added to this list feel free to add it in the comments. You can find the IoT Database here.

10 Case Studies for the Industrial Internet of Things

By David Oro

It’s still early days for the IoT but everyday a little part of its burgeoning ecosystem becomes a factor in our lives, whether we know it or not. From industrial tools to farming to cities to grocery aisles and everything in between, the IoT is there. Here are 10 IoT case studies that show just where some of these technologies and applications are being applied.

Additional Links

Follow us on Twitter | Join our LinkedIn group | Members Only | For Bloggers | Subscribe

Read more…

Guest blog by Kai Goerlich. This post originally appeared here

While discrete manufacturing is used in a diverse range of industries, including automotive, aerospace, defense, construction, industrial machinery, and high tech, all of them face common and tough challenges such as higher resource volatility, more competition, increasing customer expectations, and shorter innovation cycles.

According to a study by a Roland Berger (see chart), product complexity has increased dramatically in the past 15 years. Manufacturers have to cope with two overlapping trends: the variety of products is constantly increasing and has more than doubled in the past 15 years, and, in parallel, product lifecycles have gotten about 25% shorter. These factors are putting an increasing pressure on margins, on supply and procurement systems, and on overall business models. According to Roland Berger, managing this complexity could reduce costs by roughly 3% – and certainly digitization can help improve this margin.

The threats and potentials of digitization

Adapting to the age of hyperconnectivity is a matter of life and death for the majority of companies, according to a study by the Economist Intelligence Unit. More than half of enterprises feel very strong competitive pressure from digital offerings by their traditional competition, established companies using digital to enter their market, and digital startups. Certainly, the competition is not waiting, and neither will today’s well-informed digital customers, who want more choice, better customization, and more information around the buying process. While digitization might add another disruptive dimension to an already rising complexity, discrete manufacturers are seeking the benefits of digitization. They are already proactively exploring the use of the IoT to better connect their supply chains, assets, and products, according to an IDC white paper, The Internet of Things and Digital Transformation: A Tale of Four Industries, sponsored by SAP.

Most manufacturers start with less complex projects, such as enhanced visibility or tracking, and progress to more sophisticated processes that require automated or predictive workflows, according to IDC. The findings of the study suggest that companies should start their IoT projects with the overarching goal of a live business operation already in mind. By combining three IoT use cases for manufacturing, i.e. connecting products, creating a connected shop floor with customization, and extending digital business models (see chart), companies will create a competitive business operation that fully exploits the digital opportunities.

Connecting products to improve innovation

Using IoT for innovation is a highly underestimated potential of digitization. A significant percentage of new products fail, and the associated R&D and marketing costs are lost. Customers already expect their products to come with a certain degree of interactivity and this demand will certainly grow in the future. According some estimates on the adoption of connected technology by consumers, the ratio of connected and interactive products will rise to approximately 20% on average by 2020, according to Forbes. This is a conservative estimate, and in some segments the ratio might increase much faster.

By digitizing current products and launching fully digitized ones, manufacturers can significantly reduce the risk of new product failures, as IoT-based products will enable them to monitor the actual use and performance of their products, get live feedback from their customers, and adopt future product innovation. IDC expects that by 2017, 60% of global manufacturers will use IoT to sense data from connected products and analyze that data to optimize the product portfolios, performance, and manufacturing processes. Similarly, the integration of IT assets and information with operational technology in the plant and the supply chain is also on the roadmap, if not already started.

Connecting the shop floor

Digitization offers the possibility to oversee every step in the manufacturing process, from customer demand, through production, and across the complete supply chain. The IDC study identified two IoT use cases – strategic asset management and customer experience – that seem to be very attractive for discrete manufacturing.

1. Strategic asset management

Manufacturers should start to digitize all of their assets in the production process and use IoT-based preventive and predictive maintenance scenarios in the plant and supply chain to reduce downtime and improve utilization. Using the information generated from digitization and IoT, businesses can evaluate use patterns and maintenance routines of their inventory and assets and optimize operations. Fixed assets can account for as much as one-third of all operating costs, so under today’s cost pressures a digital asset management surely matters. To fully use the potential of IoT and the real-time information gathered from assets, devices, and machines, companies need to ramp up their analytical and decision-making capabilities. Anecdotally, companies report that IoT use cases (such as remote maintenance) changed the way they thought about data and got them thinking significantly differently about information and insights.

2. Customization for customer experience

Demand for more choice, flexibility, and customized products is growing fast and estimated to be 15% of all products by 2020, according to MIT Smart Customization Group. Depending on size, material, and complexity, that percentage might be significantly higher. However complex the challenge for manufacturers might be, connected production in real-time is the basis, and it needs the right data from production capabilities, supply, equipment, and workforce, combined with all customer preferences. Getting the customer into the customization and production process is increasingly important for an improved customer experience, so IoT should be used to connect the products and, with it, the customer. This will not only give companies valuable data about user preferences and ideas for product innovation and improvements, but it will allow them to plan the customization of products much more efficiently.

Digitally enhanced business models

Digitization is by now a synonym for disruption. According to a study by the Economist Intelligence Unit, 60% of companies think that digitization is the biggest risk they face. More than half of companies feel competitive pressure from digital offerings by their traditional competition and digital startups. As IDC found, discrete manufacturers are already actively exploring the IoT opportunities, so the change is already underway.

As we pointed out previously, the customer experience of choosing and buying a product is increasingly important, but it does not stop there. IoT-connected products will get the customer into an ongoing interaction with the product vendor and/or retailer, enhancing the buying and use experience. Moreover, companies can use this connection to expand their business models. In its study, IDC mentions a wider range of ideas that manufacturers already explore, such as remote maintenance, refill and replenishment, contracting, product performance, training, and location-based services. While they may not be applicable for all companies, they show the wide range of possibilities and opportunities. Digitization may be a threat for some traditional business models and companies, but it offers huge potentials for those who focus on the customer experience.

Creating a live business operation

The huge potential that IoT offers is less the physical connection of things, machines, and devices, and more the opportunity to create a live business operation based on an advanced data strategy and analytics. While all aspects of IoT have large innovation opportunities on their own, the combination of connected products, customization, and digitally expanded business models promises the biggest benefits for discrete manufacturers. Thus any IoT strategy – wherever it starts – should be created with a larger digitization goal in mind.

Conclusion

  • Connecting products and strategic asset management has big potentials for discrete industries.
  • The combination of connected products, customization, and digitally expanded business models promises the biggest benefits.
  • Companies should create a live business operation with advanced data and analytical skills to use the full potential of IoT.

For more details and information, please read IDC’s IoT whitepaper IoT and Digital Transformation: A Tale of Four Industries and look for future IoT papers that delve deeper into the IDC study’s findings.

Read more…

Just ahead of the Internet of Things World conference taking place May 10–12 at the Santa Clara Convention Center in Silicon Valley, we were lucky enough to catch up with one of the conference speakers, Ken Finnegan, Chief Technology Officer, IDA Technology Ireland. He advises and provides strategic insights into technology trends both nationally and globally for the agency and client companies. He has worked in the software, telecommunications and big data industries for 15 years before joining the IDA in 2014. The IDA is Ireland's inward investment promotion agency, it is a non-commercial, semi-state body promoting Foreign Direct Investment into Ireland through a wide range of services.

We asked Mr. Finnegan about IoT and Smart Cities, IoT implementations in Dublin, and his thoughts on making cities smarter.  Here’s what we learned.

 

What are a few examples of IoT-based technologies that have been implemented throughout Dublin?

There are some really great projects happening in Ireland. The approach that Dublin has taken is a balanced top down - bottom up approach. What I mean by this is that the smart initiative is being driven by city leaders with support from government agencies (e.g. IDA Ireland, Enterprise Ireland and Science Foundation Ireland) at the top, whilst at the same time engaging with the citizens and companies in order to identify and seek solutions to the real needs of the city. 

There are five pillars to the Smart Dublin strategy. These include:

  • Smart Government
  • Smart Mobility
  • Smart Environment
  • Smart Living 
  • Smart People

The principles followed: 

  • How to use smart technologies to improve city livability and competitiveness:
  • Taking a challenge based approach to procurement to deliver better quality outcomes for the city.
  • Positioning Dublin as the place to pilot and scale new smart city technology opportunities. 

Understanding the key areas of focus and the driving principles are vital to describing the challenges and demonstrating that top down bottom up approach. 

A recently completed Smart City challenge that is a fantastic demonstration of IoT in the city was “Keeping Our City Streets Clean.“

A critical role of the city council is that of street cleaning and managing waste across busy city center areas in particular. There is a network of over 3,500 street bins that are manually emptied on a regular basis - the timing of which varies depending on the profile of the street. This street cleaning service is critical to maintaining a clean and litter free city. There has been an increasing trend of successful deployment of smart bin technologies in cities that incorporate features such as:

  • Sensors that communicate back to the street cleaners when they are full
  • Use of accompanying software that allow for optimization of routes for cleaning schedules
  • Use of software applications that deliver real-time data information (through a web portal or smartphone) on each bin status, their inventory management and other efficiency related data

The result was self-compacting bins that send an email when they need to be emptied!

Smart Bins are solar-powered, Wi-Fi enabled bins that are being installed in towns, villages and residential areas across the country to replace traditional public litter bins.

There are currently 401 Smart Bins installed in the south county area. The project is managed by the County Council by the Environment Department with the purpose to improve the efficiency of waste management.

Other examples can be found here including this video of Croke Park Smart Stadium.

 

Since transitioning to a smart city, what benefits has the city of Dublin experienced? And what plans do you have to make Dublin even smarter?

Without a doubt the biggest benefit Dublin and Ireland’s other cities have seen is a demonstration of the power of collaboration to uncover value. 

IDA Ireland has been successful in attracting and supporting multinationals here for a long time. With the combination of engagement with our multinational companies, a vibrant small-to-medium enterprise and start-up community, an openness for business from the cities, the youngest, digitally savvy population in Europe, a highly connected research ecosystem that is easily accessed by industry and support from the government - there is a lot happening. 

For example, Dublin has what we call ‘Silicon Docks’. It’s a part of the city that has the European HQ’s for Google, Facebook, Airbnb, Twitter, LinkedIn, LogMeIn, Adroll, Accenture, Zalando, Tripadvisor and more.

Dublin City Corporation are planning to make this part of the city the most ‘densely sensored’ urban area in the world - producing lots of data that will be accessible by companies, government, academia and citizens. We anticipate that this is going to be a very powerful demonstration of Ireland’s capabilities to design and develop the sensors, connect them over multiple transmission types and finally with one of Europe’s largest data analytics research centers here, uncover, discover and predict value. 

Central to the smart city goals is also to ensure that the infrastructure in place, the LORA (Low Powered Radio) transmission standards are currently being rolled out across the entire island. This is funded by Science Foundation Ireland and coordinated by the CONNECT Research center and allows companies to conduct robust due diligence into what transmission standard works for them. Companies can also access and rent the live radio spectrum, access the Sigfox network and lots more infrastructure; the building blocks are in place for technical solutions.

Ireland seems to have a head start when it comes to the innovation in the area of IoT and smart cities. What other cities have you admired in their innovation, implementations and adoption to make their cities smarter?

A city I really respect for embracing and encouraging technology is Amsterdam. 

Amsterdam is my second home, I lived there after graduating university and it was where a young Ken Finnegan learned the power and beauty of innovation. That is a city that is not afraid to positively leverage emergent technologies. I have seen cities, companies, government and people look at innovation as a threat and to try and tame it. This never works, if there is a smarter way to do things, do it. When policy tries to limit adoption of innovation or when companies fail to recognize it, they are only delaying its ubiquitous arrival and ultimately lose opportunities for growth and success. Amsterdam has the right attitude. It may not know what it’s dealing with but they know there is value to be exploited somehow. I would love to see a twining of Amsterdam and Dublin. I think they are two European cities that are extremely likeminded in approach.

Ireland seems to be all in on smart cities - enlisting both the public and private sector, and educational institutions - towards creating smart cities. Whats your advice for other government entities and the many private vendors in this space?

Indeed governments, academia and the private sector all play an essential part and each entity has ideas about what value is and how it will be generated. Simply my advice is to start the conversation.

Government can facilitate conversation with all the entities. We have a strong appetite for change and growth and a characteristic in Ireland I come across every day is the idea of coopetition. The idea of cooperating together whilst possibly in competition. We all wear the green jersey in Ireland, we are very proud of this green island, but we also want to develop the industry ultimately making it stronger for all in order to grow and win. By not talking to each, you limit growth opportunities, when you sit with competitor and others you need to figure out the safe ground and see how you can work together to succeed. 

Next we have to realize that government and industries have to engage with the end-users. We see that the citizen or what I term pro-citizen (professional citizen – the skilled and informed people that live, work and play in the cities, know the fabric of the city – plumbers, binmen, clubber, doctors, civil servants, sports members, teachers, social workers, bar staff, etc.), as the consumers of smart city good and services. These citizens provide the suggested personalized solutions of the problems they encounter in day-to-day life. It’s the application of a User Design approach to Smart cities.

Finally we have being listening to the narrative about the power of big data for years now. In order to harness the power it essential that data is accessible to all. For example Dublinked is a regional data sharing initiative that has previously unreleased public operational data being made available online for others to research or reuse. With the initial data coming from Dublin City (4 boroughs), public and private organizations in Dublin are linking up with Dublinked to share their data and invite research collaborations. The information is curated by Maynooth University to ensure ideas can be commercialized as easily as possible and to minimize legal or technical barriers that can be impediments for small and medium businesses (SMEs) seeking to develop and prove business ideas.

Smart cities are predicated on the advancement of IoT technologies. Do you see IoT as an opportunity for economic development and job creation? If so, how?

Yes for both cases.

In our five-year strategy launched in 2015, Wining 2020, IoT is the number one strategic technological area we are focusing on. If we didn’t believe IoT would increase economic development or create jobs there is absolutely no way it would be there. We have done our homework, we have listened to our clients and we have mobilized the organization to ensure that each person know exactly why Ireland is the global location for the Internet of Things. In addition to this, we are working with other government agencies to ensure that the environment is right for our clients to be successful. For example our sister agency Science Foundation Ireland has funded multiple research centers of scale (€50m +) so that industry can leverage the quality research coming from the academic system. They have also funded the roll out of transmission network s across the entire land that can be leveraged by industry to research, test and develop innovations. Between IDA Ireland, Enterprise Ireland and Science Foundation Ireland, there are many tools we provide by which industry can leverage to test and trail their products and services before commercializing. Our client companies are trailing these, not in a confine test lab, but literally out in the field, in the cities, in our bays and on our highways because Ireland is connected.

Youll be speaking at IoT World. What should the audience expect to hear from you?

Three things:

1. Ireland is open for business. If you have a problem that needs to be solved, if you want to service the European, Middle East and African markets, if you need infrastructure for research and development, or simply looking for a location with accessible and available talent, we are ready for to have that conversation. 

2. IoT has gained a lot of talk time over the past 5 years, but the conversation for IoT have been developing in Ireland more than 30 years. We are home to 10 out of the top 10 born on the internet/content companies, 9 of the top 10 information communication technology, 15 of the top 20 pharmaceutical and life science companies, fintech, engineering, food etc. companies. Many of these companies are developing their IoT solutions by working together here. It’s truly an agile and collaborative hotspot to be. Take a look at the past two years and the companies that have decided to move here, there is a very convincing track record. 

3. The environment is right. With one of the youngest and tech savvy populations in Europe, the biggest names in Industry, proactive government agencies and an academic scene focused on impact for industry, IDA Ireland want to partner and support companies ready to grow and succeed in the Smart IoT arena.

Read more…

Guest blog by Ian Skerrett. It originally appeared here.

Today we release the results of our second annual IoT Developer Survey. Like last year it provides an interesting insight into how developers are building IoT solutions.

This year the Eclipse IoT Working Group partnered with IEEE IoT and the AGILE-IoT research project to expand the scope and respondent pool for the survey. Thanks to this partnership, we had 528 participants in the survey, up from 392 last year. The partnership also allowed us to analyze the data to look for any significant difference between the different IoT communities.

As with any surveys of this nature, I encourage readers to see these results as one data point that should be compared with other data and industry trends. These results will have certain biases but I do believe these results identify some interesting trends in the IoT industry.

Key Trends for IoT developers

  1.  Companies are shipping IoT solutions today. 46% of the respondents claim their company develops and deploys an IoT solution today. Another 29% plan to do so in the next 6 months. This is a clear indication the industry is maturing quickly.

iotplans

  1. Security continues to be a key concern. It’s not a big surprise that security continues to be the top concern in IoT. Interoperability is the second key concern. I do believe we are on the way to solving some of the interoperability issues with projects like Eclipse HonoEclipse Smarthome and Eclipse Kura. I also think some of the work the AGILE-IoT project is doing will address these issues. However, it still seems the IoT industry still needs to focus on security. It is a difficult issue that needs to be solved.For companies that have deployed a solution today, performance is rising to the third key concern. It is not clear what the performance issues are, but it is something that warrants more investigation.

concerns

  1. Top IoT programming languages: Java, C, JavaScript, Python.  Not surprising to see these languages as being the most popular for developers. I do find some people question the use of Java in IoT. The Eclipse IoT community has a number of Java projects, so there is some bias in the results toward Java. However, even when removing the respondents from the Eclipse IoT community, the top 3 languages are C, Python and Java.

languages

  1. MQTT and HTTP are the dominant message protocols.Without a doubt MQTT has become a pervasive and widely used protocol for IoT. HTTP being the other protocol.
    The other messaging protocol supported in the Eclipse IoT community is CoAP. It did not receive as much support, but it does appear to have support in certain industries. For instance, the use of CoAP increases if the respondent is in the IoT Platforms or Smart Cities industry. The fact IoT Platforms are supporting CoAP is expected and a good thing. It does seem Smart Cities industry is using CoAP but I am not sure where or how. If anyone has details, please leave a comment.As an aside, the success of MQTT is a testament to IBM’s strategy to standardize MQTT at OASIS and start the Eclipse Paho project. It really is a perfect case study for using open source and open standards to gain broad industry adoption. For example, 1) MQTT is now supported by IBM Bluemix, Amazon AWS IoT, MS Azure IoT, plus every other  IoT middleware platform in the market, 2) the new Arduino board is also using MQTT to communicate with their cloud, and 3) Eclipse Paho and Eclipse Mosquitto are some of the most popular and active projects at Eclipse. MQTT is everywhere. Well done IBM.

protocols

  1. Linux is the dominant IoT operating system. Over 70% of the respondents claimed they use Linux for their IoT operating system. The next more popular section at 23% was No OS/Bare metal. In the last number of years, a number of new IoT operating systems have been introduced (ex. ARM mbed, Contiki, RIOT, Zephyr) but the adoption still hasn’t materialized. It seems many companies are using Yocto to create their own Linux distro for their IoT solution. It will be interesting to watch how these other operating systems grow in comparison to Linux.

os

  1. Amazon leads in IoT cloud services. Not terribly surprising Amazon came out on top as the top cloud service provider. However, Private/On premise was a close second so I think this is an indication that IoT cloud services is still in its infancy. What did surprise me was that Microsoft Azure was number 3 in the survey and does even better when a company has a deployed solution. This seems to reflect MS Azure’s heavy emphasis on IoT use cases.

cloud

  1. Open source is pervasive in IoT. I strongly believe open source is critical to the success of the IoT industry. Therefore, I was encouraged to see 58% of the respondents are actively engaged with open source. I think it is a great statement on the work we have been doing at Eclipse IoT to create an open source community for the IoT industry.

 

Trends between 2015 and 2016

This is the second year we have done this type of survey so I was curious what has changed between 2015 and 2016. Interestingly enough, not a lot has changed. Many of the trends and highlights mentioned above are consistent with the 2015 results. This consistency would appear to confirm that the results are a good reflection of how developers are building IoT solutions.

Thank you to everyone who participated in the survey. We definitely appreciate your input. The complete results are available on slideshareand the raw data in xls and ods format. Feel free to leave a comment or contact me if you have any questions.

Read more…

The 5 Point Plan for IOT Recruitment

In The Great IOT Recruiting Rush, I introduced the industries that are heating up and the single main skill for the successful IOT practitioner. Here, I give you a targeted checklist for IOT recruiting.

Earlier this month, I published a post about which industries were heating up in IOT recruiting. Obvious players like IBM and Cisco topped the list, of course, but, increasingly, non-technology companies are joining the IOT hiring frenzy.

With all of this going on, it’s quite challenging to nail down the skills that a top IOT recruit will need. Of course, many of these are industry-specific or specifically outward facing (customer experience and wearables) or inward facing (M2M connectivity that extends out to others in the supply chain but stops at the customer service portal). As I place people in this brave new world, I have identified several key traits that they must possess. I’ve come up with a five-point plan so that you can not only use these traits to make your next hire—but to make the next hire that fits with your culture and IOT strategy.

1) Business-Centric

You’ve heard that every business is a digital business, right? Well every IOT person is a business-person first and foremost as a result. Make sure your recruits can interact with business partners effectively (ask what projects they’ve worked on and about the length and depth of their interaction with its executive sponsor) and the business problems that they have solved with their IT prowess.

2) Cloud-Creator

Even if the candidate has only worked on so-called terrestrial IT projects, take the time to understand how deep her understanding is of cloud-based technologies in her industry. If you’ve got an entry-level IOT person, they may not have much experience in the IOT—but they should be able to converse intelligently about Cloud-based systems and the business opportunities they hold.

Your senior people will probably have a wider view, with an awareness (if not a command) of what’s going on in the Industrial Internet and the customer-facing nodes on the IOT. At the end of the day, creating cloud-based business solutions with links to machines, systems or objects is what it’s all about.

3) Security-Minded

One of the biggest issues is the security threats inherent in the IOT. Your junior-to-senior level people must have a firm grasp of data security in their industry—and must be actively involved in following the ways that the IOT community is battling them.

4) Emotionally-Intelligent

Here’s one I get all of the time—“people who are great at leading IOT strategy aren’t necessarily the most personable of people.” That’s simply not true. The IOT consultants and professionals I work with are aware that they are part of a business ecosystem—and that their success boils down to not only survival of the fittest but the survival of the most collaborative, the most innovative, the most respectful of what others in the organization bring to the table. Listen, your IOT projects might be the priciest items on your CEO’s docket this quarter. And where there is much opportunity, a ton of budget and a lot at stake (market differentiation anyone?) there are going to be some interpersonal challenges to overcome. Find out if your prospective recruit can tell you about a “people-problem” he solved or ask about “a time when you had to play politics at work.” This is code for a time when they had to use EI skills to get something done.

5) Incisive-Innovator

I am tired of the cliché about the unbalanced, uber-creative innovator (you know, the nutty professor type) not being able to buckle down and get things done. Your IOT recruits should have big ideas but the ability to place their attention on the minutiae of a key IOT project. These skills are not mutually exclusive in the best candidates I’ve seen. In fact, the innovators are often the best at making sure they have team members who love to juggle the details—and know when to escalate a problem to the appropriate person. Ask if your candidate has had the opportunity to bring an idea to the project phase and how it went. Also ask about what he thinks the “next great IOT frontier” might be. If he is not thinking about this, he’s not energized by his own industry. And those are the people who can drive IOT change for you.

If you want help finding the people who encapsulate the skills (dare we say gifts) that will supercharge your IOT strategy, Click here to schedule a call.

Follow me on LinkedIn and Twitter, as well.

Read more…

What options do you have for remotely monitoring Water and Fluids with Industrial IoT sensor telemetry?

IIoT or Industrial IoT (Internet of Things) is everywhere. It’s across all industries, from high tech transport, to natural resources and governments. IIoT software and hardware is deployed for numerous, varying applications, and it’s critical to understand just what the customer needs. Especially since the customer can’t always articulate exactly what the remote monitoring and sensor telemetry should do. According to a study performed by Verizon: the worldwide Internet of Things market spend will grow from $591.7 billion in 2014 to $1.3 trillion in 2019. That’s tremendous.

One of the areas that we’ve seen recent growth is water and fluid monitoring. Water comes to us as a life sustaining asset and also as a force of destruction. The utility of water needs to be measured and monitored in order to effectively and efficiently use our greatest natural resource. Similarly, monitoring the destructive force of water can be just as important. Let’s talk about the different ways that you can measure and monitor water!

 

Flow Meters

Flow meters calculate the amount of water that flows through them. Flow meters are everywhere from your house to your office, to anywhere and everywhere water is used. Measuring water flow is a need recognized across industries, from agriculture to commercial, pharmaceuticals, and oil and gas. Flow meters in an IIoT solution provide not only a total flow amount, but allow you to utilize real time data to predict and adjust consumption. Further still, real time analysis allows immediate recognition of catastrophic events such as a burst pipe. The analysis will be drawn out further to establish predictive failure behavior and potentially prevent massive water loss issues like the ones that happened in Los Angeles and Hollywood Hills.

 

Water Detection

Almost certainly this one is all about protecting assets. There are essentially four ways that we have used to detect presence, quantity, volume, and levels of water. Each of these fits quite well for a particular purpose. They also compliment each other nicely!

 

Presence of Water: The Rope Sensor

Rope sensors are great and they come in a variety of lengths. A rope sensor will tell you if you have water present at any point along the sensor. Imagine a large trailer with rope sensors running along the bottom of the trailer. If you have a spill in that trailer, truck, or vehicle and any fluid reaches the rope sensor, then you’ll receive an alert and immediately know there’s a problem.

Rope sensors are also great for flood detection. Because you can purchase these sensors in practically any length, you can lay them across a flood channel. If any portion of that rope sensor gets wet then you know you have water present. However, in terms of flood detection rope sensors will tell you if there is water, but they won’t tell you how much.

 

Presence of Water: Yes or No

If your rope sensor went off on a flood channel you might want to know how much water is flowing through. Depending on the lay of the land there are a number of different applications that we use to provide this information.

 

Ultrasonic, Ultrasound, Pulse, and Radar Sensors

If you have a fixed structure next to or going over a flood channel then a great solution is an ultrasonic sensor. Essentially, once the sensor is fixed in place it will continuously ping the ground. When the reading between the sensor and the ground becomes more compact, you can calculate that distance and in turn determine how much water is flowing through the channel and the flood level. Also note that radar and ultrasonic fluid level sensors are quite useful for remotely monitoring levels and volumes of liquid products in assets like tanks!

 

Pressure Transducers

Another way that we have measured quantity of water is by using a pressure transducer. A sensor with a membrane sits at the bottom of a water well, lake, or a reservoir, or a flood channel. As the water increases above the sensor so does the pressure on the sensor’s membrane. The higher the pressure the more water you have moving through!

 

Making things Digital

Water metering and water detection are now all IIoT solutions. All of these meters / sensors connect to sensor hub connector hardware that sends data out into the internets and into a cloud data analysis solution. Whether you’re monitoring agriculture / viticulture, oil / gas / mining, municipal water treatment facilities or other water plants, nowadays you can obtain a cost-effective, rapidly deployable monitoring solution.

 

 

Read more…

Bi-Weekly Digest, April 15th

Starting this week, we're going to compile the best of IoT Central membership content in our new Bi-Weekly Digest. If you're interested in being featured, we always welcome your contributions on all things IoT Infrastructure, IoT Application Development, IoT Data and IoT Security, and more. All members can post on IoT Central. Consider contributing today. Our guidelines are here.

Featured Articles

How Will Big Data and IoT Shape the Future of Apps Market? 

By Marcus Jensen

Technological advancements and the surge of mobile platforms have announced the new era of global economy, and the booming app market is expanding with lightning speed. Big Data has a powerful influence on business operation on a global scale, although the rates of adoption are not that convincing. What is more, the advent of the Internet of Things (IoT) means that it will not be long before all household items are equipped with wireless capacity. For an app market, which relies heavily on knowledge and data, particularly user feedback, this has strong implications. It is time to think big in terms of data.

IoT needs automated, hardware-based, localized machine learning for wider deployment and usage

By Asim Roy

As we move towards widespread deployment of sensor-based technologies, three issues come to the fore: (1) many of the these applications will need machine learning to be localized and personalized, (2) machine learning needs to be simplified and automated, and (3) machine learning needs to be hardware-based.

IoT Guidelines Need to Ask Less of Device Manufacturers

By John Berard

The Online Trust Alliance (OTA) has been at the forefront of helping build consumer confidence in the technology products that have helped remake our day. So, it was no surprise it moved to create a set of guidelines around the products and services that are part of the Internet of Things (IoT).

How the IoT will Impact Businesses in 2016

By TechJB

The Internet of Things has been labeled as the next ‘Industrial Revolution,’ by many experts that have predicted how it will be able to change the way various industries, businesses, consumers, and even governments, interact with the physical world in the future. Here are other ways on how the IoT will impact, challenge, and change business in 2016.

10 Case Studies for the Industrial Internet of Things

By David Oro

It’s still early days for the IoT but everyday a little part of its burgeoning ecosystem becomes a factor in our lives, whether we know it or not. From industrial tools to farming to cities to grocery aisles and everything in between, the IoT is there. Here are 10 IoT case studies that show just where some of these technologies and applications are being applied.

There will be EXACTLY 18.995 billion connected #IoT devices by 2020

Guest blog post by Eduardo Siman

If you follow news about the Internet of Things, you will have read quite a few articles that attempt to predict the number of connected devices by the year 2020. Eduardo breaks it down with this chart. 

Additional Links
Read more…
RSS
Email me when there are new items in this category –

Sponsor