Anticipate and embrace the changes the Internet of things will bring or it will do more harm than good.
July 7, 2014
generations could not have imagined. It's how we apply and adopt these innovations that ultimately determine their usefulness. There is no doubt that if applied correctly, IoT can make almost any object "smart." But if the proper technology standards and policies are not in place, the backlash could easily stifle innovation.
As with any new technology shift, changes need to be anticipated and embraced.
For IoT, you can expect the following:
Establishing standards – As companies embrace IoT capabilities they will carry a responsibility to develop policies that govern the use of the data they collect and share those policies and the burden of security with employees and consumers. They will also have to consider the social and privacy implications that contextual data will bring.
Providing security isolation – If every “thing” now has an umbilical cord to the Internet, being able to physically isolate, manage, and secure each object independently is critical. For example, being able to disconnect an object if malicious activity is sensed to protect and secure the data. Security standards will need to evolve to support not only securing the data transmission, and inspecting the integrity of the messages, but embedding security into the object itself. This will allow software developers to create code that is secure, bounded, and able to be certified for compliance.
Executing in "safe zones" – Many of the IoT devices will connect to the Internet using embedded processors which will handle data of increasing sensitivity. Truly securing these devices will require a tight collaboration between the hardware and software applications. Semiconductor companies like ARM and AMD are creating "TrustZone" technology which is integrated into the processor and allows applications to control access to certain functions and peripherals creating a more secure operating environment that can prevent hackers from doing unauthorized cloning or firmware updates.
Preparing for the really big data – Networking technologies and standards must evolve so data can flow freely among sensors, computers, and devices. Tools to aggregate and analyze data, as well as visualize the data must improve to the point where large volumes of data can be processed and absorbed by human decision makers or synthesized to guide connected systems.
IoT has the potential to tackle big challenges such as saving energy, distributing food, and caring for elderly. If inappropriate regulation is put in place or the above issues are not addressed, we run the risk of stifling innovation and crippling the development of IoT business models.
InformationWeek's new Must Reads is a compendium of our best recent coverage of the Internet of Things. Find out the way in which an aging workforce will drive progress on the Internet of Things, why the IoT isn't as scary as some folks seem to think, how connected machines will change the supply chain, and more. (Free registration required.)
Frank Palermo
SVP, Global Technical Solutions, Virtusa, Virtusa
Frank Palermo is the head of the Global Technical Solutions Group for IT consulting and services company Virtusa. The group is responsible for creating an overall go-to-market strategy for clients in technology areas such as business process management (BPM), enterprise content management (ECM), and data warehousing and business intelligence (DWBI). Frank is also responsible for overseeing all of Virtusa's partner channels and analyst relations.
You May Also Like
Secure Your Sensitive Data from Cyber Attack
Going Beyond IT — How to Make ESM a Reality
What’s New in Network Monitoring: 2024 Edition
Cloud Crisis Management: Tech Insights Report
You’ve Been Attacked Now What?
The New Frontier of Cyber Security: Securing the Network Edge
2023 IT Salary Report
2022 State of Network Management
Secure Your Sensitive Data from Cyber Attack
Going Beyond IT — How to Make ESM a Reality
What’s New in Network Monitoring: 2024 Edition
Key Lessons for Enterprise Service Management
The Era of generative AI-enabled Security
KVM Switch High Performance Applications with Dominion KX III
Checklist: Top 6 Considerations to Optimize Your Digital Acceleration Security Spend
2022 Retrospective: The Emergence of the Next Generation of Wi-Fi
Cyber Resiliency 2023: How to Keep IT Operations Running, No Matter What
Cloud Crisis Management: Tech Insights Report
You’ve Been Attacked Now What?
The New Frontier of Cyber Security: Securing the Network Edge
2023 IT Salary Report
2022 State of Network Management
Copyright © 2023. All rights reserved. Informa Tech, a trading division of Informa PLC.

More Stories
Anatomy of a Scam
Climate and Environmental Sustainability Within the IETF and IRTF
From Commitments to Practice: Internet Society’s Priorities for WSIS+20 Implementation