It’s important for data scientists to work together with IT departments and engineers to extract the most value from data gathered by IoT deployments, according to IDC’s 2019 predictions about the IoT.To read this article in full, please click here(Insider Story)
Wi-Fi 6 – aka 802.11ax – will begin to make its way into new installations in 2019, bringing with it a host of technological upgrades aimed at simplifying wireless-network problems.The first and most notable feature of the standard is that it’s designed to operate in today’s increasingly congested radio environments. It supports multi-user, multiple-input, multiple-output (MU-MIMO) technology, meaning that a given access point can handle traffic from up to eight users at the same time and at the same speed. Previous-generation APs still divide their attention and bandwidth among simultaneous users.[ Also see Wi-Fi 6 is coming to a router near you. | Get regularly scheduled insights by signing up for Network World newsletters. ]
Better still is orthogonal frequency division multiple access (OFDMA), a technology borrowed from the licensed, carrier-driven half of the wireless world. What this does is subdivide each of the available independent channels available on a given AP by a further factor of four, meaning even less slowdown for APs servicing up to a couple dozen clients at the same time.To read this article in full, please click here
Much of the hype around the Internet of Things is centered on a decentralized model of deployment – edge computing, where specialized devices sit close to the endpoints they’re managing or monitoring, is very much the flavor of the month.Yet the cloud and the data center are still critical parts of the infrastructure, and the huge growth in IoT deployments is having an effect on them, as well. Even deployments that lean heavily on edge compute can stream data back to a central hub for more detailed analysis. So it’s tough to argue that rise of IoT hasn’t changed requirements and expectations in the data center.To read this article in full, please click here
It’s a measure of how big and meaningful a particular technology trend is when big companies that weren’t necessarily in on the ground floor start making a major push for relevance in the market. A couple years ago, every tech company in the world couldn’t wait to tell you about how into the cloud they were, and the same thing is happening to IoT. The pivots, they are a-comin’.This month, some of the heavy hitters moving to make themselves more appealing to the burgeoning IoT market are content delivery networks (CDN) like Akamai and Limelight, both of which were eager to trumpet their edge credentials.
More on IoT:To read this article in full, please click here
802.11ac wave 2 is the splashy new kid in the wireless technology pool, but some experts caution that you might not want to let it play without lifeguards present just yet.Wave 2 access points are now available from major wireless vendors, and have started to make inroads into the enterprise. The technology has been gaining ground in sales statistics recently, to the point where it’s starting to undercut sales of first-gen 802.11ac gear.+ALSO ON NETWORK WORLD: Study shows 802.11ac wave 2 APs gaining sales ground + US lawmakers question police use of facial recognition techTo read this article in full, please click here
Just when we were all getting used to the IEEE 802.11 Wi-Fi nomenclature that differentiates between generations of the technology, the industry’s Wi-Fi Alliance has gone and made it simpler and more digestible for the user on the street.As a result, starting this month what we know as 802.11ax is officially called Wi-Fi 6.[ Find out how 5G wireless could change networking as we know it and how to deal with networking IoT. | Get regularly scheduled insights by signing up for Network World newsletters. ]
The new, vastly simplified system also means that 802.11ac is now Wi-Fi 5, and 802.11n is Wi-Fi 4. The idea, according to the Wi-Fi Alliance, is to make matching endpoint and router capabilities a simpler matter for the rank-and-file user of Wi-Fi technology.To read this article in full, please click here
Like any kind of large-scale computing system deployment ever, the short answer to the question “what should my fog compute deployment look like” is going to be “it varies.” But since that’s not a particularly useful piece of information, Cisco principal engineer and systems architect Chuck Byers gave an overview on Wednesday at the 2018 Fog World Congress of the many variables, both technical and organizational, that go into the design, care and feeding of a fog computing setup.Byers offered both general tips about the architecture of fog computing systems, as well as slightly deeper dives into the specific areas that all fog computing deployments will have to address, including different types of hardware, networking protocols, and security.To read this article in full, please click here
In a wide-ranging, free-form chat on Tuesday night in San Francisco at the 2018 Fog World Congress, legendary computing figure Steve Wozniak discussed the future of technology and its role in making the world a better place.Taking the stage alongside the senior director of Cisco’s corporate strategic innovation group, Helder Antunes, Wozniak took the audience through his personal history with technology, from phone hacking in the late 1970s, through his up-and-down relationship with Steve Jobs and Apple, to his current role as a sort of ambassador for the good that technology can do for the world.To read this article in full, please click here
It’s the classic Industrial IoT problem – a 40-plant network of old-school manufacturing and production lines, run digitally by 9,000 outdated programmable logic controllers running on legacy Windows industrial PCs, was having difficulty in minimizing downtime.According to fog computing and automation startup Nebbiolo Technologies – which declined to name the client directly, saying only that it’s a “global” company – the failure of one of those Windows IPCs could result in up to 6 hours of downtime for said client. They wanted that time cut down to minutes.
More on IoT:
What is the IoT? How the internet of things works
What edge computing is and how it’s changing the network
10 hot IoT startups to watch
The 6 ways to make money in IoT
What is digital twin technology and why does it matter?
Getting grounded in IoT networking and security
Building IoT-ready networks must become a priority
What is the Industrial IoT? Why are the stakes so high?
It’s a tricky issue. If those 9,000 machines were all in a data center, you could simply virtualize the whole thing and call it a day, according to Nebbiolo’s vice president of product management, Hugo Vliegen. But it's a Continue reading
An academic researcher’s talk on Monday at the Fog World Congress in San Francisco demonstrated both the limits of distributed computing structures and their critical importance to future IoT and augmented reality (AR) implementations.Dr. Maria Gorlatova’s recent work has centered on the study of fog and edge architecture – specifically, the way in which particular methods of architecting those systems can affect latency and response time. She's studying the differences in systems which are on- and off-campus, that have different points of execution, which seems like the academic way of saying “where the computational work is done.”To read this article in full, please click here
We’re back! Here’s the latest monthly roundup of big and not-so-big news in the world of IoT, ranging from carrier doings to a neat little startup. Buckle up.California legislates IoT securityCalifornia’s state legislature this month sent a bill to Gov. Jerry Brown’s desk that would mandate the use of “reasonable” security features in any connected devices, which are defined as any device that “is equipped with a means for authentication outside a local area network.” So, essentially, anything that can be accessed via the Internet would be subject to SB 327.To read this article in full, please click here
We’re back! Here’s the latest monthly roundup of big and not-so-big news in the world of IoT, ranging from carrier doings to a neat little startup. Buckle up.California legislates IoT security
California’s state legislature this month sent a bill to Gov. Jerry Brown’s desk that would mandate the use of “reasonable” security features in any connected devices, which are defined as any device that “is equipped with a means for authentication outside a local area network.” So, essentially, anything that can be accessed via the Internet would be subject to SB 327.To read this article in full, please click here
Edge computing can greatly improve the efficiency of gathering, processing and analyzing data gathered by arrays of IoT devices, but it’s also an essential place to inject security between these inherently vulnerable devices and the rest of the corporate network.First designed for the industrial IoT (IIoT), edge computing refers places placing an edge router or gateway locally with a group of IIoT endpoints, such as an arrangement of connected valves, actuators and other equipment on a factory floor.To read this article in full, please click here
Update:
On Sept. 16, 2018, after being questioned by The New Yorker about his abusive behavior, Linus Torvalds apologized for his conduct and announced he was stepping back from kernel development to get help understanding people's emotions and how to respond properly. In addition, for the first time, the Linux community will be adopting a Code of Conduct to create a welcome and opening environment. -----------------------------------------------A prominent Linux kernel developer announced today in a blog post that she would step down from her direct work in the kernel community, saying that the community values blunt honesty, often containing profane and personal attacks above “basic human decency.”To read this article in full, please click here
Update:
On Sept. 16, 2018, after being questioned by The New Yorker about his abusive behavior, Linus Torvalds apologized for his conduct and announced he was stepping back from kernel development to get help understanding people's emotions and how to respond properly. In addition, for the first time, the Linux community will be adopting a Code of Conduct to create a welcome and opening environment. -----------------------------------------------A prominent Linux kernel developer announced today in a blog post that she would step down from her direct work in the kernel community, saying that the community values blunt honesty, often containing profane and personal attacks above “basic human decency.”To read this article in full, please click here
Greater cooperation among standards bodies, corporations, city governments and other stakeholders is needed so IoT and existing smart-building technology can work together to deliver the full potential of smart cities, according to a Georgia Tech study.The problem is that standards are lacking for current in-building systems, let alone having standards so they can share with newer IoT devices.[ Check out our corporate guide to addressing IoT security. ]
One vendor of automation software for, say, elevators might use a much different data format than the manufacturer of a given building’s HVAC systems, making it difficult to integrate these two critical systems into the same framework.To read this article in full, please click here
Greater cooperation among standards bodies, corporations, city governments and other stakeholders is needed so IoT and existing smart-building technology can work together to deliver the full potential of smart cities, according to a Georgia Tech study.The problem is that standards are lacking for current in-building systems, let alone having standards so they can share with newer IoT devices.[ Check out our corporate guide to addressing IoT security. ]
One vendor of automation software for, say, elevators might use a much different data format than the manufacturer of a given building’s HVAC systems, making it difficult to integrate these two critical systems into the same framework.To read this article in full, please click here
One way of looking at IoT deployments is this – a large array of not-particularly-sophisticated endpoints, mindlessly sending individual data points like temperature and pressure levels to either an edge device somewhere on a factory floor, or all the way out to a cloud back-end or data center.And that’s largely correct, in many cases, but it’s increasingly not the whole story – IoT endpoints are getting closer and closer to the ability to do their own analysis, leading to simpler architectures and more responsive systems. It’s not the right fit for every use case, but there are types of IoT implementation that are already putting the responsibility for the customizing their own metrics on the devices themselves, and more that could be a fit for such an architecture.To read this article in full, please click here
Welcome to what we’re hoping is the first in a long string of regular updates from the world of IoT; everything from security to platform news will be fair game, and the aim is to help you be better grounded in the rapidly expanding Internet of Things space.Schneider’s building open thingsSchneider Electric, the Andover, Mass.,-based building-infrastructure manufacturer, recently rolled out a new open framework for IoT implementations, dubbing the product EcoStruxure Building.[ Check out our corporate guide to addressing IoT security. ]
It’s a software platform that makes it easy for sensors and controllers to talk to each other, even in complicated, large-scale building projects where there could be a lot of both types of devices.To read this article in full, please click here
A Cambridge, Massachusetts, research lab is addressing some of modern medicine’s most overlooked issues with cutting-edge IoT technology and an open-source approach, weaving aging devices and deeply siloed data into an accessible web of medical information.The Medical Device Interoperability Program, or MD PnP, in affiliation with Massachusetts General Hospital and Partners Healthcare, is a hub for research into making medical devices dramatically smarter by making it simpler for them to share the data they gather.[ For more on IoT see tips for securing IoT on your network, our list of the most powerful internet of things companies and learn about the industrial internet of things. | Get regularly scheduled insights by signing up for Network World newsletters. ]
With more and more people being monitored by IoT devices in hospitals and monitoring themselves with Fitbits and Apple watches, there’s suddenly a lot more digital data than there was before in the world of healthcare.To read this article in full, please click here