New research from Unisys Corporation reveals that law enforcement is expected to lead the incorporation of biometrics into wearable technology. However privacy concerns around the security of biometric data stored in the cloud need to be addressed as adoption becomes more mainstream.The survey of 54 biometrics professionals was conducted by Unisys at the Biometrics Institute Asia Pacific Conference held in Sydney, May 24-26, 2016.
The device pictured at the top of this post might look like a cute little android straight out of a science fiction movie, but looks can be deceiving. The CUJO Smart Internet Security Firewall is all business, and it has just one single mission: protect your home network and smart home devices from hackers, viruses, malware and any other potential cyber threats. In a day and age where our computers store more and more sensitive data, devices like Cujo are absolutely crucial. It takes just 3 minutes to set up and it could save you months of headaches that you would have to deal with if you ever got hacked.
The smart home is gaining ground, but it’s still a muddle of confusing standards, competing platforms, and gadgets that don’t do what you might expect. But the promise of products that can make your life a little easier is hard to resist, so I’m here to answer the inevitable questions that arise.Whether it’s figuring out the best connected door lock to assembling the right recipe to wake you up with a faux sunrise at the optimal moment based on yourfitness tracker’s data, I’ve got you covered. As the host of The Internet of Things Podcast, I install a lot of gear and spend hours testing hardware and software to see what works. Smart homes are still pretty dumb, but I want to help you feel smart.
Recent years have seen a significant evolution of the Internet of Things (IoT). It has become increasingly easy to connect devices to the Internet and send sensorial data to the public cloud. However, it’s quite evident that the adoption of IoT platforms and stream analytics within the enterprise is lagging and less prevalent. This could be associated with lack of skills required to deploy a platform and the difficulty to demonstrate value of such platforms through real-life use cases.
Cloud communications platform Twilio has announced a new cellular network partnership with U.S. cellular giant T-Mobile, called Twilio Programmable Wireless, which will provide data, SMS, and voice communications to connected devices.
Announced at SIGNAL, a developer conference on communications, the partnership expands Twilio’s platform to devices outside of Wi-Fi range, which require constant Internet service. Devices like autonomous cars, drones, or even outdoor sensors that send information in real-time back to the server should be able to use T-Mobile’s cellular service.
IoT, and the promise it offers, are edge devices that communicate with the cloud and gather big data. It isn’t a concept, rather it is a state of connectedness and system intelligence. The culmination of multiple emerging and mature technologies, IoT provides actionable intelligence to both systems and people.We typically think of the device as the embodiment of IoT, because it is most visible. But the infrastructure, the system behind the device, is where the real value lies. Without the system, the edge device is pretty much useless. Without the entire system, you cannot effectively solve a problem or affect an outcome efficiently. Without every piece, the outcome can’t be achieved.
Source: 4 Rules to Succeed in IoT
The Internet of Things (IoT) is poised to bring millions of devices online, and as many as a quarter million unique IoT applications will be developed by the year 2020. That means opportunities for skilled developers and technologists will abound. However, there are other, subtler ways the IoT will affect the job market. “We’re seeing tech companies around the globe getting organized and creating IoT strategies, but where they’re struggling is they don’t have the processes and talent in-house to make these things happen,” says Ryan Johnson, categories director for global freelance marketplace Upwork. By tracking data from Upwork’s database, Johnson and his team have identified major technology skills companies need to drive a successful IoT strategy.
In September, Jeff Smith, senior director and founding member of Incenergy; presents “Lessons Learned from IIoT Deployments” at the Smart Industry 2016 conference. Today he chats with us about the challenges and opportunities of getting started with the IIoT.
Smart Industry: What are some of the greatest lessons you have learned from IIoT deployments?
Jeff: I have learned that data input, computational power, system logic and data presentation can all live in separate locations, both physical and virtual. A
History is being made today. The Indianapolis 500—one of the most coveted and iconic races in the world—is being run in Indianapolis, Indiana for the 100th time. As if that milestone isn’t significant enough, this is also the first ever sellout crowd, and the Indy 500 is teaming up with BlueMetal and Microsoft MSFT -0.26% to launch cutting edge technology that fundamentally changes the way fans will engage with the event.One thing sports fans love is statistics. If you’ve ever watched the Indy 500, you know that there are plenty of statistics and data points to go around—fastest lap, average speed, who’s leading the race, etc. The network does the best it can to share the relevant facts and figures as the drivers make their way around the 2.5 mile oval for 200 laps. Now, you will be able to track and monitor virtually every statistic you can think of in real time thanks to Microsoft Azure and the Internet of Things (IoT).
There are two sides to the coin: security and data privacy, both of which have the potential to undermine confidence in the entire IoT concept.With regards to security, there is a whole host of situations where an IoT device or system could be compromised. Think of last year’s hacks of a Jeep on a motorway or a power station in Ukraine. Thankfully, no lives were lost in either, but it is no stretch to imagine the havoc that could be unleashed.On the issue of data privacy, few connected devices will have a user interface through which an operator or vendor can inform the user about the terms and conditions of use, where their personal data may be stored and how it may be used, and thereby gain the user’s acceptance of those terms.