IOT CATEGORIES
MOST POPULAR TAGS

Author: Jane A




Episode 37

Alright, let’s talk building an IoT product or system. Time to cycle through concept – ideation – proof of concept – prototype – MVP – product.
Listen to this podcast (or read the transcript), part one of two, with Yuriy Pryadko who shares practical advice on the 6-step journey to manufacturing or deployment. In part one we lay the foundation using an interesting example of an IoT system in the Fitness space, prepping us for episode 2 where we quantify the process ...


Is it in the billons or trillions? I can’t remember how many sensors there are supposed to be in 10 or is it 20 years. We get so many different predictions of the number of things in IoT it’s mind-numbing. Mind-numbing in that it’s hard to comprehend the size of the numbers being tossed around and mind-numbing because in trying to outdo each other, pundits count things differently.
Watch this video (or read the transcript) to see Dean Freeman go up and down and across the IoT food chain sizing the food chain along the way ...




Episode 36

Ripping out an existing SCADA system and replacing it with an IoT deployment isn’t going to happen any time soon. Whether it’s an oil pipeline or a water processing plant, the job of the OT guys is to keep things flowin’. Although the writing is on the wall, it’s going to take a lot more than the promise of information nirvana to change existing infrastructure.
Listen to this podcast (or read the transcript) with System Integrator Joel Hutton about his experience in applying the thin edge of the wedge to get an IoT pilot going with his clients ...

This IoT Inc Business Meetup features Hima Mukkamala, Head of Engineering at Predix, GE Digital. Join to meet the Silicon Valley ecosystem in person or watch the stream ...


Basic IT security principles may be old school but they are still relevant in the new realm of IoT security. Case in point, Paul’s top 3 of top 5 IoT security issues: Lack of security by design Web security Basic cryptography principles Management support Customer demand
Watch this video (or read the transcript) to see Paul Dant give an ethical hacker’s perspective on the top five issues in Internet of things security and what is easy and not so easy to improve ...




Episode 35

It’s one thing to be in a kickstarter–fueled start up developing your IoT product and quite another to be doing it within a structured corporate environment. Things get in the way. Priorities, personalities, politics and executive management. The same work needs to be done but other considerations need to be taken into account.
Listen to this podcast (or read the transcript) with Jake Fields about his experience in working with IoT teams within the enterprise environment and the development steps to take to successfully make it through to the other side ...


There’s a lot to developing wearables that doesn’t meet the eye. To build a wearable and the business that supports it you must recreate its creator. As with any IoT product, the skill sets needed, namely software development and data science, are more often than not, not part of the organization’s gene pool or culture. To become an IoT company each company must go through a deep tech metamorphosis to get there.
Watch this video (or read the transcript with Scott Amyx about wearables and the corporate transformation required to build, sell and support them ...




Episode 34

I’m sold. In fact I’ve been sold since early 2014 when I first started digging into the emerging Low Power Wide Area (LPWA) market. I’m sold not because it’s cool tech – I’m sold because its affordable. The price makes business sense for a wide range of IoT use cases – some we’re familiar with and others we haven’t even considered yet due to current cost structures.
Listen to this podcast (or read the transcript) with Hardy Schmidbauer of the LoRa Alliance and Thomas Nicholls of Sigfox about what LPWA is and the different ways it’s sold ...


Because of where we are in the evolution of Internet of Things systems it’s not possible to simply bolt on a firewall or Intrusion Detection System. Unlike in IT, in IoT, security must be considered from the beginning as part of the product/system design. But it doesn’t mean we can’t apply some of the same techniques used by our IT brethren. Take for example network traffic analysis. It’s a hot IoT security trend that I’ve written about before but now it’s not just start-ups that are getting into the act - large companies like Symantec are planning to bring all their experience in security analytics to bear on the foes of IoT.
Watch this video (or read the transcript with Brian Witten about intrinsic security, security analytics and his four cornerstones of Internet of Things security ...