Welcome to 2018. There’s lots more to talk about regarding the Internet of Things (IoTThe Internet of Things. A broad term covering many different applications where "things" are interconnected through the internet.), but let’s pause to do a quick recap of what we’ve seen so far. I’ve included links for easy review of the original topics.
- The IoT connects everyday items to the internet.
- There are four main aspects to the IoT:
- SensorsA device that can measure something about its environment. Examples are movement, light, color, moisture, pressure, and many more. that measure some aspect(s) of the world
- Communication of those measurements to some other place
- Computation involving the measurements
- Action taken as a result of the computations (actuation)
- There are two main categories of IoT: Consumer and Industrial. There are multiple industrial sub-categories.
- IoT gadgets may come with services that are provided over the internet.
- The IoT relies on different pieces of equipment being able to inter-communicate and, effectively, work together. This is interoperability, or interopThis refers to how well different pieces of equipment can work together. Macs and PCs, for instance have some limited interop, but there are many Mac devices that can't work on a PC, and vice versa. This is an important notion for systems, like the IoT, that involve many different pieces of equipment working together..
- Some systemsThis is a very generic term for any collection of components that, all together, can do something. Systems can be built from subsystems. Examples are your cell phone; your computer; the radio in your car; anything that seems like a "whole." implement interop by limiting the devices they can work with in so-called walled gardens.
- Security and privacy are critical to the IoT.
- The cloud is where much computation takes place. It also allows you to use your phone as a remote control for IoT devices or for viewing information relating to your IoT devices. Some computation can also be done locally in what some refer to as the fog.
- Machine learning is an important new kind of computation. It allows gadget designers to teach their gadgets to do sophisticated tasks that are hard to program the old-fashioned way.
- IoT devices are built out of hardware and software. You can’t update hardwareIn this context, "hardware" refers to functions in an IoT device that are built into a silicon chip or some other dedicated component. It's distinct from "software," which refers to instructions running on a processor. once a device is in use; you can – and should – update softwareIn this context, "software" refers to functions in an IoT device that are implemented by running instructions through some kind of processor. It's distinct from "hardware," where functions are built into a silicon chip or some other component..
- New IoT devices must register with the cloud for best use – and sometimes for any use. The tradeoff is that, by connecting your device, you will likely be transmitting personal data.
- The future of the IoT may be impacted by net neutrality – or the lack of it.
These items cover some of the most important basic things that you need to know about the IoT. Going forward, we will talk more about how the IoT works as well as establish some questions you should be asking when you buy an IoT device.
Danielle says
Do devices that use IoT (is that correct terminology?) come with security (hardware, software, or both) embedded in them? In other words, are they hacker proof? Or is it recommended to get a device that will protect IoT gadgets in your home?
Bryon Moyer says
This gets right to what makes IoT security so difficult. Yes, all of the devices that are part of the IoT need to have security built in. And, while things are improving, we still need more. The people who build thermostats and automobiles and medical devices are good at what they’ve historically done — make thermostats and automobiles and medical devices. Security is something completely new, and it brings the latest tech into what’s mostly an old-tech world. So it’s taken some convincing that this is important enough to ride the learning curve.
There’s no way to simply buy a device to protect your network. There are plenty of “front doors” to your network — and they have good locks. The problem is someone finding a side door or even a crack to wiggle through. An IoT device on the network with inadequate security might just be one of those cracks.