Possibility of home entertainment hacking exposes #IoT users to maliciousness

“The very nature of hacking dictates that people will find the new and innovative hacking targets, such as hacking into toys, smart TVs and refrigerators which are seemingly harmless, and try and compromise them – simply because they can,” argued Lastline VP of product development, Brian Laing.

“IoT presents one of those unchartered [sic] territories where people are opening themselves up to all sorts of maliciousness, purely because these devices are connected to the internet.”

Source: Home Entertainment Tops IoT Security Fears List – Infosecurity Magazine

Is IoT the Next Industrial Revolution?

Depends on how you define Internet of Things!

Broadly defined, “smart devices” in business and the home will be a large market that likely causes disruption to many of our present day activities and use cases.

IoT often includes the category of “automation”. Automation is coming at us very fast and will soon show up in places you may not be expecting (retailers, restaurants, for example). Automation will impact and replace existing job categories. To the extent this frees up labor to work at activities that add more value, this is good. But this will require training and re-training and the upheaval may have undesirable effects for many.

Right now, IoT is in the “mania” phase where anything is imaginable and anything is possible. The “market” will eventually sort out what is desirable and needed and many of today’s hyped applications may simply vanish.

Is IoT the Next Industrial Revolution? Potentially yes! What ever shape IoT takes in the years to come, IoT will have large impacts on all of us.

Source: IoT Ecosystem – Internet of Things Predictions & Business Potential – Business Insider

“Truthfulness” of IOT Sensors depends on security

A world of IOT sensors depends on the reliability of the sensors and the sensor network to deliver accurate metrics into the IOT network. This means the security technology to preserve quality and accuracy of messages, free from network disruptions (or at least detectable disruptions) and free from modification or interception by “man in the middle” attacks.

This adds a degree of complexity – including the question of how do we exchange security keys among IOT devices?

That is the topic of this “Lightweight IKEv2: A Key Management Solution for both the Compressed IPsec and the IEEE 802.15.4 Security” paper.

 

What do we call someone who creates software?

Sample titles used:

  • Computer scientist
  • Software developer
  • Software engineer
  • Engineer
  • Computer Engineer
  • Development engineer
  • Web developer
  • Mobile applications developer (and specialties like Android apps or iOS apps developer)
  • Front end developer
  • Back end developer
  • Full stack developer
  • Devops engineer
  • Programmer
  • Computer programmer
  • Coder
  • Systems analyst
  • Information systems technician
  • Analyst/programmer
  • Database administrator (some are expected to developer database applications)
  • Software architect
  • Principal engineer
  • Senior engineer
  • Junior developer
  • Junior engineer
  • Data architect
  • Software consultant
  • Software craftsman

You can almost take a large set of nouns used in any business title and pair up with any of “engineer”, “developer”, “scientist”, “architect” and so on. The number of potential titles is huge.

Continue reading What do we call someone who creates software?

Facebook Experiments With Disappearing Posts

Facebook Experiments With Disappearing Posts.

Enables you to post something with an expiration date and time.

Many users of FB do this now but manually: they post a topic, and when challenged on the accuracy of the topic or post, they delete it.

This enables the spread of inaccurate views intended to influence others while simultaneously avoiding challenges. In the field of propaganda, the first message that consumers receive is the one most likely to stick, even when it is wrong. Propagandists know that most people share before thinking, thereby using social media as a frictionless conduit for propaganda.

Past posts about the use of social media for propaganda purposes are here.

MIT Study finds that online learning works

Some have been saying online courses do not work but an MIT study finds otherwise:

Massive open online courses are not only effective, researchers have discovered, they are as effective as what’s being traditionally taught in the classroom — regardless of how prepared or in the know students are.

via MIT Study: How Do Online Courses Compare to Traditional Learning? | BostInno.

Reality-based Thinkng on Business, Tech, Energy, Transportation