Devices, Connections and Security across The Internet of Things

Devices, Connections and Security across The Internet of Things

By 2020 there will be almost 30 billion devices connected to the internet. The actual number has variations; Gartner suggests a sum of 26 billion, IDC a sum of 32 billion and MIT 28 billion ,this is 5 times the amount of devices connected today.

InternetofThings Overview

That is 30,000,000,000 devices riding a system that lacks technical standards, this is the #InternetOfThings #IOT you may here so much about. The key defining point in history will be that the internet will no longer be a system where humans add, upload and share their information but a place where that data will be done mostly via devices. Therefore the need for analytics software to decipher patterns, trends and true chaos will also increase. We shall identify new signals within prior “noise” based data sets.

There is a very exciting time ahead and here I also share some questions and examples of the current stare across the globe for the Internet of things.

IOT Device

Some positive examples of IOT is as follows:

1.       GlowCaps on medical bottles to remind the patient to take their medicine.

2.       Activity levels (already seen on smartphones) for sports and other activities

3.       Wearable alarm clothing for aged people

4.       Home appliance control remotely

5.       Lost key tracking devices

6.       Pollution warning devices

7.       Stress gauges in construction

8.       Maintenance sensors for improved planning and cost savings

9.       Clear access to safety equipment

10.   Process sensors for process control in manufacturing

An interesting trend in this future world is how much the “developed” world is slipping behind the rising economies. Currently APAC is investing heavily into the IOT with 40% of devices, followed by Europe at 29% and the home of Silicon Valley, Facebook, Microsoft and Apple is a lagging 19%. Meanwhile Latin America and Africa holds considerable explosive potential from their equal 4% positions. In a Microsoft survey across APAC 79% of CIO’s highlighted IOT as the second most disruptive technology to organizations in the region. The government in Taiwan for example improved commute times by installing automatic booths connected through IOT.

·         Question: How will your business use IOT to gain competitive edge?


The current range of systems these devices operate over include Bluetooth, radio frequency identification (RFID), WLAN, Near Field Communication (NFC), Thread and Zigbee with new developing potential technologies on their way from current business and university labs across the globe. A key challenge here will be the compatibility of their communications and maintenance of unlicensed frequency bands from region to region without interference.

The over reliance on these connection methods requires build in safety mechanisms to deal with unusual events such as power failure, solar flare, reception interference and other connection drops of lost signal.


Some typical examples of current Bluetooth connected devices include:

1.       Smartphones

2.       Cars

3.       Stereo systems

4.       Heart rate monitors

5.       Treadmills

6.       Proximity sensors

7.       Food thermometers

8.       Pool cleaner

9.       Medical monitors

10.   Pet Activity trackers

·         Question: Which sensor language standards does your business employ already?

Piracy Image

The data security is an obvious concern to many advocates and this is an area my business JAMSO raises most risk concerns to companies. To define the correct encryption models is important to reduce risk of private information and industrial espionage. We see almost weekly new cases of hacking, data loss, shut down of services from expert criminals and national state security services in the field.

Examples of hacked and lost data:

1.       Target hacking case for data breach in 2013 (cost Target $10million)

2.       Israel hacking of Iran

3.       Anthem 80,000,000 records

4.       Home Depot 56,000,000 records

5.       JP Morgan Chase 76,000,000 records

6.       Ebay 145,000,000 records

7.       Premera 11,000,000 records

8.       IRS (American Tax Service) 100,000

9.       British Airways “tens of thousands”

10.   US Office of Personnel Management 14,000,000

·         Question: What does your business do currently and plan in future to retain data security?


Now you have the answers to my 3 questions what action plan will you create to improve your company position in the future?


The three main areas I have covered so far include devices, connection methods and security. These are the foundation corner stones of a robust Internet of Things project and direction for your business. There are many examples easy to be found showing large scale success in each area and some great work been done to ensure the integrity of the system.

Analytics will be supported through artificial intelligence and machine learning to automate some of the mundane analysis and reporting skills required. The speed of technological change raises concerns from many but I remain optimistic of a positive human experience will be gained from embracing the IOT changes.

The elements need to be considered now by each business model to seek methods of competitive advantage, create the correct planning methods and budgeting for inclusion and investment. Collaboration will be required across new supplier bases with specialist knowledge and skills to help a business through the current complex path and journey.

small business conference

The Internet of Things does not have to be the domain of the largest corporations but can be used by small companies to raise quality and rapid delivery of innovative products from demand driven and demand predicted technology. Additional opportunities include small business collaborating to form new networks of global services (think Uber style). New scales in niched products will generate great true global capabilities across the world and open the doors to other rising economies such as Africa and South America.

What Internet Of Things questions or experiences have you had so far this year?

Further Reading and Reference

Microsoft blog on IOT

Wireless connectivity of IOT

Blog on hacked cloud sources

Great updated infographic on hacked sites

JAMSO provides training content to boost your business performance in goal setting, KPI management and business intelligence solutions.