IOT CATEGORIES
MOST POPULAR TAGS

1. IOT COMPONENTS




Episode 41

Like the last episode, this show is going to be a little different.
Listen to this podcast (or read the transcript) where I’m going to discuss and analyse each episode to date, in an effort to guide you to the episodes that match your interests or where you are in your research into IoT ...




Episode 40

This show is going to be a little different than the 43 that preceded it.
Listen to this podcast (or read the transcript) where I’m going to discuss and analyse each episode to date, in an effort to guide you to the episodes that match your interests or where you are in your research into IoT ...


The digital twin, as GE refers to it, or the software-defined product (SDP) as I teach it, is the critical component of incremental value generation in the Internet of Things. It’s always overlooked at the expense of the shiny things… and that’s a mistake. The digital twin or SDP is central to the IoT product/system/environment – interrogated by the product app and worked on and improved by analytics – it is the place to start when defining your IoT product requirements.
Watch this video (or read the transcript) to see Hima Mukkamala explain the importance of the digital twin and to put it into the perspective of the IoT platform ...


There’s a lot to developing wearables that doesn’t meet the eye. To build a wearable and the business that supports it you must recreate its creator. As with any IoT product, the skill sets needed, namely software development and data science, are more often than not, not part of the organization’s gene pool or culture. To become an IoT company each company must go through a deep tech metamorphosis to get there.
Watch this video (or read the transcript with Scott Amyx about wearables and the corporate transformation required to build, sell and support them ...




Episode 34

I’m sold. In fact I’ve been sold since early 2014 when I first started digging into the emerging Low Power Wide Area (LPWA) market. I’m sold not because it’s cool tech – I’m sold because its affordable. The price makes business sense for a wide range of IoT use cases – some we’re familiar with and others we haven’t even considered yet due to current cost structures.
Listen to this podcast (or read the transcript) with Hardy Schmidbauer of the LoRa Alliance and Thomas Nicholls of Sigfox about what LPWA is and the different ways it’s sold ...


Because of where we are in the evolution of Internet of Things systems it’s not possible to simply bolt on a firewall or Intrusion Detection System. Unlike in IT, in IoT, security must be considered from the beginning as part of the product/system design. But it doesn’t mean we can’t apply some of the same techniques used by our IT brethren. Take for example network traffic analysis. It’s a hot IoT security trend that I’ve written about before but now it’s not just start-ups that are getting into the act - large companies like Symantec are planning to bring all their experience in security analytics to bear on the foes of IoT.
Watch this video (or read the transcript with Brian Witten about intrinsic security, security analytics and his four cornerstones of Internet of Things security ...




Episode 33

The more I dig into it, the more I’m convinced that privacy is a bigger issue than security in IoT. Don’t get me wrong, the challenges facing IoT security are huge and in many cases, unchartered but, we’ll figure them out. Why? Because we’re good at figuring out tech. What’s going to be more challenging is teasing out the rules of engagement from the tangled web of IoT privacy. This involves people, companies, special interests and the law – much more difficult and with huge business implications.
Listen to this podcast (or read the transcript) with privacy philosopher Justin Klein Keane about the challenges we face and some mental frameworks in which to consider them ...


Most of what we read about IoT security and privacy is doom and gloom. I get it, playing on people’s fears is a proven way to get a click. Well there’s some good news too. Losing the typical UI for authentication and authorization can improve security. For example, machines don’t care if they must use 128-bit passwords. And since IoT devices are relatively simple, their traffic patterns are more predictable and therefore easier to examine for security breaches.
Watch this video (or read the transcript) to see May Wang describe the current state of security and how her start-up analyzes traffic patterns to make IoT safer ...




Episode 31

Although an integral part of IoT security, IoT privacy doesn’t rely on technology. It relies instead on self-imposed business rules that govern the way the collected data is used within and outside of the enterprise. As with many things tech, government and law is unable to keep up with the innovation of IoT and with what some call its digital exhaust.
Listen to this podcast (or read the transcript) with privacy expert Dale Smith about the top 5 best practices in handling personally identifiable information (PII) and other IoT privacy issues ...