Episode 67

They say data is the new oil. Well if that’s the case, then like oil, crude data must be refined and packaged to make it useful and consumable. If you believe, like I believe, that all incremental value from an Internet product comes from transforming its data into useful information, then external sources of data, when combined with internal data, can become very valuable, indeed.
Listen to this podcast (or read the transcript) where I speak with David Knight about third-party data markets and syndicates ...

Episode 66

It takes a lot, and I mean a lot, to get me to download yet another app on my phone, especially one that’s going to try to sell me something… but, I’m open to Retail-IoT tech. I’m not much of a physical shopper, probably because I find the whole shopping experience so dreary, but this so called offline-online convergence within retail has piqued my interest.
Listen to this podcast (or read the transcript) where I speak with Oleg Puzanov about proximity marketing and where it’s headed with IoT ...

Episode 65

If you’ve been listening to my show for a while you know I’m a lover of IoT platforms. It just doesn’t make sense to create your own plumbing from scratch – especially since there are so many beauties to choose from that sport business models that are so agreeable early on. But what about open source platforms – are they ready yet for primetime?
Listen to this podcast (or read the transcript) where I speak with Hans Scharler about where open source platforms are today, and when it makes most sense to use them ...

Episode 63

We all know, whether from experience or just intuitively, that bolting security on an IoT product after much of the development has been completed is a total rookie mistake, and a recipe for disaster. Yet this still happens. By crowdfunded startups who don’t mention security in their videos, to internal teams in larger enterprises who also emphasise the bling in order to get their project greenlit from within.
Listen to this podcast (or read the transcript) where I speak with Chris Romeo about the Security Development Lifecycle, the polar opposite to the bolt-on, that’s been successfully used in IT security for years ...

Until recently we could perform Internet of Things computations in four general areas: We could compute in an external cloud, which means on one or more servers in a data center somewhere remote. We could compute “on prem”, which means on one or more servers in the enterprises’ local network. We could compute in the fog, which means on a gateway in the OT (Operational Technology) network or on a router or switch or some other network node in the IT (Information Technology) network. Or we could compute within in the IoT device or product, which means on an on-board embedded device.
Watch this video (or read this transcript) to see Jurgo Preden discuss the state of the art in Mist computing ...

Episode 62

Repeat this mantra: Privacy by Design, Privacy by Design. Although, Security by Design is a best practice followed by IoT companies in the know, its business counterpart, related to risk, isn’t chanted nearly as often as it should be. Privacy by Design should be repeated with every second breath. In this episode of the IoT Business Show
Listen to this podcast (or read the transcript) where I speak with Paul Plofchan about Privacy by Design and other privacy best practices ...