Huh. I’ve been developing, strategizing and writing about connected devices for more than a decade, and we’ve all been hearing about the Internet-enabled refrigerator since 1999… and yet, as I finished a full kitchen remodel in my home, I realized that there isn’t even ONE connected device within it.
Why not? With connected food . . . → Read More: What’s Holding the Connected Kitchen Back? – Connected World August 2015
During the past 10 years, we’ve seen the take-down of just about all of the low-bandwidth networks that were originally designed to support connected machines. Ardis, DataTac, Mobitex, CDPD… even AT&T’s 2G GSM network is on the chopping block — with all of the spectrum on which these networks operate cannabilized into 3G and . . . → Read More: Not Your Father’s Network… or is it? – Connected World Magazine, June 2015
The Internet of Things opens up an expansive set of revenue and service opportunities for enterprises, yet for those benefits to be realized, IoT devices and the networks over which they communicate must be robust and secure.
Best practices for securing the networks that support the Internet of Things is the topic of this third . . . → Read More: 3 Options for Securing the IoT Network – Mobile Enterprise Security Series Part 3 – May 2015
While much of the focus given to the Internet of Things lately is centered on connected consumer products, innovation is also happening at a rapid pace in industrial and enterprise applications — including public safety. From police body cameras and license plate readers, to high-tech connected medical equipment in ambulances, to sensors monitoring road . . . → Read More: Why I Sleep Better at Night: IoT in Public Safety – Connected World Magazine – April 2015
In this second installment in our series on securing the Internet of Things, 151 Advisors’ Partner Steve Brumer and I describe the magnitude of the “threat surface” that connecting billions of devices to the Internet creates… and three best practices for securing these endpoints. . . . → Read More: 3 Best Practices for Securing IoT Endpoints – Mobile Enterprise Security Series Part 2 – March 2015
“Not Your Father’s Platform – How to Connect the Internet of Things” was the subject of a joint presentation Laurie Lamberth and Allison Jones, Software Engineer for machineshop.io, gave to the Denver/Boulder chapter of Women Who Code (WWC) on February 3, 2015. WWC is a non-profit organization hosts technical study groups, demos, hackathons and . . . → Read More: Teaching Women Who Code How to Connect the Internet of Things – February 4, 2015
When you’re thinking about security and the Internet of Things, try this thought experiment suggested by Sonotype CEO Josh Corbin:
“For the next 24 hours, every time you see the word ‘software’ substitute ‘vulnerable or hackable’ and every time you see ‘connected’ substitute ‘exposed.’ So if you take a toaster which is perfectly safe . . . → Read More: IoT Security is Not One-Dimensional – Mobile Enterprise Security Series Part 1 – January 2015
2015 stands to be a great year for all of us — I hope — and this outcome seems certain for the developers of several hot new platforms for M2M and the Internet of Things. The four new-school platforms I review in my January/February 2015 column in Connected World Magazine which blur the bright line I drew in my column between device management and application enablement platforms. . . . → Read More: Not Your Father’s Platform: M2M/IoT Platforms Evolve — Connected World Magazine, January 2015
Thanks, Onalytica, for naming me to berth 40 in in your 2014 “M2M Top 100 Influencers” list! Released on December 10, the list names the 100 people and brands that are “driving the conversation” regarding M2M in social media — particularly on Twitter. M2M is a name for the technologies that collectively underly the Internet of Things . . . → Read More: Laurie Lamberth Named #40 M2M Influencer in Onalytics M2M Top 100 – December 10, 2014