From the Blogosphere
Bernd Leukert's Take on the 'Internet of Things' | @ThingsExpo [#IoT]
From the list of IoT collected in this article there is but one conclusion, it is not just IoT by IOET
Dec. 24, 2014 12:00 PM
SAP Executive Bernd Leukert's take on IoT
SAP's Bernd provides an overview of the myriad of IoT's that will be arriving at our door steps in the coming months and years. Some of them have already made their precense felt and more of them on the threshold.
As far as busines value is concerned it appears to be a deluge. It is anticipated that billions of devices will be interconnected and our private lives are forever compromised.
From the list of IoT collected in this article there is but one conclusion, it is not just IoT by IOET (internet of every thing).
Here is a compiled list that Bernd describes at length:
- The Internet of Home - HomeKit by Apple for iOS8
- The Internet of Health - fitbit, Apple's HealthKit, Jawbone, Helius System with ingestible sensor, etc. but fails to mention Microsoft & IBM related news
- The Internet of Fashion- Intel's Smart Shirt, Smart Clothing for monitoring and acting on body messages
- The Internet of Traffic - Cisco's Connected Transport Challenge not mentioned
- The Internet of Environment -Smart America Expo,
- The Internet of Sustainability--AT&T and the carbon Wra room
- The Internet of Retail- Connected Vending Machines
- The Internet of Logistics - track and trace systems
- The Internet of Assets - enterprise asset management
- The Internet of Design -smart products
- The Internet of Manufacturing-100 Million M2M devices going to grow 7 times more
- The Internet of supply Chain- Jetsons Supply Chain, autmatic warehousing and transport
Read details here.
All this is fine but the lingering questions raised by many is really about security. Do all vendors address security issues at the same level of seriousness? For example, a toothbursh manufacturer (with low resources at his disposal) making his device an IoT may very well compromise other connected devices. One cannot assume that the hackers will sit by silently. They will have more opportunity to diversify. If they can hack Google, Microsfot they can hack into the smaller fries.
Read the original blog entry...