"Internet of Things" entries

Four short links: 3 October 2014

Four short links: 3 October 2014

Physical Web, USB Horrors, Microsoft Sway, and Startup Code

  1. The Physical Web — a discovery service for physical things. Interesting to see a Google angle: the list of available things might be huge, so it’ll be sorted, and ranking long lists of results is a Core Competency.
  2. Unfixable USB Attack Closer — researchers have released code implementing the omgdoom USB firmware attack. (Not its formal name) (Yet)
  3. Sway — looks to me like Microsoft have productised the Medium design sense.
  4. How 50+ Startups Manage Their Code — I’m a full stack voyeur. I like to look.
Comments: 2
Four short links: 29 September 2014

Four short links: 29 September 2014

Feedback Surprises, Ownership Changes, Teaching Lessons, and 3D Retail

  1. How Community Feedback Shapes Behaviour (PDF) — Not only do authors of negatively-evaluated content contribute more, but also their future posts are of lower quality, and are perceived by the community as such. Moreover, these authors are more likely to subsequently evaluate their fellow users negatively, percolating these effects through the community. In contrast, positive feedback does not carry similar effects, and neither encourages rewarded authors to write more, nor improves the quality of their posts. Interestingly, the authors that receive no feedback are most likely to leave a community. Furthermore, a structural analysis of the voter network reveals that evaluations polarize the community the most when positive and negative votes are equally split.
  2. When Everything Works Like Your Cell Phone (The Atlantic) — our relationship to ownership is about to undergo a wild transformation.
  3. Teaching Me Softly — article of anecdotes drawing parallels between case studies in machine learning and things we know about human learning.
  4. SuperAwesome Me (3D Print) — Walmart to install 3d scanning booths and 3d printers so you can put your own head on a Hasbro action figure. Hasbro have the religion: they also paired with Shapeways for superfanart.com. (via John Battelle)
Comment

In pursuit of universal IoT standards

Universal standards could super-charge IoT growth, but can we get there?

network_by_Simon_Cockell_Flickr

The first remotely operated domestic machine — a toaster — was connected to the Internet less than a quarter-century ago, in 1990. The Internet of Things (IoT) doubled in size a year later with the addition of a coffee pot. Eventually, the Internet Engineering Task Force Network Working Group assigned the coffee pot its own specific standard, HTCPCP 1.0, the Hyper Text Coffee Pot Control Protocol, RFC 2324.

The Internet of Things has grown a bit since then, to somewhere between two billion and 10 billion devices, depending on who’s counting. But it could grow even faster, according to many of the biggest names in the global technology industry, if everyone would just agree on a universal set of technical standards.

The trillion-dollar question is, whose standards? Read more…

Comments: 5

Prepare for change now, and you’ll be ready for it later

Max Firtman on the future of mobile and the importance of embracing change.

Companies and developers have plenty of mobile development challenges — OS platforms, the growing number of devices and screen sizes, and the myriad requirements of browsers, to name a few. Soon — or already — the Internet of Things is going to muddy the waters further. In a recent interview, Max Firtman, founder of ITMaster, stressed the importance of the growing ubiquitousness of IoT and the necessity that companies embrace the future:

”Maybe in 10 years, we’re going to see devices everywhere sending input information to apps that might be in the server, in the cloud — and those apps will carry some kind of intelligence, and will bring us back information on other devices that could be a smart watch, smart glass, a phone; we don’t know, yet, exactly what will be here. But there are a lot of challenges there for content owners or companies because you need to understand that you’re going to be everywhere.

Read more…

Comment
Four short links: 16 September 2014

Four short links: 16 September 2014

IoT Struggle, Embedded Tools, Download Accelerator, and Comms Smog

  1. The Epic Struggle of the Internet of Things — a Bruce Sterling Kindle single, a powerfully-written challenge to the presumed-benevolent technology-pervaded universe that we label “the Internet of Things”. The Internet of Things is not about a talking refrigerator, because that is the old-fashioned consumer retail world of electrical white goods. It’s an archaic concept, like software bought in a plastic-wrapped box from a shelf. The genuine Internet of Things wants to invade that refrigerator, measure it, instrument it, monitor any interactions with it; it would cheerfully give away a fridge at cost.
  2. mbeddra set of integrated and extensible languages for embedded software engineering, plus an IDE. It supports implementation, testing, verification and process aspects. It integrates with command-line build tools and integration servers, as well as file-based version control systems. Nice to see something beyond webdev getting tools love.
  3. Replace wget With axel — download accelerator, aka a parallel wget for situations where the fetched file has multiple servers.
  4. Photos From When Cables Crowded The Skies (io9) — the communication age’s equivalent of the industrial revolution’s smog.
Comment
Four short links: 10 September 2014

Four short links: 10 September 2014

Dandelion Dispersal, Future Weights, Networked Docker, and How Apple Pay Works

  1. BERG Closing — may open source their Little Printer server and IoT middleware. A shame, as Warren Ellis says, because they pulled bits of the future into the present. They were optimistic, not dystopic. I have a feeling BERG grads are going to be like BBC grads, where a certain crop from ~2003 or so went on to be influential at many different places. Dispersing dandelions of delight.
  2. Here Today, Gone Tomorrow — beating our minds’ misweighting of future events. This: When being invited to do things months in advance, the diary usually looks pretty clear and it’s tempting to say “yes”. But whenever a new invitation arrives, ask yourself not, “should I accept the invitation in March?” but, “would I accept the invitation if it was for this week?” (via BoingBoing)
  3. Weave — build a network of Docker containers running on different hosts. Weave can traverse firewalls and operate in partially connected networks. Traffic can be encrypted, allowing hosts to be connected across an untrusted network. With weave you can easily construct applications consisting of multiple containers, running anywhere.
  4. How Apple Pay Works And Why It Matters — for some reason this was the right level of explanation for me. Hope it helps. The end result is a token that can be used across merchants and both online (In-App) and offline (NFC, In-Person). Disaggregate and micropay for ALL THE THINGS.
Comment

Smarter buildings through data tracking

Buildings are ready to be smart — we just need to collect and monitor the data.

Buildings, like people, can benefit from lessons built up over time. Just as Amazon.com recommends books based on purchasing patterns or doctors recommend behavior change based on what they’ve learned by tracking thousands of people, a service such as Clockworks from KGS Buildings can figure out that a boiler is about to fail based on patterns built up through decades of data.

Screen from KGS Clockworks analytics tool

Screen shot from KGS Clockworks analytics tool

I had the chance to be enlightened about intelligent buildings through a conversation with Nicholas Gayeski, cofounder of KGS Buildings, and Mark Pacelle, an engineer with experience in building controls who has written for O’Reilly about the Internet of Things. Read more…

Comment: 1

How to identify a scalable IoT network topology

Range, power consumption, scalability, and bandwidth dominate technology decisions.

HVAC Air Group in an airlift. Source: Hvac en kabelgoot

HVAC Air Group in an airlift. Source: Hvac en kabelgoot

Editor’s note: this article is part of a series exploring the role of networking in the Internet of Things.

Three types of networking topologies are utilized in the Internet-of-Things: point-to-point, star, and mesh networking. To provide a way to explore the attributes and capabilities of each of these topologies, we defined a hypothetical (but realistic) application in the building monitoring and energy management space and methodically defined its networking requirements.

Let’s pull it all together to make a network selection for our building monitoring application. As described previously, the application will monitor, analyze, and optimize energy usage throughout the user’s properties. To accomplish this, monitoring and control points need to be deployed throughout each building, including occupancy and temperature sensors. Sensor data will be aggregated back to a central building automation panel located in each building. A continuous collection of data will provide a higher resolution of temperature and occupancy information, thus rendering better insight into HVAC performance and building utilization patterns. Comparison of energy utilization throughout the portfolio of properties allows lower performing buildings to be flagged.
Read more…

Comment
Four short links: 1 August 2014

Four short links: 1 August 2014

Data Storytelling Tools, Massive Dataset Mining, Failed Crowdsourcing, and IoT Networking

  1. MisoDataset, a JavaScript client-side data management and transformation library, Storyboard, a state and flow-control management library & d3.chart, a framework for creating reusable charts with d3.js. Open source designed to expedite the creation of high-quality interactive storytelling and data visualisation content.
  2. Mining of Massive Datasets (PDF) — book by Stanford profs, focuses on data mining of very large amounts of data, that is, data so large it does not fit in main memory. Because of the emphasis on size, many of our examples are about the Web or data derived from the Web. Further, the book takes an algorithmic point of view: data mining is about applying algorithms to data, rather than using data to “train” a machine-learning engine of some sort.
  3. Lessons from Iceland’s Failed Crowdsourced Constitution (Slate) — Though the crowdsourcing moment could have led to a virtuous deliberative feedback loop between the crowd and the Constitutional Council, the latter did not seem to have the time, tools, or training necessary to process carefully the crowd’s input, explain its use of it, let alone return consistent feedback on it to the public.
  4. Thread a ZigBee Killer?Thread is Nest’s home automation networking stack, which can use the same hardware components as ZigBee, but which is not compatible, also not open source. The Novell NetWare of Things. Nick Hunn makes argument that Google (via Nest) are taking aim at ZigBee: it’s Google and Nest saying “ZigBee doesn’t work”.
Comment
Four short links: 31 July 2014

Four short links: 31 July 2014

OCR in Javascript, Insecure IoT, USB Considered Insecure, and Use AdBlock Plus

  1. Ocrad.js — open source OCR in Javascript, a port of GNU Ocrad software.
  2. HP’s IoT Security Research (PDF) — 70% of devices use unencrypted network services, 90% of devices collected at least one piece of personal information, 60% of those that have UIs are vulnerable to things like XSS, 60% didn’t use encryption when downloading software updates, …
  3. USB Security Flawed From Foundation (Wired) — The element of Nohl and Lell’s research that elevates it above the average theoretical threat is the notion that the infection can travel both from computer to USB and vice versa. Any time a USB stick is plugged into a computer, its firmware could be reprogrammed by malware on that PC, with no easy way for the USB device’s owner to detect it. And likewise, any USB device could silently infect a user’s computer. “It goes both ways,” Nohl says. “Nobody can trust anybody.” […] “In this new way of thinking, you can’t trust a USB just because its storage doesn’t contain a virus. Trust must come from the fact that no one malicious has ever touched it,” says Nohl. “You have to consider a USB infected and throw it away as soon as it touches a non-trusted computer. And that’s incompatible with how we use USB devices right now.”
  4. AdBlock vs AdBlock Plus — short answer: the genuinely open source AdBlock Plus, because AdBlock resiled from being open source, phones home, has misleading changelog entries, …. No longer trustworthy.
Comment