IOT CATEGORIES
MOST POPULAR TAGS

CONSUMER IOT


There’s a lot to developing wearables that doesn’t meet the eye. To build a wearable and the business that supports it you must recreate its creator. As with any IoT product, the skill sets needed, namely software development and data science, are more often than not, not part of the organization’s gene pool or culture. To become an IoT company each company must go through a deep tech metamorphosis to get there.
Watch this video (or read the transcript with Scott Amyx about wearables and the corporate transformation required to build, sell and support them ...


Because of where we are in the evolution of Internet of Things systems it’s not possible to simply bolt on a firewall or Intrusion Detection System. Unlike in IT, in IoT, security must be considered from the beginning as part of the product/system design. But it doesn’t mean we can’t apply some of the same techniques used by our IT brethren. Take for example network traffic analysis. It’s a hot IoT security trend that I’ve written about before but now it’s not just start-ups that are getting into the act - large companies like Symantec are planning to bring all their experience in security analytics to bear on the foes of IoT.
Watch this video (or read the transcript with Brian Witten about intrinsic security, security analytics and his four cornerstones of Internet of Things security ...




Episode 33

The more I dig into it, the more I’m convinced that privacy is a bigger issue than security in IoT. Don’t get me wrong, the challenges facing IoT security are huge and in many cases, unchartered but, we’ll figure them out. Why? Because we’re good at figuring out tech. What’s going to be more challenging is teasing out the rules of engagement from the tangled web of IoT privacy. This involves people, companies, special interests and the law – much more difficult and with huge business implications.
Listen to this podcast (or read the transcript) with privacy philosopher Justin Klein Keane about the challenges we face and some mental frameworks in which to consider them ...




Episode 32

We speak about our offensive game so much that we forget that we need good defense in business too, that is, effectively protecting the value we create. However, and I speak from experience, the shiny new things seem so much more important than the seemingly dull security and privacy. Well, when looked at from a risk perspective, security and privacy all of a sudden becomes the purview of the manager.
Listen to this podcast (or read the transcript) with Paul Dant about IoT risk assessment as well as security by design, threat modeling and other important topics to the manager ...




Episode 31

Although an integral part of IoT security, IoT privacy doesn’t rely on technology. It relies instead on self-imposed business rules that govern the way the collected data is used within and outside of the enterprise. As with many things tech, government and law is unable to keep up with the innovation of IoT and with what some call its digital exhaust.
Listen to this podcast (or read the transcript) with privacy expert Dale Smith about the top 5 best practices in handling personally identifiable information (PII) and other IoT privacy issues ...




Episode 30

It’s difficult enough to manage network security or web security or application security or mobile security but when they all come together you have the Frankenstein-like monster called IoT security. And when they all come together you have the unique challenges of security system security too – welcome to IoT.
Listen to this podcast (or read the transcript) with Daniel Miessler about the top security risks facing IoT and how to mitigate them. This is part two of a two part interview ...




Episode 29

It’s difficult enough to manage network security or web security or application security or mobile security but when they all come together you have the Frankenstein-like monster called IoT security. And when they all come together you have the unique challenges of security system security too – welcome to IoT.
Listen to this podcast (or read the transcript) with Daniel Miessler about the top security risks facing IoT and how to mitigate them. This is part one of a two part interview ...




Episode 27

Descriptive analytics is nothing new, however IoT is applying evolutionary forces to make it adapt to unstructured sensor data and evolve into a mechanism of discovery rather than report generation. Tools that blend traditional business intelligence, analytical modeling and visualization now help data scientists discover the story behind the data which can lead to valuable insights for the enterprise.
Listen to this podcast (or read the transcript) with Dave Rubal about how to apply descriptive analytics to your Internet of Things ...


The future of UX, in certain segments of Consumer and Infrastructure IoT, will be driven by storytelling and emotions. When technology disappear, it’s replaced by magic – resulting in far stronger experiences – an experiences that want to be relived time and time again. Two examples are the Roomba vacuum by iRobot and the Disney theme park magic band. And did you know that many owners of expired Roombas can’t bear to throw them away, even after they’ve been replaced? Talk about product loyalty or is that love?
Watch this video (or read the transcript) to see Matias Rodriguez describe a future of Internet of Things UX for consumer and infrastructure IoT designed to maximize user engagement ...