Skip to content

Archive for

18
Mar

What is the Internet of Things? 


The Internet as we know it is going to change. Today it is a global network which connects people. We use desktops, laptops, tablets, and phones to communicate with each other. Often the information we send around goes via servers which run web sites, email software, etc. Broadly speaking this means that the Internet is made up of people, client devices, and servers.

A whole new category of actors is being added to the Internet. These new participants aren’t people and have been unglamorously named as “things,” hence the term “Internet of Things.”

But a whole new category of actors is being added to the Internet. These new participants aren’t people and have been unglamorously named as “things,” hence the term “Internet of Things.” A “thing” can be almost any object with at least one sensor and a way to transmit data. Examples of such sensors include temperature sensors, traffic sensors, flow-rate monitors, energy usage monitors, and so on. A temperature sensor can be placed in a smart thermostat, a smart electricity usage meter can be wired into a house, or a traffic monitor can be placed into a traffic signal. These things then send that data further up the chain until either a person or a piece of computer software makes some decision based on that data.

It won’t be long, and it may have already happened, but there will be more things on the Internet sending data around than actual people using Internet enabled devices. The cell phone, the Internet, email, social media, and smartphones have all changed the way we do things, both at a personal level and at a business level. Clearly the Internet of Things will also affect our personal and professional lives, how exactly hasn’t yet been fully understood, but affect us it will.

Challenges

There are several big challenges ahead for the embryonic Internet of Things. There are technological challenges in terms of the actual devices that collect and send data, these challenges include both hardware and software issues like battery life, maintenance, interoperability, and compatibility. There are big data issues around building systems that can process all of this data and use it to achieve meaningful tasks. There are also security and privacy problems, who wants to have a smart home that can be hacked? Or worse still a smart hospital that can be breached remotely. As we move from individual smart homes to smart cities, which have smart transport systems and smart infrastructure, then all these issues become more complex and more difficult to solve correctly.

The reality of the Internet of things from a consumer point-of-view took a giant leap forward this year when Samsung’s co-CEO took to the stage at CES 2015 to declare that all Samsung’s products will be Internet-of-Things (IoT) enabled within five years. If 2020 sounds like a long way off to you, he also said that 90% of Samsung products would be able to connect to the web by 2017. Samsung’s plans are for every washing machine, air conditioning unit, and microwave oven to be IoT enabled. Yoon said in his speech, “five years from now, every single piece of Samsung hardware will be an IoT device, whether it is an air purifier or an oven.”

Samsung-100-percent-IoT-in-5-years

In his speech the co-CEO also highlighted that the IoT experience needs to be seamless for the consumer. “We have to create an open IoT ecosystem,” said Yoon. “The IoT experience needs to be seamless.” To that end Yoon promised that all of Samsung’s products would be built on open platforms. “Our IoT components and devices will be open. We will ensure that others can easily connect to our devices,” Yoon said during his keynote. “Without this kind of openness, there won’t be an Internet-of-Things.”

ARM

I predict that this road to a “seamless experience” will be quite bumpy, but companies like ARM are trying hard to make the journey as smooth as possible. Towards the end of 2014, ARM announced a new operating system to boost the development of IoT devices. Called ‘mbed OS’, it is a free operating system for ARM’s Cortex-M range of microcontrollers. One of the key points about mbed OS is that it supports the important IoT protocols, and allows anyone from a hobbyist developer to a multiple-million dollar corporation to prototype and develop IoT devices. mbed OS will include all the functionality needed to create an IoT device and to transmit that data to the cloud. It supports lots of different communication stacks including IPv4, IPv6, 6LoWPAN, Bluetooth, Wi-Fi, 2G GSM, and 3G.

mbed-os

mbed OS is also interesting in that it falls into a special class of operating system. When talking about Internet enabled devices, there are four main categories of operating system. In a smartphone you get an OS like Android, which is itself built on Linux. That is what we call a multi-tasking OS. But a multi-tasking OS requires relatively lots of resources. A modern smartphone has a quad-core or octa-core CPU, a GPU, at least 1GB of memory and so on.

A typical IoT device will use an ARM Cortex-M processor running at less than 100MHz. That is quite different to the 1.5 to 2.5GHz processors that are found in smartphones. Likewise they will only have a maximum of 256KB of RAM, often much less. Again this is quite different to the RAM on a smartphone.

ARM-mbed-IoT-starter-kit

So, for embedded applications there are three further classes of OS. Next is an RTOS, a Real Time Operating System. These are designed to run on resource limited processors and their key functionality is that the OS has a predictable scheduler. This means that different tasks are guaranteed to run in a certain order and within certain timing constraints. This class of OS is very important for the computer systems in cars, airplanes and industrial systems. However they aren’t very power efficient, something that is essential for IoT devices.

The next class of operating system isn’t really an OS. Known as the bare metal approach, it means the device software runs in an infinite loop and access to the hardware is handled by some drivers supplied by the board makers. This is the simplest way of programming an embedded device and probably something that people who have used an Arduino are familiar with.

The last class is the low-power operating system. mbed OS is an example of a low-power operating system. Its primary concern is with saving power (i.e. battery life). The OS is designed in such a way that it doesn’t wake from its sleep state unnecessarily, and it responds to events rather than continuously running and polling.

Low-power operating systems are perfect for IoT devices that need to have long battery lives, and remain deployed for long periods of time.

Structure

So what does the Internet of Things look like in terms of its structure? It is quite simple. At the “Thing” end you have small devices which monitor something, a door or window sensor, a heart-rate monitor, a temperature monitor, and so on. These devices transmit that data to another, more complex device. It could be a smartphone; it could be a control unit of some kind, like a smart thermostat, or it could be to a dedicated device that acts as a gateway to the Internet. This last category of device is known as an IoT Gateway. They are important because the sensors often don’t have a direct Internet connection. They probably only have Bluetooth or some other low power connectivity like ZigBee. Once the IoT gateway has received the data from the sensor it can be sent into the cloud.

ARM-Little-Data-Enables-Big-Data

Part of ARM’s strategy can be seen in its mbed OS Device Server. While a web server would accept connections from web browsers running on PCs or smartphones, the mbed OS Device Server handles the connections from IoT devices. It uses open source protocols including HTTP for data communication and device management. The mbed OS Device Server would sit behind an IoT gateway and would use the gateway to talk to the IoT devices. It can also send the collected data higher up into the cloud.

Imagine you wanted to control the temperature in your house. Your air conditioning unit will be monitoring the temperature, and either keeping it at a certain level or programmed to come on at a set hour. This data is collected and sent up to the cloud for you to monitor via the web or on your smartphone. If you manage to get out of work early you might want to switch on the air conditioning unit earlier so that the house is nice and cool when you arrive. You can send that command via your smartphone and it will be relayed back to the unit. Related smart city scenarios can be imagined with regards to traffic control, street lighting, and so on.

Security

This all sounds very Utopian, but of course there are dangers. With all these devices sending data and receiving commands it won’t be long before the hackers are drawn in. A recent security report from Intel’s McAfee Labs singled-out IoT as a potential area for security problems. The report says that IoT related attacks will increase rapidly due to the predicted fast growth in the number of connected objects, many of which will have poor levels of security.

mcafee-iot-security2

At a white-hat hackers conference in 2013, researchers demonstrated how easily some Internet-connected security cameras can be hacked. Once breached the hackers can steal the video feed from the camera and gain entry to the camera’s network. During 2014 there have been several cases of attackers who have hijacked baby monitors and spied-on or even screamed at babies in their bedrooms. The BBC recently published an article about a website dedicated to streaming live feeds of hacked baby monitors and webcams. All this is both creepy and disturbing.

M2M

Another important concept for the Internet of Things is M2M, or Machine to Machine. At one level M2M is what it says it is, a way for one machine to talk with another machine. However in this context it means how a connected device talks to the cloud. It also includes how these devices are managed. M2M isn’t new in the sense that we are all used to one device talking to another device. File transfers over Bluetooth, app updates over Wi-Fi, even emails are examples of how one machine talks to another to achieve a task. However the special thing about M2M in terms of IoT is that these connected devices a) have a low-power usage, b) aren’t always “on”, and c) are limited in terms of resources (e.g. processing power, memory, and so on).

coap-web-of-things-protocol

 

ARM’s mbed OS will support several different M2M protocols including CoAP. The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use within the Internet of Things. CoAP uses URLs along with the HTTP methods like GET, PUT, POST, or DELETE. This means that obtaining a value from a sensor is not much different than obtaining a value via a Web API.

Conclusion

All this technology sounds great for the consumer, but probably the big money is to be made on larger scale projects. Smart buildings, smart cities, and IoT enabled businesses are where the large contracts will be. Whole infrastructures enabled for IoT or end-to-end business processes using IoT at every step. Everything from garbage to electricity, from trams to taxis, and from parcels to productions lines can be built to use IoT. The initial investment will be high for businesses, however the benefits will likely save money in the long term.

The IoT revolution is really only just beginning and there will be lots of advancements over the next few years. How we arrive at the seamless IoT experience will be interesting to watch, and on the way I am sure we are going to see some great innovation from some surprising sources.



18
Mar

ZTE Nubia Z9 leaks in photos showing fingerprint scanner and all-metal body


zte nubia z9 3ZTE’s latest Zubia Z9 has appeared in some photos online, showcasing the general design of the device. The Z9 is supposed to use a 5+ inch screen, and it’s pretty clear that this is going to be a very large device when you see it next to an iPhone 6.

Aside from screen size, we can see the phone sports smoothed, rounded edges and an all-metal body. It looks very, very thin, too, which makes sense for a flagship device in 2015.

The back of the phone houses the camera and what will likely end up being the fingerprint scanner, plus an LED flash and speakers at the bottom of the device. It does have capacative buttons, not on-screen buttons, which could be a deal breaker for some. That ultra thin bezel might change some minds, though.

source: Gizmochina

zte nubia z9
zte nubia z9 3
zte nubia z9 2

Come comment on this article: ZTE Nubia Z9 leaks in photos showing fingerprint scanner and all-metal body

18
Mar

DeNA gets in with Nintendo to bring original games to mobile in the future along with membership service


Just about every Android user I have known has one, if not two, emulators installed to their device. The original Nintendo emulator and the original Playstation are probably the two most prolific. While they work out pretty well most of the time, that doesn’t mean we don’t long for titles to be directly available. Sega […]

The post DeNA gets in with Nintendo to bring original games to mobile in the future along with membership service appeared first on AndroidSPIN.

18
Mar

Windows 10 launches this summer in 190 countries


Microsoft’s leaner, meaner, latest iteration of Windows is coming in just a few months, and it’s launching in 170 countries, in 111 languages. Don’t forget: Windows 10 is a free upgrade if you’re already using Windows 7 or 8. Hiding in its imposing shadow, and launching at the same time, the company will release special free version of its OS for Internet of Things devices, which Microsoft’s Terry Myerson reckons could well find its way into ATMs and ultrasound machines.

Filed under: Desktops, Laptops, Microsoft

Comments

Source: Windows Blog

18
Mar

Windows 10 launches this summer in 190 countries


Microsoft’s leaner, meaner, latest iteration of Windows is coming in just a few months, and it’s launching in 170 countries, in 111 languages. Don’t forget: Windows 10 is a free upgrade if you’re already using Windows 7 or 8. Hiding in its imposing shadow, and launching at the same time, the company will release special free version of its OS for Internet of Things devices, which Microsoft’s Terry Myerson reckons could well find its way into ATMs and ultrasound machines.

Filed under: Desktops, Laptops, Microsoft

Comments

Source: Windows Blog

18
Mar

Banks still trying, failing to deflect fraud onto Apple Pay


There is absolutely no reason for anyone using Apple Pay to be concerned at all about using Apple Pay.

It’s important to keep saying that because publications keep making it a point to link Apple Pay and “fraud” in their headlines. It’s important because those publications are spreading fear, uncertainty, and doubt about Apple Pay, which makes mobile payments more accessible and secures the very data often used to actually commit fraud, to the people for whom it is most beneficial. That’s why, as the FUD keeps coming up, we’re going to keep addressing it. Latest case in point, New York Times:

The vulnerability in Apple Pay is in the way that it — and card issuers — “onboard” new credit cards into the system.

There’s no “vulnerability” in Apple Pay. Apple Pay remains so secure the only way fraudsters can take advantage of it is though traditional social engineering attacks against banks.

Because Apple wanted its system to have the simplicity for which it has become famous and wanted to make the sign-up process “frictionless,” the company required little beyond basic credit card information about a user. Nor did it provide much information to the banks, like full phone numbers and addresses, that might help them detect fraud early.

Apple publicly documents the information it provides to banks, which includes the last four digits of the phone number, as well as select device and iTunes account information. If my bank gets the last four digits of my telephone number, and compares them with what they have on file for me, they should easily be able to get my address and any other information on that file. Likewise the iTunes account information. And compare it. And come to an informed decision as to what path needs to be followed for verification.

Some bank executives acknowledged that they were were so scared of Apple that they didn’t speak up. The banks didn’t press the company for fear that they would not be included among the initial issuers on Apple Pay.

This very much feels like banks throwing Apple under the bus — or into the headlines — because they didn’t take action to prevent fraud and want to shift blame. Here’s what was previously reported:

The effects of those incidents are being felt for some time after the breaches in large part because financial institutions that issue cards typically don’t launch broad-scale replacements of the affected plastic after a merchant is hacked.

The card companies figure that the cost of potential fraud is often less than giving each customer a new card, according to payment experts and bank executives, and customers sometimes complain about the inconvenience of having to switch to new cards.

In other words, the banks ran the numbers and chose not to take measures that would have prevented fraud because it was cheaper for them simply to handle the fraud. That’s fine. That’s their business and their choice. Their choice not to cancel the card data, their choice to approve it for Apple Pay, and their responsibility for the resulting fraud.

Back to the Times:

It also appears that banks set up a flawed process to deal with the credit cards that it did flag. Affected users were directed to a customer care phone center, not a fraud prevention center. A customer care center’s mission is to help customers use their cards, leading more fraudulent cards to be approved for use on Apple Pay.

Again, banks.

Some Apple supporters have sought to discredit Mr. Abraham based on his affiliation as an adviser to a company that is based on Apple’s main competitor, Android. While he may indeed be conflicted, he has rightfully raised an important security issue that all sides have acknowledged is a problem, though perhaps not to the extent he has contended.

It should have nothing to do with who is affiliated with whom. It should only have to do with accurate reporting of the facts.

Apple has now begun providing additional information to the banks that should help deter some of the fraud. The banks, which are responsible for the costs of the frauds, have toughened standards to review customer sign-ups on Apple Pay. No bank executive would speak with me on the record for fear of upsetting their company’s relationship with Apple.

Apple Pay provides enormous usability and security benefits. If the process on the bank’s end can be strengthened as well, that’s great for them, and great for retailers. (Apple has created a new Apple Pay FAQ to help.)

It’s still incredibly curious that so many headlines appeared so quickly, all based on one blog post. Single sourcing isn’t usually what publications the stature of the Wall Street Journal or New York Times pride themselves on. It’s also unfortunate that a problem facing banks and retailers was spun in a way that could, potentially, scare end-users who have absolutely no reason to be scared.

Worse, if there ever is a real problem with Apple Pay, something that people need to be made aware of, there’s a risk of it getting lost in all the not-real noise.

The latest round reads like they’re aware initial coverage has been recognized for the FUD that is was and they’re simultaneously trying to back away while still maintaining as much cover under Apple as they can. My guess is that they’re not backing away far enough, fast enough, and people are going to continue to realize the bad, potentially harmful coverage for what it is.

And that could be an even bigger problem for the people behind it.

18
Mar

Purchase a Moto X before March 24 and get a free Moto E


A new promotion from Motorola gifts a free Moto E to those who purchase a Moto X Pure Edition (2nd Gen) before March 24.

If you have been waiting for the right time to purchase the Moto X and none of the previous deals have enticed you, Motorola’s new deal may be the one. Simply add a new Moto X Pure Edition to your cart, then add the 2nd gen Moto E to your cart which will be free, normally $119, at checkout.

18
Mar

Latest Humble Bundle delivers 7 Android games and their PC counterparts


Every gamer’s favorite stop for games on the cheap, Humble Bundle, is back again, this time with a bundle that includes Android and PC titles.

Humble PC and Android Bundle 12 offers up 7 Android games along with their PC counterparts, totaling $136 worth of games for as little as $10.

18
Mar

Deal: Amazon is offering two Omaker external battery packs for cheap


Omaker Battery Pack 1

External battery packs are a great way to keep your mobile devices charged up while you’re on the go. The last thing you need is for your smartphone to lose its charge while you’re out and about – especially when there’s no power outlet to be found. If you’re constantly running out of juice on your smartphone or tablet (and who isn’t), Amazon may have a few deals that could fit your needs.

First up is the Omaker Intelligent 10,000mAh Battery Pack (pictured above), which is currently being offered for only $18.69. The normal retail price of this pack is usually around $30, so this is a pretty great deal. The big 10,000mAh battery capacity is more than enough to charge your smartphone multiple times. Also, it has a handy flashlight built-in for some extra convenience. The discount applies to both Black and White models.

Omaker Battery Pack 2

The second battery pack being offered at a discount is the Omaker Premium Dull Polish Finish 15,600mAh Battery Pack. While the Amazon listing reads $29.99, if you enter in a coupon code, you’ll be able to drop the price down to $24.99. During checkout, enter in the code “22NUA55F” and you’ll receive the $5 discount. The price reduction applies to both Blue/Grey and Orange/Grey variants. We rarely see a battery pack of this size being offered for only $25, so you may want to take advantage of this one before it’s too late.

Both battery packs listed here have received positive reviews from Amazon shoppers, and are both rated above 4.5/5 stars on the website. If you’re interested in picking any one of these up, follow the links below.

Omaker Intelligent 10,000mAh Battery Pack

Omaker Premium Dull Polish Finish 15,600mAh Battery Pack



18
Mar

Verizon Nexus 6 revealed to be carrying a different build number


verizon_nexus_6_official

The Verizon branded Nexus 6 is revealed to be packing a new build number for its Android 5.1 ROM, something which we haven’t seen before. Known as LMY47E, it’s different from other Android 5.1 builds that we saw for the Nexus 6 (LMY47D).

It was initially believed that this is a new build of Android 5.1 for Nexus 6 handsets, but a quick clarification cleared out our doubts. So if you stumble across this particular version on the Android Developers site, make sure you proceed with caution as it might not function well with other variants of the Nexus 6.

It is said that the Verizon Nexus 6 comes with this build number by default, but strangely, it has taken this long to hit the Android Developers page.

If you’re a developer and would like to modify the Verizon specific Android 5.1 ROM, make sure you download it from the link below.

Source: Android Developers

Come comment on this article: Verizon Nexus 6 revealed to be carrying a different build number