The Intelligence Inside The Internet of Things

 

There is much talk of the Internet of Things — but what are these “things” and are we all okay with what they will be doing and (more crucially) their “behaviour and state” at any given moment in time?

We normally talk about the “things” in the Internet of Things as electronically empowered devices that usually (but not always) enjoy a connection to the Internet (or some other external data channel or network) such that they can ultimately (although sometimes there’s no waiting and it’s in real time) share the data they record or produce across the pipe.

Perhaps more clinically we should also call out these things as any entity, object, unit, article, constituent or component that has a “unique identifier” i.e. an electronic tag or name that confirms its state of being in the universe.

But is the Internet of Things secure?

The arrival of the Internet of Things (and the Internet of Everything for that matter) now means that our total security landscape is far broader and is in many places a comparatively unknown place. New connected devices, embedded computing points and sensors barely feature on even the most contemporary security strategy today – this has to change soon surely?

Intel, for its part, heeds a few cautionary controls and says that no single company (or person) can create the IoT. The firm (although yes, predominatly known for microprocessor manufacturing) says it has engineered an entire ecosystem to provide the hardware, software, tools, systems integration and network and cloud infrastructure needed to accelerate development and deployment of solutions that deliver intelligence from “things” to the cloud-driven networks that will most logically work alongside them.

IoT is about moving from the transmission of raw data to local compute platforms. By placing real intelligence at the point of data, you can determine which data to save and which to send to the cloud. Being able to analyze the right data, and do so at the device, brings new efficiencies by accelerating and focusing data transmission and decision making [and from this comes security, management and control].”

Share it:
Share it:

[Social9_Share class=”s9-widget-wrapper”]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

You Might Be Interested In

Predicting Patient Experience with Narrative Data: A Healthcare Goldmine

7 Jul, 2015

  The healthcare industry in the United States is going through a major transformation and is becoming much more consumer …

Read more

Bringing the Value of Real-Time Data to Mobile Apps

10 Jul, 2015

Dr. Andy Piper of Push Technology focuses on the data gymnastics required for coupling big data and mobile apps. He …

Read more

The New 4.0 Industrial Revolution is coming

26 May, 2015

  Over the past 25 years, the Internet has radically altered the way people communicate and share ideas and the …

Read more

Do You Want to Share Your Story?

Bring your insights on Data, Visualization, Innovation or Business Agility to our community. Let them learn from your experience.

Get the 3 STEPS

To Drive Analytics Adoption
And manage change

3-steps-to-drive-analytics-adoption

Get Access to Event Discounts

Switch your 7wData account from Subscriber to Event Discount Member by clicking the button below and get access to event discounts. Learn & Grow together with us in a more profitable way!

Get Access to Event Discounts

Create a 7wData account and get access to event discounts. Learn & Grow together with us in a more profitable way!

Don't miss Out!

Stay in touch and receive in depth articles, guides, news & commentary of all things data.