Best New Uses of IoT

What are the Best New Uses of the IoT

With more than 25 billion internet connected devices expected to hit the world by 2020, it comes as little surprise that  there are multiple new uses of IoT and that more companies are embracing the evolving technology. There are quite a few companies that have created an incredible world of possibility with the IoT.

Johnnie Walker is an example of a company that one wouldn’t expect to find new uses of IoT. When a bottle of their Blue Label is open, it will send messages and information to the cellphone of the individual drinking. This is a full interactive experience that will ensure that the individual is reminded to be responsible while drinking, at the same time enhancing the experience they have.

John Deere has also created a unique experience with the IoT. With the data that their tractors and other farm equipment pulls, they can tell farmers what the nutrient and irrigation needs are of the area they are working on. This will help to produce better, richer crops for farmers, and ensure they have the best yield possible during the season.

Even the Magic Kingdom has begun to utilize the IoT. Disney World now uses RFID tags that allows users to have a better experience in the park. With their wrist bands, users can connect a payment method and purchase items just by tapping the wristband at a register. They can also check into rides and give Disney a better understanding of how people are moving in the park, and what their most popular attractions are at any given time.

Perhaps the most bizarre use of the IoT is with cattle. Farmers are now working with companies who can help them to monitor where their cattle are at any given time. This allows them to monitor herds and if someone attempts to steal a cow, the rancher is provided with detailed location in a manner of seconds to help them begin legal action if needed.

As the IoT continues to evolve, so are the new uses of IoT and the  ways that the world will use this powerful technology. It is important to take the time to consider all the possibilities out there and to expand on the potential that we have with it.

DDoS Attacks Using IoT Devices

DDOS Attack. Information Concept. Red Arrow with “DDOS Attack” slogan on a grey background. 3D Render.

Top IoT News From 2016

Illustration of a isolated smart watch icon with a 2016 sign

2016 will go down as being part of the golden era for the Internet o things. This last year has experienced incredible advancements like cars that drive themselves, and cities that actually smarter. It has also been a learning experience where major security breaches threatened us, but we worked past them, and ultimately built stronger systems. So what were some of the top stories of the year?

The first was the Mirari code. This historic attack utilized the internet of things to take down massive websites, through unsecure devices. Amazon, BBC, and other websites felt the crushing blow of this DDoS attack. When things settled down, there was still the concern of what could happen if another attack were to happen.

Our vehicles also experienced an upgrade in 2016. Several fleets of autonomous cars (or those that drive themselves) were unveiled. These cabs would provide the most effective driving experience for passengers and could cut down on accidents, and avoid delays in traffic. This means the future of getting to and from work will be incredible.  That doesn’t mean that it hasn’t gone off without a hitch the Tesla that was running on autopilot did already claim the life of one man who was in the vehicle as it drove in July.

Reactions were mixed this year in August when a pair of hackers revealed more security concerns for Jeep. While these individuals brought the information to the attention of the industry to help prevent a deadly encounter, it was still sobering for most to see just how dangerous these vehicles could be when connected to the internet of things. Fortunately, this information can be used to help establish a stronger set of code that makes it incredibly difficult for people to hack and to cause havoc on the roads.

But not everything has grey clouds over it this year. In Columbus, Ohio the U.S. Department of Transportation announced the city would receive federal funding to become a smart city. This technology would allow transportation to be more effective in the area and to ensure that the experience both residents and visitors is incredible.

This has been a year that has seen some definite improvement with the internet of things and what it can do. While the year is coming to an end, we still have 2017 to look forward to with the entire world of possibilities that it holds for us.

Ten Great DIY/IoT Concepts That Are Here & Now

The meaning behind the letters in DIY are readily understood by people. IoT does not immediately spark recognition…yet. IoT stands for “Internet of Things” and refers to the amazing connection between various devices as well as connecting things via the internet. Since the world is becoming rapidly more technologically reliant, it makes sense designers would develop new ways to connect various technologies together.

Can DIY and IoT be fused together? Absolutely! Here are ten truly awesome DIY IoT projects:

Build a Robot

Who wouldn’t want their own robot? Okay, but how do you build one? No one needs to dream of classic science-fiction works such as I Robot anymore to figure out the answer. Windows IoT allows for easily building a mini-robot – a start.

Drone via Voice

The uses for Amazon’s Echo technology is far more diverse than people realize. The technology can be integrated into drone’s allowing for the voice command of the flying device. Just don’t go hoarse trying to use it.

Maintain a Weather Station

Data about the weather comes from all sorts of different sources. Combining all those sources into one central data hub makes it easier to get weather stats without fishing all over the internet.There’s another DIY IoT methodology.

Keeping Tabs on a Car

It would be tough to steal a car if the engine was remotely shut off. A new smartphone app can control the engine ignition, air conditioner, and, in time, more. Real-time tracking of where the car is could aid in tracking the vehicle down if someone absconds with it.

Auto-Tinting for Windows

Sensors built into the windows control the tinting of the windows when a bit too much hit warms up the surface. Once the tint darkens, heat is kept out and comfort is boosted.

Facial Recognition Door Locks

Remember the talking door knocker from The Wizard of Oz? A modern high-tech version has emerged. By utilizing advanced facial recognition software produced by Microsoft, a door’s lock can open for those it recognizing. No more stumbling for keys after this system is set up.

Animal Attack Wi-Fi

This is an intriguing concept, but one people might not want to try for themselves. Adding a device capable of hacking Wi-Fi to a dog or cat’s collar is innovative, but doing so may get you in trouble.

The Magic Mirror

A fairy tale can come true in the form of a talking mirror. Building up a smart mirror allow it to display more than a reflection. The mirror can present all manner of different data including weather, news feeds, and more.

Helping Animal Life in Rivers and Streams

Microsoft Azure can track the temperatures of creeks, streams, and more allowing the system to aid in reintroducing Salmon to the waters and maintaining a proper ecosystem.

Automatic Car Wreck Response

Wow – this one could literally be a lifesaver. A communications system is hooked up to a car and, when an accident occurs, first responders are notified immediately. Such a system could help in a multitude of different serious scenarios.

These 10 are only the beginning of what is sure to be an extremely long list. A lot of DIY IoT greatness is sure to emerge in time.

The Internet of Things Timeline

The internet of things is not a new entity, though many are not aware that it has been around for a while. Modern industry and people like to add new names to an old idea to keep it fresh, but IoT is not something that just happened. It is a decades old and rapidly evolving concept.

Not sure that you believe us? Take a look at the IoT Timeline and see where it came from. Then visit our 2017 projections and see where its going.

IoT Timeline of historical events

Save

Save

Save

Is IoT Security Woefully Inadequate? Recent Events Indicate that It May Be So.

On October 21, a cybersecurity attack took place on connected devices. This attack on the Internet of things was unlike anything that has taken place in the past, and security experts fear that this historic attack is one that is only a small sample of things to come.

The attack primarily affected websites that utilized internet enabled platforms and delivered a Distributed Denial of Service (DDoS) attack. The IoT security attack took advantage of passwords that were set up by manufacturers, and had never been reset, allowing the cybercriminals a good number of systems that they could exploit.

What we’ve learned, is that there are people who are gaining a great deal of experience with impacting connected devices. So while it might seem small with a series of cameras, tomorrow it could be a power plant, or other series of devices that could result in a dangerous outcome. Companies need to be proactive and to secure their devices, and work on security updates on some of the backdoor items that criminals are finding. It is with better, more secure systems that the devices on the Internet of Things can be protected. As it stands right now, passwords and usernames can easily be stolen, and this can lead to a dangerous outcome. IoT security simply isn’t the best it can be.

In fact, doctors are even stepping in to voice their concerns about IoT security. When the latest series of attacks on the IoT came to light, Dick Cheney stated that his heart implants wireless access was disabled because of fear that someone would attack him. While the increased awareness of the threats is good, it shouldn’t dishearten those who want to break into the realm of the internet of things. All this means is that you need to take the time to explore how to make your networks more secure and work on security.

While a DDOS attack could potentially cripple a network, there are dozens of ways that you can prevent it from ever happening. That way, you can continue to utilize the system at hand, and never have to worry about a denial of service crippling your network in the process. After all, the IoT security is improving and IoT should improve your digital experience, not create a more stressful one.

Unique New Uses of IoT

With more than 25 billion internet connected devices expected to hit the world by 2020, it comes as little surprise that more companies are embracing the evolving IoT technology. There are quite a few companies that have created an incredible world of possibility with IoT.

Johnnie Walker is an example of a company that one wouldn’t expect. When a bottle of their Blue Label is open, it will send messages and information to the cell phone of the individual drinking. This is a full interactive experience that will ensure that the individual is reminded to be responsible while drinking, at the same time enhancing the experience they have.

John Deere has also created a unique experience with IoT technology. With the data that their tractors and other farm equipment pulls, they can tell farmers what the nutrient and irrigation needs are of the area they are working on. This will help to produce better, richer crops for farmers, and ensure they have the best yield possible during the season.

Even the Magic Kingdom has begun to utilize IoT. Disney World now uses RFID tags that allows users to have a better experience in the park. With their wrist bands, users can connect a payment method and purchase items just by tapping the wristband at a register. They can also check into rides and give Disney a better understanding of how people are moving in the park, and what their most popular attractions are at any given time.

Perhaps the most bizarre use of IoT is with cattle. Farmers are now working with companies who can help them to monitor where their cattle are at any given time. This allows them to monitor herds and if someone attempts to steal a cow, the rancher is provided with detailed location in a manner of seconds to help them begin legal action if needed.

As IoT continues to evolve, so are the ways that the world will use this powerful technology. It is important to take the time to consider all the possibilities out there and to expand on the potential that we have with it.

Hacker Duet Exposes More Problems in Vehicular IoT

The hacker duo who exposed the original dangers of jeep hacking for WIRED magazine a year ago, has done it again. The duo whose main purpose is to help reduce the dangers that people face thanks to connected driving devices.

This arsenal of attacks could potentially prove fatal if the technology were to get in the hands of someone else. In their latest effort, they show how quickly a Jeep can be controlled from outside of the vehicle, and how during normal driving conditions, they can cause the wheel to jerk to one side and cause a person to veer into other lanes of traffic to their death.

While some may take fear from these presentations, others look at them as a new understanding of the internet of things. With the revelations so far, Chrysler has taken the time to fix the coding work. This helps to close additional avenues. Although, it doesn’t mean everything is out of the woods just yet. As long as there are hackers, there will be someone who is vested in finding security flaws that will allow them to gain control of a device. While some of the security flaws may lead to minor annoyances like messing with the clock in the vehicle, or the radio changing channels, it can be worse.

In this case, the duo have used new technology and techniques that are still allowing them to bypass the safeguards in place, so they are able to prove just how dangerous this technology is. This information can then be utilized by Chrysler, and other companies that utilize the internet of things, so that they can help to reduce any future danger to the consumers who purchase their products. The dup go a step further and pinpoints for the manufacturer what is happening and why it is happening. That way, when they write future code they are able to create a solution that provides safety.

Sigma Z-Wave Enters the Public Domain

Business and Marketing Concepts, Illustration of Standard Deviation Diagram, Gaussian Bell or Normal Distribution Curve Population Pyramid Chart for Sample Size Determination.

If you’ve been following the various low powered networks and personal wireless networks that are used for IoT, you would have noticed that the majority of them are closed source and protected by intellectual property law. This is not only a bad thing for development, but it can also limit the functionality and interoperability of IoT devices that operate on different network protocols.

This week, Sigma has made an unexpected move by opening up their Z-Wave standard to developers, royalty-free, increasing the potential for new and innovative devices. Previously, only members of the Sigma Z-Wave Alliance had full access to the standard, and even then they were limited by a non-disclosure agreement. It is expected that by inviting more developers to explore the network and create prototypes for it, Z-Wave will have a stronger chance of becoming the leading mesh network for personal home use.

This is not the first time that Sigma has released their intellectual property into the wild. Less than half a decade ago, they made their ITU G.9959 radio design available to other developers, which means that startups and even large companies can incorporate the design, royalty-free. Of course, Sigma has reasons for sharing their technology, and clearly they want to become the key player in IoT networks. With more than 30 billion IoT devices expected to be in deployment within the next 5 years, it is no surprise the Sigma is trying all they can do to gain a strong position in the consumer, corporate, and industrial markets.

Sigma is So Far Enjoying Significant Market Penetration

So far, their strategy appears to be working. They’ve supplied more than 50 million Z-Wave microchips that are now in home appliances and other devices, and their technology is used by 90% of the security companies in the US that use IoT based systems.

Despite this latest news, Sigma can’t afford to slow down. They’ll need to continually develop new technologies and iterate on their current systems, especially if they want to remain competitive with Zigbee and Bluetooth. Bluetooth is of particular concern, especially as Bluetooth 5 is right around the corner, offering 4x the bandwidth of the previous spec, and 10x the range. Bluetooth is hugely popular in consumer electronics, and users are familiar with the name and the basics of how the technology works.

At this stage, Sigma is showing that they’re not afraid of taking risks to be competitive, but it will take up to a year before we are able to see which company is truly dominating the mesh network landscape.

The Industrial Revolutions: A Brief History