Source: “The IoT is a developing technological marvel. It is estimated that by the year 2020, 50 to 100 billion devices will be electronically connected in the globally emerging IoT. But at the center of the innovation that is unfolding across all geographic, industrial and technological borders is not so much those devices that are being linked together but the “connected person.” At the center is the human being who is making use of the applications and services that are enabled by the devices — the things — and their unprecedented integration provided in the IoT.
Source: “The Industrial Internet of Things (IIoT) is the use of Internet of Things technologies by industrial organizations to deliver better performance and enhance competitive advantage — not only in an individual facility, but across an industrial organization’s supply chain and throughout its value network.
There have been many articles forecasting the explosive growth of the Industrial Internet of Things (IIoT). Without a doubt, IIoT things – industrial
Source: “Wireless electronic medical devices have made “remote medicine” a reality. Disease prevention, monitoring of chronic illnesses and eldercare capabilities have expanded beyond the restraints of physical location. It is now possible to view up-to-the-minute data on patient health via a wireless monitoring system, and to share a patient’s diagnostic data with clinics around the world in real time. As wireless electronic medical devices become more widely employed, practitioners seek improved communication between them in order to maximize their effectiveness.
Source: ““The Internet of Things is more about the things than about the Internet,” Jim Heppelmann, President and CEO of PTC, told me recently. “The Internet is not going through a radical transformation,” he explained. “It’s evolving. But the step-function change is happening in the things.”
PTC may well be the Internet of Things’ best-kept secret. It is a $1.36 billion company with 28,000 customers worldwide, known primarily (by those who know it) as a pioneer in computer-aided product design and development. But in the last five years, under Heppelmann’s leadership,
Source: "DesignX is a new, evidence-based approach for addressing many of the complex and serious problems facing the world today. It adds to and augments today's design methods, reformulating the role that design can play. Modern design has grown from a focus on products and services to a robust set of methods that is applicable to a wide range of societal issues. When combined with the knowledge and expertise of specialized disciplines, these design methods provide powerful ways to develop practical approaches to large, complex issues. The major problems facing humanity today
Source: “Some of us have greeted The Internet of Things (IoT) with an open door and a warm embrace. For others of us, we are cautiously peering through the door’s peephole, and considering whether we should pretend to not be at home. What this very well-informed panel, enjoyably moderated by industry guru, Mr. Charles Brookson, Director of Azenby in the United Kingdom, agreed, is that IoT will know whether we are home, or not. However, what is done with that information, will be the key to IoT’s mass-market appeal.
Source: “Hacking. It’s a word commonly associated with murky rooms, nefarious characters and attempts to steal data. So when the Royal Institution announced that this year’s Christmas lectures will be titled “How to Hack Your Home”, it seemed almost an act of establishment rebellion. But it wasn’t. Because hacking has taken on a new identity – grown a Dr Jekyll to counter its Mr Hyde. “Hack” is now the byword for smart fixes and canny contraptions, from home-crafted alarm systems to remotely operated kettles
Source: “Sharing economy companies such as Lyft, TaskRabbit and Spinlister (bike sharing) usually assume that the person renting has proximate access to the thing being rented so that they can hand off and reclaim the goods. In contrast, automatic unlocking and tracking is one way that organizations that manage fleets of assets achieve scale. Imagine the friction if, for example, Zipcar required that someone meet each customer in order to hand over the keys. Even traditional car rental companies are moving toward streamlining rentals.
Source: “How do we ensure that the ‘next big thing’ – Internet of Things – be harnessed for the public good? Sonia Bussu of UK’s Involve argues that the involvement of the public is key to ensure that a common language is developed, and that societal values at put at the centre of technological developments.
Source: “The technology industry has evolved over the years with a development lens increasingly focused on end users and usage cases. Indeed, for the past decade or more, personas (the designer-created profiles of end users) have become stand-ins for various usage cases and user models. With regard to location aware software and mobile applications
Source: “As part of a new effort to generate more Internet of Things technologies, Google is planning to issue a number of grants to facilitate pioneering research in this nascent field of computing. “While the Internet of Things (IoT) conjures a vision of ‘anytime, any place’ connectivity for all things, the realization is complex given the need to work across interconnected and heterogeneous systems, and the special considerations needed for security, privacy, and safety,” co-wrote Google chief Internet evangelist
Source: “”My tech vendor 2015 predictions media release: Buzz, acronyms, and veiled sales pitches will continue to dominate tech landscape. Stop," tweeted Tim Marshall, whose day job is, um, public relations for a tech vendor. Please dispense a full dose of irony supplement lozenges immediately.
Jokes aside, Marshall is spot on. My inbox overfloweth with vendor press releases touting information security predictions for 2015 that, put together, represent a collective statement of the bleeding obvious. Mobile devices will become more popular targets.
Source: "Did you know that the world's population spends a total of 500,000 hours a day typing Internet security codes (CAPTCHAs)? That's a lot of time dedicated to something that, while useful for internet security, has no value whatsoever to the individual. If it were possible to eliminate at least some similar procedures and protocols from daily life, we'd all have significantly more time for pleasurable activities. We're not advocating a descent into hedonism; we're just saying time could sometimes be spent better.
New Delhi, India, 10 December 2014 – m2mpaper.com announces the 2nd Edition of its flagship conference ‘India m2m + iot Forum 2015’ scheduled to be held on Thursday, 19 February 2015 and Friday, 20 February 2015 at The Royal Plaza, 19 Ashok Road, New Delhi, India. Now in its 2nd edition, India m2m + iot Forum has gained a repute of being a not-to-be-missed conference for the professionals engaged in machine-to-machine (m2m) and internet of things (iot) domain and its various vertical industry applications.
Source: “Telus announced the launch of its IoT Marketplace today, an online platform that will give start-ups and other Internet of Things innovators a launching pad to commercialize their technology and give customers a one-stop-shop for IoT solutions. Among the 78 companies across Canada already signed on are Greater Vancouver’s Mojio, creators of an after-market device to connect cars to the Internet, CommandWear Systems and IoT Design Shop. At a time when the Internet of Things — a trend that is seeing everything from