Blogs - Page 75 of 94 - IoT global network

Blogs

Why IoT needs to get back to basics

The meteoric rise of the Internet of Things (IoT) has been well documented, writes Theresa Bui, the head of enterprise product marketing at Cisco Jasper. (more…)

Read more

September 8, 2016

Posted by: George Malim

The IoT ecosystem calls for an efficient open, workable standard

Kuruvilla Mathew, the CIO at Ness Digital Engineering, discusses the changing landscape for IoT standards. (more…)

Read more

September 7, 2016

Posted by: George Malim

Data protection and thecoming General Data Protection Regulation

Data protection is a fundamental concern to all organisations which hold personal information in the UK. Breaching the Data Protection Act (DPA) would have serious consequences for their business – fines, bad publicity and even criminal sanctions, writes James Wickes, the chief executive and co-founder of Cloudview. (more…)

Read more

September 6, 2016

Posted by: George Malim

The Full Stack is getting higher for developers with IoT

Ian Hughes, an IoT Analyst at 451 Research discusses the complexities faced by software developers in an increasingly fractured technical landscape.

The 1980s programmer/developer

I started programming, self-taught through magazine listings and experimentation in the 1980’s, at home on a ZX81, later at school and university. Companies hired and trained programmers, based on small sets of preferred languages, COBOL, PL/1 and C. Design methodologies evolved to try and allow for specification of software projects at a higher architectural level. User interfaces were few and far between, mostly created in panel editors left for junior developers to put onto the green screen monitors.

The 1990s programmer/developer

We saw a drive towards object orientated languages and event processing systems. Legacy languages were still needed but Smalltalk and C++, with their added engineering rigor, became fashionable in the mid 90’s. The desktop personal computer arrived and started to bring windowed systems, richer user interfaces, which divided the profession into ‘client’ or ‘server’ developers. Programmers were still programmers though, learning the methodologies of Rumbaugh, Booch, Jacobson et al. Engineering relied on more frameworks, middleware and class libraries.

The 2000s programmer/developer

The web disrupted the programming industry status quo. Firstly, with a new set of protocols, markup languages, browser plugins and server interactions and the number of potential users ramped up from hundreds to millions. Very little tool support existed to deal with how to present a Web page, the interactions on it or connecting to a backend. The user interfaces became critical, they provided a brand touchpoint, required graphic and audio design skills, information design and blending with the traditional technical side of projects. Secondly the Web provided a vehicle for many more people to engage with software engineering and to share ideas. The magazine listings of my youth were now amplified as living projects with open source collaborations enabling lots and lots of projects, prerequisites and constant change.

The 2010s programmer/developer

The wild west of the web gradually started to be tamed and engineering rigor returned with the advent of cloud hosting. Companies not looking for programmers but for Full Stack developers. People who know a little about a lot of parts. The Full Stack trend began with the Web, needing to know HTML, CSS, PHP, Java, JavaScript, HTTP protocols, MySQL/ NoSQL etc. combined with library management systems, security requirements, testing and also be able to create for mobile platforms, touch interfaces and hooking up to Facebook, Twitter and any other social media platform. Agile development added yet more things to be expert in. Forever patching runtimes bringing its own challenges too, no more launch and forget.

Today’s programmer/developer

The Internet of Things (IoT) is making that Full Stack a lot higher and more difficult to balance. IoT brings physical computing to the mix. If any developer thinks users mess up their wonderful pristine development, wait until devices being impacted by temperature, sunlight, atmospheric conditions and water start delivering constant streams of data across a multitude of communication mechanisms to server-less computing based cloud processes. Each of the millions of devices or products are remote, together they provide a large attack surface for hacker intrusion. Early IoT was about simple sensors and actuators, now IoT end points are rich compute platforms too, they connect to larger edge servers that collate and gather data for the backhaul to a cloud server. Understanding what function needs to be deployed where, in a complex distributed feedback loop, is difficult. Developers have to consider the new system components such as machine learning and self-organising interactions of Blockchain between devices. User interfaces alter dramatically with Virtual and Augmented Reality (VR & AR) and new types of device to interact with. Organisational silos are crossed as data from one IoT system feeds an Artificial Intelligence (AI) from another. Operation Technology departments start to cross over with Information Technology groups. IoT blurs many boundaries.

Future programmers/developers

At 451 Research we cover and keep up with the multitude platforms and protocols that make up the IoT industry. There is an industry gap for methodologies, and then design tools, to evolve with common patterns and use cases. Starter kits of hardware with backend connections are common appealing to Full Stack developers in the enterprise. Proof of concepts rush to plug things in, which is the IoT expression of the Minimal Viable Product.

It may sound all doom, gloom and scarily confusing, but as I tell the next generation when I give talks, there is huge opportunity to flourish and build on the skills and aspirations they have. Full Stack is an appreciation of breadth and a willingness to go with the flow, to adapt. IoT is a great enabler for those who may not be equipped to be a traditional programmer. Equally those with that skill can find intricate niches and create wonderful things.

 

Read more

September 5, 2016

Posted by: George Malim

How to test IoT products without wasting a fortune

The Internet of Things is a moderately new term that came into the industry alongside progress. Humanity has learned how to build complicated systems. Modern technology forces various things to interact with each other. These things are usually produced by different manufacturers. Networks expand and become messy, writes Alex Seryj, the editor in chief at QArea. (more…)

Read more

September 2, 2016

Posted by: George Malim

How can you ensure end-to-end interoperability between products and services in an ecosystem?

In July Actility, a provider of low power wide area (LPWA) networking and the company behind the ThingPark LPWA IoT platform, launched the ‘ThingPark Approved’ programme. Actility also welcomed the first partners to achieve ThingPark Approved status. (more…)

Read more

September 1, 2016

Posted by: Avadhoot Patil

The IoT and perimeter security: a hole in the wall? – Part Two

In the first part of this two-part series, Tyco’s Simon Gawne examined the technical obstacles to a cyber-secure IoT-based security network. Here, he outlines the cultural changes which organisations must go through if they are to ensure that every entry point is effectively guarded. (more…)

Read more

Posted by: George Malim

The IoT and perimeter security: a hole in the wall? – Part One

The Internet of Things (IoT) is playing an increasingly large role in physical security, as perimeter-guarding devices such as CCTV and access management begin to take advantage of IP-based communications. Devices now have the power to share information faster than ever before and across a far wider physical area – but how secure are the security devices themselves? In a two-part series, Simon Gawne, director of integrated solutions and innovation at Tyco, investigates the need for security teams to consider not only the man outside the gate, but also the ghost in the machine, as hackers attempt to exploit vulnerable system backdoors. (more…)

Read more

August 31, 2016

Posted by: George Malim

Re-engineering security for the IoT

From delivery vehicles to ATMs, air conditioning systems to CCTV cameras, the scope for commercial IoT appears to be as big, if not bigger than, the comparable consumer opportunity, writes Klaus Gheri, the vice president and general manager for network security at Barracuda Networks. However, for the business world, the IoT faces a major barrier to adoption: in their current state, the tools that help businesses deploy and secure IoT devices are simply not fit for purpose.  (more…)

Read more

August 30, 2016

Posted by: George Malim

How homeowners can protect themselves from IoT threats – Part Two

Ralph Goodman, a professional writer and the resident expert on locks and security at the Lock Blog continues his article on how homeowners can protect themselves from the threats posed by IoT. (more…)

Read more

August 26, 2016

Posted by: George Malim