You will never hear anyone say, “I hope my career stagnates this year.” Your IoT career is a chosen path and you want to be sure that you move forward in it.

The problem is that many of us are not entirely sure what to do to plan our career. We planned our education and we planned our employment, but for many of us, that’s as far as we got.

Why should you plan your career?

Think of your IoT career as sort of a lifelong road trip. Without a map you’re going to end up going somewhere, but realistically you’re probably not going to go anywhere worth being. Without good directions, a map or a gps, the trip isn’t going to end on a high note.

Having a career plan gives you a general goal and a set of directions that can help you to get there. The plan will make you take a closer look at the things you are doing and what they are doing for your career. It makes you think hard and commit to a given process. That process begins with assessing the past year and taking a hard look at where you’ve been.

Ask yourself the question “Where would I like to be in my IoTcareer by the end of next year?” “What kind of IoT jobs are out there and what should I be considering?” What would make you feel as though you were a success? How will you know if you’ve achieved your goal? By setting a benchmark or a point that serves as a goalpost.

Next, set your definition of how you are going to get there. IoT jobs are a unique type of employment and each job in IoT requires a unique set of skills and a unique methodology for moving forward in your career path. There are no cookie cutter solutions for making your IoT career move forward.

Plot a course. Define the steps that you need to take and the way in which you will accomplish the forward momentum for your career. Give yourself quarterly goals and objectives to meet that will help you to get where you want to be.

Get help in defining your career path. If you’re uncertain as to how to chart a path forward in your career, find someone who is doing well and has steadily moved forward and ask for their assistance.

Speak with anyone who has successfully navigated a career path like yours. Even older people who are getting ready to retire and have been successful in their career are great people to work with.

Make a choice about the best way to navigate your career path and then commit to it. Watch where you go and evaluate the results at the end of the quarter. If the goals have been met and the movement is positive, continue on that path and it they have not, reevaluate and chart a new path to take you where you want to be.

Just as everything in life changes, your plan will change too and in some cases, things will not go 100 percent according to the plan. The important thing is that you have a goal post and some guidelines with which to work. Those can be changed as necessary to give you a guide that will allow you to plot a more successful career.

Tags :

Amazon Echo and other virtual devices are now part of the legal landscape. As of last week, police are seeking access to Amazon Echo information to see if the Amazon data has something that will help them with a murder case.

According to The Information the police and the attorneys involved in the case from Bentonville Arkansas have issued a warrant to Amazon asking them to hiand over any and all audio or records from Echo that belong to James Andrew Bates. Bates will go to trial for the murder of Victor Collins in 2017.

While Amazon has declined to give any of the recorded information from the Echo that it has on its servers, the company did give the account details and the account purchases from the account to the police. The police state that they could pull some data from the speaker but what they could get was unclear.

The Echo device is always on and can be awoken so police want information that may be stored on the device of an audio nature. According to Gabe Guttierez the police want to see what the device recordings may tell them. “We know Amazon has a copy because consumers can actually listen to all their Alexa requests and they can delete them, so that’s an option that’s available in a lot of these technologies–something that’s good for consumers to know,” stated privacy expert Bob Sullivan.

According to WHO TV the prosecutors say 32-year-old James Bates murdered his co-worker Victor Collins, who was found strangled in Bates’ hot tub.”

Bates, who called 9-1-1 when he found Collins, has pleaded not guilty to the crime and of course isn’t thrilled with the Amazon data being called into play. He had multiple other smart devices attached to his home at the time, including a water meter. The water meter showed that more than 140 gallons of water were used between 1 and 3 am when Collins was murdered.

Investigators state that he used that water to clean up a crime scene. The Echo and other devices like it are supposed to find answers for you by listening to what you tell it to do, but the police in Bentonville believe that it can help with the case by telling them what it heard.

“Did anybody think when this was being created that information you gave to Alexis or you gave to the amazon echo would be used outside your home, and then be used to have you arrested for a crime you didn’t commit?” asked Bates’ defense attorney Kim Weber.

Amazon told WHO TV.com — NBC News that it “will not release customer information without a valid and binding legal demand properly served on us. Amazon objects to overbroad or otherwise inappropriate demands as a matter of course.”

“When we give companies data, the big problem is not only how will it be used today, but how could it be combined with other data in the future and then used against us,” remarked privacy expert Sullivan.

How it all plays out remains to be seen but based on the Echo and the hot water meter, it appears that your smart devices may be the best witnesses against you.

Tags :

San Francisco based Cloudflare has had formed a significant presence in content delivery and internet security, especially considering the company is less than a decade old. To many industry observers, Cloudflare is a company that came at exactly the right time to capitalize on the growing number of cloud service and IoT operators.

Most recently, the company has announced their new Orbit security product, which will not only work with websites and other cloud services, but also with IoT devices.

IoT’s Impressive Growth is Not Slowing

Here are two critical stats that illustrate just how important the Internet of Things will be in 2017 and beyond.

  • Companies are expected to spend up to $5 Trillion on IoT devices and infrastructure between now and 2022. (BI Intelligence)
  • By 2022, there will be almost 23 billion IoT devices in use. This is up from roughly 7 billion that exist today. (BI Intelligence)

Security Continues to Be Critical

With such an explosion in growth, it’s no surprise that companies are taking security so seriously. With increasing numbers of devices connected to networks that are inherently vulnerable, industry innovators will need to continuously update their security solutions, just as we do on our corporate networks and desktop PCs today.

Cloudflare recently reported that they had seen an increase in DDoS and other attacks originating from compromised IoT devices. CCTV cameras were amongst the most exploited devices. Since discovering trends in attacks being sent from IoT devices, the company started working on a comprehensive IoT and cloud security solution. The result is Orbit. Orbit resides on the network layer in front of IoT devices.

Essentially, it’s between the internet and the things. The company worked closely with both vendors and innovators to ensure that their product was adaptable to the ever changing needs of IoT, which is a large part of the reason why Orbit sits on the edge of any protected network. It means that companies will be able to implement patches at an infrastructure level, and it won’t technically matter what kind of devices are on the other end.

Cloudflare has had its share of controversies in recent years, but their steps to help protect the Internet of Things could be a significant boost to their public image. Their scalable system has already received praise from companies like Qualcomm, Karamba Security, and Swift Sensors, and it will be interesting for any industry insider to see just how effective Cloudflare Orbit will be in the coming years.

Tags :

The Internet of Things (IoT) has allowed for significant developments in the technology used in healthcare, manufacturing, and retail; and IoT has even changed the way that we use consumer devices. While technologies associated with IoT are often lauded for innovative features, there is less coverage given to the vulnerabilities and security risks associated with some devices.

In a world where technology is pervasive and continually increasing in complexity and capability, security should be at the forefront of the mind of anyone who is interested in either the IoT industry, or even specific devices.

IoT Cyber Attacks Are Increasing in Frequency

Recent reports have shown that cybercriminals have expanded their attacks from existing systems, and are now spending a significant amount of resource on attempting to compromise IoT devices. Vulnerable devices include connected televisions, washing machines and refrigerators, and even home CCTV systems and baby cameras. With the increasing expansion of IoT into all areas, it should be expected that cybercrime will increase in the coming years.

In 2017, it is estimated that there are around 20.35 billion connected IoT devices around the world. By 2025, that figure is expected to increase to over 75 billion. Growth is being driven by a high rate of innovation, consumer and industry demand, and partially due to a decreased unit cost for devices. As sensors and embedded chipsets become more affordable, it’s only natural that more innovators will look at making their existing devices more ‘connected’.

With Market Growth, Security Will Be Essential

By 2019, the global cost of cybercrime is expected to hit figures exceeding $2 trillion USD. New device manufacturers and developers may have no prior experience with data and internet security, so it will be critical that the right professionals are hired throughout the industry, to secure the next wave of devices. Thankfully, industry insiders do seem to be aware of the risks that exist in the market.

Almost half of all developers involved in IoT consider security their primary concern when developing and supporting devices. This is a promising statistic, especially considering that more than half of all consumers are concerned for privacy and security when dealing with devices that are connected to the internet.

There’s little question the IoT market will continue to grow in the coming years, allowing for embedded devices that were simply not possible in the past. With the ever present risk of security threats, both technology and product developers will need to take great care to not only develop devices that are innovative and functional, but that are secure by design and protected from cyber-attacks.

About Bill McCabe/ Internet of Things Recruiting – Executive Search/ Retained Search for the Internet of Things/ Machine 2 Machine/ Big Data Markets

Top Industrial IOT Influencer Worldwide Per Right Relevance – March 2017

IBM IOT Futurist – Top 50 IOT Authority on Twitter – Guest contributor to IoT Central, Medium and US.ibm.com/blog

Need Help finding your next Big Data or IOT Employee or If you require the top 5% of IOT talent let’s talk. Drop me a line or use this link to schedule an IOT Search Assessment Call Click Here to Schedule

Tags :

IoT is often spoken of as a single and relatively unified technology. The reality is that while IoT as a concept is fairly straightforward and applicable to numerous industries and use cases, things start to look a bit different when you look closer at some specific examples.

For these comparisons, we’ll focus on agricultural, manufacturing, and commercial building IoT implementations.

Data is a Key Differentiator in Systems

A significant aspect of IoT is that data that is collected and used to make automated systems more efficient and useful. Consider an existing commercial office building that is moving to IoT sensors and systems for building automation. From installation, that building will already have numerous data sets that will help when designing a cost effective and efficient system. Building automation, electronic access, and other systems have existed for a number of years, so a commercial building operator will already know what they want to achieve with an IoT connected system.

Compare that to agriculture, where sensors and electronic devices have not been used in the past. Adapting to IoT sensors and devices will be completely new territory, however, agricultural operators do have the advantage that they often start with a data lite ͛approach. With fewer sensors and systems, they are able to identify the key benefits of their IoT systems and scale them up in a way that creates the most value.

If manufacturing is analyzed, there’s even more data to collect, and even if it is not immediately usable, the right analytics can enable significant improvements in efficiency and productivity. The problem that exists today is that the data that can come from factory sensors is so rich and so varied, that companies often don’t know what to do with it. In fact, according to an Industrial Internet Consortium report, only 1% of all factory data is used to create valuable insights.

IoT Changes Depending on the Application

Although this is a rather brief overview of some ways in which IoT can vary between industries and applications, the point should not be lost. IoT on its own is not a magic bullet for solving efficiency or productivity problems within an organization. The right design Is required, along with continued learning and adaption to make the most of any investment.

About Bill McCabe/ Internet of Things Recruiting – Executive Search/ Retained Search for the Internet of Things/ Machine 2 Machine/ Big Data Markets

Top Industrial IOT Influencer Worldwide Per Right Relevance – March 2017

IBM IOT Futurist – Top 50 IOT Authority on Twitter – Guest contributor to IoT Central, Medium and US.ibm.com/blog

Need Help finding your next Big Data or IOT Employee or If you require the top 5% of IOT talent let’s talk. Drop me a line or use this link to schedule an IOT Search Assessment Call Click Here to Schedule

OR Contact me at 303-337-7871

Tags :

Bill McCabe Will Present at IBM InterConnect in Las Vegas, Nevada

DENVER – March 13, 2017 – PRLog — Futurists look toward tomorrow—they offer us a vision of what lies ahead at or what is in store for us.They predict new ways to do business and new ways to look at the world around us. Bill McCabe, renowned IoT recruiter, has been named to IBM’s list of Futurists and invited to speak and interact with the other panel members at IBM’s InterConnect March 19th-24th in Las Vegas Nevada.

IBM, well known for their promotion and expansion of systems such as Watson, is working tirelessly to enable global collaboration and innovation. IBM is a long time computing leader whosew Watson systems will now ally with with SoftBank to bring Watson to Japan.

Bill McCabe, IoT and IT security recruiter, is well known in IoT circles.This is not his first partnering with IBM as Bill is an often requested IoT guest blogger for IBM and additionally, Bill is an avid supporter and admirer of their technology.Bill has also been named to Twitters Top 50 IoT Influencers.

When questioned about the IBM InterConnect symposium, Bill stated “It gives me great pride to be included among the ranks of IBM’s futurists. I join some very distinguished company and look forward to our interaction and sharing common interests and discussions.”

You can reach Bill for comment or for questions at Bill@SoftNetSearch.com. If you’d like to interview Bill or to speak to him regarding retaining his search firm,–http://internetofthingsrecruiting.com, he may be reached by phone at 303-337-7871 . You may find Bill at IBM Interconnect in March or see him speak at IoT World May 16 – 18, 2017 at the
Santa Clara Convention Center, CA, USA

Contact
Bill McCabe
303-337-7871
***@softnetsearch.com

Tags :
men-1979261__340The biggest danger these days in Iot recruiting is having a good candidate turn into a good hire who then accepts a counter offer from their current employer. It’s fairly common that we see counter offers made and about 40% of the time, the employee accepts the offer.

 

Making the dangers of a counter offer clear to your candidate is the first and best way to prevent their acceptance. It is your task as the recruiter to fully engage the candidate and to make clear the dangers of the counter offer and how it can affect their future employment picture.

Forbes calls accepting a counter offer “career suicide.”

The reality is that very often when a candidate receives a counter offer, it is the employer scrambling to keep a position filled that is important to their bottom line. They pay whatever is necessary to keep the employee who does not realize that the employer no longer views them as an asset. They paid in order to prevent a costly vacancy but they consider it legal extortion according to most employers and companies.

It behooves you as the IoT recruiter to let them know precisely how someone who takes a counter offer is viewed.

In most cases, the employer will find any and all reasons to release the employee and according to Forbes more than 50% of those who accept a counter offer are released from the company within 18 months.Some do leave of their own volition, but most are released by the company.

Having already reneged on an offer from a recruiter, it is very typical that recruiters too want very little to do with a candidate who has treated them in this way. In most cases they will be blacklisted by recruiters in their field and offers do not come in even when they are not currently working.

If you’re not helping your candidates and prospects to understand the dangers of accepting a counter offer it is a big mistake on your part. Recruiters talk and companies talk. As Forbes says, accepting a counter offer is indeed career suicide and its something that will stay with them for years if not forever.

Here;s a tip for you as an IoT Recruiter.  Get your candidates engaged and keep them engaged. What’s more, while you need to thoroughly vet them. you also need to on board them more rapidly in order to prevent the counter offer scenario, but should it arise, help them to understand why it’s a bad idea..

Tags :

The internet of things has made incredible leaps and bounds in recent years. 2016 was no exception with most of the hype we’ve been hearing
coming to fruition. In fact, the general population actively discovered this amazing trend and while there were a few bumps in the road, 2016
proved we are still in a golden era.

A great example can be found in the homes of millions. Thanks to devices like the Amazon Echo, more people have embraced the IoT on a consumer
level. This has shown that while some concerns are out there among people, it is possible to win over the consumer and to create a
multifunctioning device that is successful. We now can control all aspects of our home from a single unit so lights can be switched on,
television systems recorded, and even thermostats adjusted even if we are on the other side of the world.

We also learned what we can expect when a cyberattack happens on a grand scale. Yes, the September 2016 cyber-attack that slammed Netflix,
Twitter, and other major players allowed us to recognize the importance of cybersecurity and put it at the forefront of the connected devices
that we use. Fortunately, nothing of serious consequence was experienced during this attack and the online world appears to have recovered.

In a sense, even the concerns with cyber-attacks are not enough to sway the investors who have helped IoT stocks to experience new highs. On the
NASDAQ alone, there was a major surge in Industry 4.0 stocks including the likes of Sierra Wireless and PTC who are often viewed as the
frontrunners when people talk about the internet of things.

Because 2017 is expected to be an even bigger year, we saw some legal changes to how the IoT can work. No data coming from devices that are
potentially used by children can be mined for data. If a security breach is experienced, it must be reported at once. Also, users must give
their consent to have data mined, and have the option to object to it if they desire to do so.
Even with all those restrictions in place, this should still be an incredible year for both the average consumer, and those producing connected
devices.

Tags :
It’s a fair question to ask. Is my medical IoT device actually secure? Is it possible for someone to hack into it and kill me? While it is unlikely that a hacker will make it into a medical device, there are security measures constantly going into place to ensure that there isn’t even a remote possibility.

 

Because the medical industry has a considerable number of watchdog groups hovering over it, ABI Research conducted a study. They found that $390 million of the $5.5 billion spent on cyber security for medical devices in 2016. These funds were used to help create patches that could be released over the air, while analysis and penetration testing could be done specifically for installed medical IoT devices.

Additional options like authentication mechanisms and other resources have also been further developed for medical devices. This reduces the number of vulnerabilities that could be experienced by a devices that are connected. However, further responsible security measures that include hardcoded passwords and other tools should remain at the forefront of developer’s minds.

The United States has already taken the initiative to ensure that all devices are being cared for. In recent years, they have put medical security to the front of importance. It is estimated that with the funding from there, and places like Sweden and Germany, the amount spent on medical devices will more than triple by 2021. That’s good news for future generations who will need medical devices.

Of course, according to the Federal Drug Administration and Underwriters Laboratories, we still have a long way to go with Medical IoT security. While the FDA still doesn’t require FDA approval for worn IoT medical devices at this time, it is possible that could change in the future. This would likely happen if there was a perceived need for stricter guidelines to go into place, due to a lack of security measures being taken into account.

Law enforcement has also recently expressed concern. The problem is that too often, no one is prepared for an event when it happens. Authorities are concerned that something could take place on a massive scale, if the information on how to alter these devices gets out. This is especially the case if a high profile individual, such as the president, were to need a medical device.

For now, don’t feel like it is all doom and gloom. Yes, there are areas of protection that need to be addressed with connected devices. That is all being done and before long, the security measures will be exceptional with them, so there is never a concern with the wrong people gaining access to the devices that help to keep us healthy.

Tags :

How to Nail Your Internet of Things Interview

The internet of things is the future of technology. If you plan on getting a position that relies heavily on it, there are a few simple things you can do to ensure success.

First, understand what the company does and their approach to the IoT. If the company makes connected thermostats, you’ll want to ensure you have some knowledge about that area of expertise. If they manage a series of connected devices on a production line, you need working knowledge of how to interact and program those elements. Not every device is the same, so make sure you understand what knowledge is required for the position you are interested in. After all, simply operating these devices is vastly different from programming them.

Next, remember that the tiny details matter. Have you had experience with a particular system or code? Make sure you mention it. While your resume is a good outline for who you are, your knowledge and level of comfort with the topic during your interview will actually have more of an impact.

This means also taking the time to understand the company. Do your research and find out what projects they are working on. If their focus is on new avenues of technology you can briefly talk about it. When you don’t show any genuine interest in the company or knowledge, you put yourself in a position where the interviewer doesn’t take you as seriously.

Your first impression is also key. While it is important to know your stuff, also prove you have the desire to be there. Make sure you show up no more than 5 minutes early to your interview. Make sure you are cordial to all staff, including the receptionist. Many companies watch how potential employees interact with what are deemed “lower” importance employees. If you are rude, condescending, or cold they will find out and it could cost you a job. Ultimately, all employees in a company have a valuable purpose and no one position can do their job without the others ensuring the office functions.

Finally, make sure you read up on the latest internet of technology news pieces that come out. Did a major company announce a new revolutionary advancement? Then you’ll want to mention it. This shows you stay current and if you discover something that manager doesn’t know, they might see you as an invaluable expert in the industry. That could help you to nail that interview and go on to make waves in the industry.

Tags :