mardi 15 décembre 2015

Is the DYI (Do It Yourself) approach in IOT or IIOT (Industrial IoT) a risk?

About the lethargy in adoption of the Internet of Things (IoT) by the enterprise sector, there are some confirmations to a long-standing suspicion.  There is reasonable consensus across the industry analyst community that a significant number of Fortune 1000 players are working to home-grow their IoT solutions.  In that case many enterprises risk being trapped behind the innovation curve, the consequences of which could be very serious given the strategic importance of the Industrial IoT (IIoT).  Moreover, the do-it-yourself is unlikely to succeed, and if it does, the time span will be too long. In both cases the opportunity will be lost.

This is not a static scenario.  In the last year or so we have witnessed a glut, over 250 at the last count, of IoT platforms from new entrants and this has muddied the waters.  Despite the marketing claims, these platforms do not enable quick fix solutions.  IIoT solutions are complex, more complex than those of M2M since they involve IT (Information Technology), the enterprise domain, and OT (Operational Technology), the M2M domain, where different technologies and cultures prevail.  This means that there is a divide, but it shouldn’t be seen as a chasm.  The objective is to create a unified IT / OT environment in such a way that the OT domain appears to be a seamless extension to the corporate network.

A new report from ABI Research, a top-tier analyst firm, indicates that only 10 percent of enterprises have deployed IoT technologies extensively. Part of the hesitation is due to data security, privacy issues and funding challenges. But once companies decide to invest, the number of choices and the diversity of technologies, suppliers, platforms and architectures are slowing down enterprise IoT adoption. The report goes on to consider the benefits of a new model of integrators/Architect.

Sources :  TelIt, ABI Research, Rockwell automation

Enterprises, will you own your IOT datas?

IoT architectures can supply both the raw material as well as sophisticated real-time and historical analytics that shape and guide those intelligent business decisions. However, the analytics will normally be performed by third-party partner organizations such as SAS, Oracle, or IBM that have authorized access to these information gold mines. Your integrator/partner analytics tool should be agnostic and the company’s cloud-read modules should provide seamless transfer of data from the field to the Cloud Platform, therefore facilitating the flow of data. Do you want Google, Oracle, SAS, Salesforce to own your data?
If we look ahead to the time when we take this development for granted, we can anticipate ownership of the data to become an issue. When it becomes a valuable resource Intellectual Property can enter the equation along with corporate lawyers.  Example: the Connected Car is one of the many commoditized devices that provide access to users’ online data and profiles.  So does Silicon Valley, insurance company or user own this data?  On the other hand it opens up access to new revenue and profit streams for OEMs and new entrants, so will the car manufacturers keep control? Time will tell.

Sources : Telit, Gartner
Key words : IOT data, data Owner, Privacy, IOT new economy, 

lundi 14 décembre 2015

Insecure surveillance technology

How insecure surveillance technology is working against you
Researchers made a survey on how we are controlled and how cameras deployed in towns can help citizens. They discovered that all these video datas were not safe or protected. 

Today most of people agree to be filmed for safety reasons, even if sometimes our privacy is sacrificed. We are safe from criminals however we expect that our private data will be handled and protected.

Some researchers came across some cities that use wireless technology for security cameras and infrastructure. They found out that wireless technology is not secure and handling data in this manner could potentially be vulnerable to attacks.
Although wireless technology itself can be vulnerable, there are still many additional improvements which can be implemented to secure these networks. Ideally, there should be many levels of security in place, so if a hacker clears one hurdle, he must then face a greater challenge at the next. However that was not the case in this instance.

To protect our data it will be necessary to deploy a mesh network: 

First things to do are:
·         To secure authentication with a strong password (automatic generation is best)
·         To hide SSID and MAC addresses
·         To hide equipment from hackers 

·         Use cryptography and make the videos difficult to use
Internet of things is a multitude of objects, people or even animals with only one identifier and transfer data over a network. Communication is made without human, only technology is use.

If we are used to say a thing, it can be an animal, car, person, home, clothes etc...
Cisco systems estimates that approximately 12.1 billion internet connected devices in 2014, and that figure is expected to zoom to above 50 billion by 2020.
We also know that at this moment 100 things currently connect to the internet every second ad it will increase to 250 per second by 2020.
Evolution of Internet of things never stop, researchers and engineers don't lack of imagination. They know that we can use connected objects in every situation of lifestyle.
Economy of internet of thing is obviously increasing, many firms are created. French company Withings is a leader on conected objects market. Differents type of objects : Watches, cameras, scales etc...
Internet of things is specially for particulars, but firms are more and more interested on it. Mangers want to motivate theirs employees with connected objects, create healthy communities, fun and engaging experience.