Intro:
This is for posts that have an introductory or general scope. There will be more of these early on, and less as we continue to cover ground.
Sensing:
This is one of the four keyA number used to encrypt (or encode) information so that no one can read it. Keys are used when encoding and decoding. You shouldn't have to mess with keys yourself. enabling concepts of the IoTThe Internet of Things. A broad term covering many different applications where "things" are interconnected through the internet.. It deals with how machinesIn our context, a machine is anything that isn't human (or living). That includes electronic equipment like computers and phones. can sense their environment in many ways. You can find here all posts that include the role of sensing and how it works.
Computing:
This is another of the four key enabling IoT concepts. It includes the CloudA generic phrase referring to large numbers of computers located somewhere far away and accessed over the internet. For the IoT, computing may be local, done in the same system or building, or in the cloud, with data shipped up to the cloud and then the result shipped back down. and Machine LearningMachine learning (or ML) is a process by which machines can be trained to perform tasks that required humans before. It's based on analysis of lots of data, and it might affect how some IoT devices work./Artificial Intelligence. Here you will find posts that discuss any of these topics.
Communicating:
This is yet another of the four key IoT concepts. The IoT doesn’t happen without lots of communication, and here you’ll find posts that deal with that communication.
ActuatingA way of controlling some device electronically. It might turn the device on or off or change a setting or property or do any other thing that the device is capable of.:
This is the final IoT concept; it deals with how computers can control other devices. This category includes all posts related to actuation.
SecurityRefers to whether or not IoT devices or data are protected from unauthorized viewers.:
Because of the damage that hackersA misused, but common term for an unauthorized person trying to break into a device or network. Originally, in this context, "hackers" referred to the good guys (or "white hats"), while "crackers" were the bad guys (black hats). can do – and have already done, this is an enormously important topic for the IoT. Any posts dealing with security can be found in this category.
Energy:
Many IoT devices are battery-powered. So it’s important for designers to consider how much energy they consume as they functionA small portion of a program that’s set aside and given a name. It helps isolate key code in an easy-to-understand way, and it makes changes easier and less error prone. It’s a really important way to make programs easier to understand. May also be called a subroutine..
PrivacyRefers to whether or not information gathered about your usage of IoT devices by authorized people can be made public, or shared with others, without your consent. Different from (although related to) security, which protects such data and devices from access by unauthorized people. Different from privacy, which is more concerned about use of data by authorized people.:
Keeping data private is also critical for the IoT. Privacy is often lumped in with security, but it’s a distinct topic, and so it has its own category.
Companies & Products:
Examples of companies that are using or offering IoT solutions, and examples of specific IoT products.
In the News:
Items I’ve pulled from the news that relate to the IoT.
Review:
Posts that review what was discussed in the preceding weeks.