Table of Contents
Ideas & Opinions Searching for a Skilled Workforce IoT in IT Robots in Disguise SoftBank Makes a Big Buy Building IoT Together Home Design for IoT Cradlepoint Acquisition Sparks Innovation Pokémon GO Adds to Distraction! IoT Lays Down the Law Ask Us Will AI disrupt healthcare to the point that robots replace human doctors? LTE Corner Can Voice Capability Enhance IoT and M2M Applications? In Focus Addressing Healthcare Access Issues with Telehealth In Focus Enabling In-Flight Connectivity Look Who’s Talking IEEE senior member and the professor of Electrical Engineering and Computer Science at Syracuse University Back to the IoT Basics Cover Story – Can businesses wield such an unwieldy beast? 2016 Women of IoT in Marketing Connected World has launched the 2016 Women of IoT in Marketing, a sister list to the annual Women of M2M Academia Provides Fresh IoT Perspective Rapid, radical, relentless innovation and cultivating IoT talent will drive adoption in enterprise. One Slice of the Big ‘Big Data’ Debate Companies should use the “mom test” and follow the Golden Rule when using customer data. Security What’s Worse: Stolen [...]
Keeping our personal data secure can be a challenge. Let’s face it, it’s frustrating trying to remember long, strong passwords for every login. Just imagine living in a 50-room mansion, but every single door locks when you close it and you have to remember what every key looks like before trying to unlock any of the doors—not fun. But things are starting to change in a big way, thanks to some biometric technology. In his book, Future Crimes, author and FBI and Interpol adviser, Marc Goodman shares some amazing biometric projections. He noted that by 2019, biometrics are expected to exceed billion with some half a billion biometric scanners in use globally. But is this biometric future already here? Fingerprint Is my Passport If you are an Apple iPhone user (there are now more than 1 billion iPhones on the planet), you are likely unlocking your phone using Apple’s Touch ID. Apple includes a processor in every iPhone that contains an encrypted secure enclave. It stores all of your personal and private data including your unique fingerprint pattern but only on your device (not in the cloud) and is (almost) impossible to reverse engineer. Of course this fingerprint scanning can be bypassed entirely by the pass codes [...]
Companies should use the “mom test” and follow the Golden Rule when using customer data. How much data exists in the world? How much of it is being used? How much of it could be used? How much of it should be used? These are questions wrapped up in the discussion of Big Data, an admittedly over-used term that is often synonymous with centralizing enterprise data resources for analysis, regardless of size. In fact, perhaps more important than size in many Big Data discussions is the value and “actionability” of the data. Tech research firm Gartner, www.gartner.com, provides this definition: “high-volume, high-velocity, and/or high-variety information assets that demand cost-effective, innovative forms of information processing that enable enhanced insight, decisionmaking, and process automation.” “Way too often, there’s an assumption that if we can collect it, we should, and if we do collect it, we should keep it. Data is a very dangerous asset.” –Clifford Lynch, CNI For Craig Danton, head of commercial at Enigma Technologies, http://enigma.io, which helps organizations and individuals fuse, organize, and explore data to make smarter decisions, the huge opportunity in Big Data is the ability to link data sources and use them outside of the original context [...]
The number of mobile connections, including M2M (machine-to-machine) connections, exceeds 7.7 billion, according to the GSMA, www.gsmaintelligence.com, while global population according to the U.S. Census Bureau, www.census.gov, hovers around 7.3 billion. This reality, in which there are more machine connections than human beings, is relatively new in the history of the world.
In M2M and the IoT (Internet of Things), “the sell” is incredibly important. In order for more companies in more vertical markets to benefit from the IoT, they first have to understand it. In many cases, this is easier said than done. This is why Connected World has launched the 2016 Women of IoT in Marketing, a sister list to the annual Women of M2M, which recognizes 42 top women executives who are paving the way in M2M and the IoT.
While much of the mainstream conversation about the IoT (Internet of Things) focuses on consumer applications of the technology—such as home monitoring, connected-car solutions, and wearable health devices—there has been a decades-long digital transformation taking place in the enterprise space. The IoT is helping businesses solve long-standing problems often related to improving operational performance and reliability. However, the persisting reality is that not everyone “gets” the IoT.
For better or for worse, being in between two places—for instance, on the road, in the air, or at sea—is no longer an excuse for not being connected. Inmarsat, www.inmarsat.com, a satellite communications solutions and services provider, and Deutsche Telekom, www.deutschetelekom.com, are responding to industry demands for reliable, in-flight Internet access on high-traffic flight paths across Europe by developing the EAN (European Aviation Network). The EAN is a combined satellite and LTE (long-term evolution) ground network that will offer a high-quality, high-speed broadband service similar to what passengers can experience on the ground. Thales, www.thalesgroup.com, a provider of aerospace equipment and systems, will play a crucial role by outfitting European aircraft with CGC (complementary ground component) terminals that connect to a ground-based 3GPP LTE network. Thales has selected chipset technology from Sequans Communications, www.sequans.com, to power these LTE access devices. In building wireless broadband access terminals for the EAN, Thales required exceptionally robust LTE technology thanks to the rigorous requirements of the project. To meet these requirements, Kimberly Tassin, Sequans’ director of marketing communications, says the 4G chipset provider went above and beyond. She says: “Sequans adapted its LTE chipset technology to meet the specialized requirements of this in-flight network [...]
The large rural population in South Carolina, coupled with a growing physician deficit, has prompted healthcare systems such as MUSC (Medical University of South Carolina), www.muschealth.org, to rethink how they can provide the best possible care to their communities. Telehealth technology solutions can help bridge care gaps by providing more people across the state with access to healthcare.
Look Who's Talking
Guest: Kevin Du, IEEE senior member and the professor of Electrical Engineering and Computer Science at Syracuse University, www.syr.edu. Kevin Du, IEEE senior member, professor of electrical engineering and computer science, Syracuse University explains 80% of Web applications have vulnerabilities and there is no way to protect systems 100%. With a PhD from Purdue University and his research interests including computer and network security, smartphone and mobile-system security, and Internet security, Du shared some very unique observations on The Peggy Smedley Show, this past month. In mid-July Du sat down with host Peggy Smedley to discuss cybersecurity and the idea of moving the elections online in the future. But he admits the elections would most likely be compromised without the appropriate security. To hear this interview on The Peggy Smedley Show in its entirety, log onto www.peggysmedleyshow.com, and select Episode 462, (07/19/16) from the archives. Smedley: Why are we having so many security problems? We hear about security breaches almost every day, and it doesn’t seem like we’re making any progress… I know we’ve got really smart people out there, and you’re one of them, how do we combat these bad guys? Du: When I first started computer security, dating [...]
It may seem counter to our perceptions of M2M (machine-to-machine) communications that voice could be an aspect of these data-oriented applications, but in machine-to-human and human-to-machine communications such as command, control, and alerts, voice can be not only very useful, but cost-effective.
Q: Will AI disrupt healthcare to the point that robots replace human doctors?
IoT in it
Robots in Disguise While robots aren’t taking over the world anytime soon, they are expected dominate the IoT (Internet of Things) market for years to come. In a recent report from Technavio, www.technavio.com, analysts predict the global smart robotics market is set to increase by a staggering CAGR (compound annual growth rate) of 20% in 2020. The need and rising demand for smart robotics has risen out of the growing smart-city initiatives that major metropolitan areas have been undergoing in recent years. There has also been a desire to create more efficient factories and warehouses. Using robotics and the IoT allow for better collaboration and organization across many areas of industry. The benefits have already been realized in the automotive industry. With the help of KUKA, www.kuka.com, a robotics manufacturer in Japan, Chrysler’s Jeep Wrangler plant saw cars being produced nearly every minute and the move toward seamless 24 production. As leading organizations make the transition to robotics, research also suggests smart robotics are not just useful for the big buys. Three segments in the smart robotics market have emerged with personal service robots making up the largest portion of sales with 67.87%. Now, things like self-service stations and kiosks [...]
In a Nutshell
For as long as I can remember, I have been an advocate of new technology adoption, and have personally been on the “bleeding edge” of implementations. One can understand that standing up a new system involves trial and error, and a lot of “working out the kinks” to ensure that when the system went live, it delivered the results as promised. To this day technology implementations, especially for large-scale systems such as consumer finance and industrial automation, incorporate “user acceptance testing,” which means that over the course of weeks and sometime months before the system “goes live” it is continuously tested, tweaked, updated, and reviewed. The decision to “go live” is based on the empirical evidence at the end of user acceptance testing that it is useable with the intended audience. After implementation, acquirers of the system typically have 24/7 support from the provider of the technology. If there is more than one provider in a multi-technology system, contracts specify which of the providers has first call responsibility. As you would expect, issues that arise that affect the ability of the intended audience of the system are quickly resolved. Down time must be minimized because of loss of revenue and [...]
We’ve all read the numbers. We’ve all heard the hype. We’ve all wondered what it means for the IoT (Internet of Things). In the end, whether you believe Gartner or IDC, there’s no doubt you are scratching your head right about now questioning the implications of all these wild growth predictions that for more than a decade have not yet met expectations for the IoT. If you are struggling to understand the IoT growth curve, you are not alone in your assessment. There has been a lot of discussion about the growth of this burgeoning market. While many analysts are doing their best to make growth estimates, there are always those analyst firms that are paid to shoot for the moon. Sadly it’s these murky predictions that make it very hard for organizations to get a real handle on determining investments for both the short term and long term. For instance, we affectionately have called this sector, M2M, Big Data, now IoT. But in the end, what we really need to understand is how will our workforce manage all this information in a meaningful way during all this rapid growth? The real question is do we have the people who [...]