INTERNET OF THINGS WITH EVA KAILI: FUTURE CHALLENGES


Future challenges

Eva Kaili, Member of the European Parliament, Chair of STOA, the European Parliament’s Science and Technology Options Assessment body talks about education systems, the digital single market, policy makers and the need for an Ai ethics code.

Brianna Reid

IoT loses its distinction without sensors. They act as defining instruments which transform IoT from a standard passive network of devices into an active system capable of real-world integration.

Elfriede Rothenberg

New enabling technologies for networking, and specifically IoT networking, mean networks are no longer exclusively tied to major providers. Networks can exist on a much smaller and cheaper scale while still being practical. IoT creates these small networks between its system devices.

Анета Владимирова

We all know we should try to use less electricity, water and other resources, but actually changing our habits can be hard — especially when we can't see the immediate impact of our actions. A number of IoT products take aim at resource use by tracking and displaying real-time data to users, and by automating the operation of lights, appliances and heating and cooling systems to help reduce consumption.

Sárika Zsuzsi Görög

In response to Volodya Kuznetsov

Another major work related to iot is safety and security of these devices. Example, if you have health band on your wrist and you are entering your bank password then it may be hacked. How it will be hacked? The wrist band devices are so sensitive, that they catch each moment made by us. Suppose hackers get access to your band via application connected from your mobile, then they sneak into your band and record all your motions. These motions and your location is used to guess the password. Hence the security of such devices is of utmost important.

IoT has numerous number of applications. Just look around yourself, any mechanical, electrical or digital devices soon can be connected to internet to provide you data, to control them, regulate them and provide you with more clever usage and it's analysis.

Volodya Kuznetsov

Another major work related to iot is safety and security of these devices. Example, if you have health band on your wrist and you are entering your bank password then it may be hacked. How it will be hacked? The wrist band devices are so sensitive, that they catch each moment made by us. Suppose hackers get access to your band via application connected from your mobile, then they sneak into your band and record all your motions. These motions and your location is used to guess the password. Hence the security of such devices is of utmost important.

Doriane Mateu Phạm

While connectivity is key in IoT, the network enabled much more: the use of video, communication between/with miners, including the usage of collaboration and IM tools (which revolves a lot around the people aspect) and more.

Gunnr Østergård

Blockchain (there are many blockchains in fact and it’s more than the technology powering Bitcoin), has been mentioned by virtually all research firms as a rapidly accelerating evolution and it’s not just about financial services companies, the scope in which we tackled blockchain outside of its cryptocurrency roots the first time (namely FinTech or financial technology). In fact, the convergence of blockchain and the Internet of Things is on the agenda for many companies and there are existing implementations, solutions and initiatives in several areas, outside of IoT and financial services too.

Jalen Sepi Ozols

B2B technology marketing is fast becoming a data-driven business as marketers and their sales teams have more access to in-depth intelligence from inside and outside their ecosystems to help them inform communication and content development, set sophisticated follow-up strategies, and engage more prospects and customers in real-time. All of it predicated on the guiding principle that you can learn more from what someone is doing rather than what they are telling you.

Chares Valentinianus Kavanaugh

Another common issue facing IoT devices is that they are often resource-constrained and do not contain the compute resources necessary to implement strong security. As such, many devices do not or cannot offer advanced security features. For example, sensors that monitor humidity or temperature cannot handle advanced encryption or other security measures. Plus, as many IoT devices are "set it and forget it" -- placed in the field or on a machine and left until end of life -- they hardly ever receive security updates or patches.

Emīlija Bonomo

Customer data can offer a treasure trove of insight for companies to act on regarding customer preferences and behavior. This wealth of information provides a competitive advantage that helps companies attract and retain customers and grow revenue. But until now, much of this data was only available to tech companies.

Lizaveta Hersch

Prior to the emergence of the IoT, taking a step back to analyze all of the information provided by the assortment of devices it can encompass was exceedingly difficult, if not outright impossible. As David Smith, a principal program manager at Microsoft, noted in September 2014, "Getting access to data is something data scientists strive for. But all these devices are independent, and there's no way for anybody to aggregate that data together."

Elsa Hollis Bianco

In response to Maui Chibuzo Fèvre

The IoT application and solution architects are on the front lines to deal with the challenges from increasing data variety, volume and velocity. Their challenges include latency that impacts the availability of data, security of information and cost to manage and move the data.

The challenges we face in this area are still great - security being at the top of the list. Supporting the billions of connected devices through a stable network infrastructure is another. Soon enough, if all goes well, the phenomenon will be more than a trending hashtag - it will be a way of being in the world.

Jacquette Ionas Tennfjord

The word pervasive accurately describes how technology can be invasive and insidious, but the word ubiquitous accurately describes how universally accessible and compatible technology has become. Technology access has shifted from traditional desktop computers to intelligent handheld devices to household devices that are embedded with new connectivity. This information technology phenomenon provides easy and convenient access to relevant information through intelligent appliances that monitor, collect and transmit data.

Meltem Robledo

When data has to be analyzed and responded to in real-time, any delay is a formula for failure. Even with data traveling on the fastest networks, massive amounts converging on a local network and then a backbone can still take many seconds to reach a data center thousands of miles away, be analyzed, and the response returned to the recipient.

Maui Chibuzo Fèvre

The IoT application and solution architects are on the front lines to deal with the challenges from increasing data variety, volume and velocity. Their challenges include latency that impacts the availability of data, security of information and cost to manage and move the data.

Please login or register to leave a response.