Register to receive our newsletter and join in the conversation on our message boards!
REGISTER NOW
Comments
Newest First | Oldest First | Threaded View
Page 1 / 2   >   >>
Michelle G
Michelle G
3/16/2017 4:12:14 PM
User Rank
IoT Visionary
Re: Great indepth piece
@mhh I think you may be right about that. We may be better off with more limitations in the name of security.

50%
50%
Ariella
Ariella
2/25/2017 7:19:42 PM
User Rank
IoT Visionary
Re: Great indepth piece
< I think Apple's approach to limit the things users can do with their hardware might be the optimal one -- until someone figures out a better way to control malware.>

@mhhf1ve You believe that allowing full control to Apple really works to keep malware under control? That's not so much consolation for people using nonApple devices, though.

50%
50%
Ariella
Ariella
2/25/2017 7:17:25 PM
User Rank
IoT Visionary
Re: Great indepth piece
mPart of the appeal of proprietary solutions is some amount of convenience. For example, Apple and Google and Microsoft's ecosystems for apps give users some assurance that accessories and updates and third party developers will be around to make these Big3 ecosystems worth the lock-in>

@mhhf1ve well, yes, but that is still not a completely universal measure. For some, the convenience and assurance may outweigh their hesitations about being locked into something propietary. But for others, being locked in is so unappealing that they willingly forego that. That's what I got from the people at Sourceknowledge that I interviewed for an article a few weeks ago.

The CRO said he's "not a big fan of the walled garden approach." He doesn't buy that it's possible to "be the measurer and optimizer all at oncce." He also said in their view, vendors like Facebook and Google should "not force us to use their system and their data and ad delivery system exclusively." 

  

50%
50%
dcawrey
dcawrey
2/16/2017 6:21:02 PM
User Rank
IoT Visionary
Re: Great indepth piece
@Ariella I just hope at the firmware and OS level there are some serious precautions taken care of. 

Everyone thought it would be cool for there to be an open source smartphone OS in the form of Android. Unfortunately that has led to way more fragmentation than I think was initially expected. 

50%
50%
mhhf1ve
mhhf1ve
2/15/2017 4:40:43 PM
User Rank
IoT Visionary
Re: Great indepth piece
> "the walled approach brings other limitations and integrations..."

Certainly, but I think for a nascent IoT ecosystem, maybe building in limitations and security would be smart? I think Apple's approach to limit the things users can do with their hardware might be the optimal one -- until someone figures out a better way to control malware.... 

50%
50%
maryam@impact
maryam@impact
2/15/2017 1:03:52 PM
User Rank
IoT Visionary
Re: Great indepth piece
Its a very complex issue because the walled approach brings other limitations and integrations. Is the solution to limit ourselves or to build better security? I don't think that the security has caught up with our technology creativity but at the same time should we harness our potential?

No easy answers especially with the industrial ramifications.

50%
50%
mhhf1ve
mhhf1ve
2/13/2017 5:17:11 PM
User Rank
IoT Visionary
Re: Great indepth piece
> "what of the people who resent being locked into a propietary ecosystem?"

Part of the appeal of proprietary solutions is some amount of convenience. For example, Apple and Google and Microsoft's ecosystems for apps give users some assurance that accessories and updates and third party developers will be around to make these Big3 ecosystems worth the lock-in.

For those who have some visceral hatred of proprietary ecosystems.. they're trading the convenience for having to cobble together a variety of open solutions that may or may not work well together. There may be some "security by obscurity" involved, but there may also simply be wide open security holes that haven't been patched because there are fewer economic incentives for people to plug them.

Unless you have the resources to really build your own ecosystem (or your requirements are that limited that you can), there's a bit of a contradiction to have both "freedom AND security" when it comes to software.... 

50%
50%
Ariella
Ariella
2/13/2017 10:44:33 AM
User Rank
IoT Visionary
Re: Great indepth piece
@mhhf1ve but what of the people who resent being locked into a propietary ecosystem? I spoke to some people from a marketing agency recently who avoid using Facebook's platform altogether because they don't want to be constricted by a walled garden appraoch. 

50%
50%
mhhf1ve
mhhf1ve
2/10/2017 7:44:24 PM
User Rank
IoT Visionary
Re: Great indepth piece
I think users are going to need to accept more and more limitations on the things they can do with their devices for the sake of security. Just as smartphones have started the "walled garden" approach to installing apps, more and more devices will need to have built-in trust mechanisms for preventing malware and only accepting trusted instructions.

 

50%
50%
Ariella
Ariella
2/10/2017 4:10:21 PM
User Rank
IoT Visionary
Re: Great indepth piece
@dcawrey that makes sense, actually. The smartphone really enabled mobile to take off, and connected devices will open up a whole host of possibilities for IoT.

50%
50%
Page 1 / 2   >   >>


Latest Articles
In Gothenburg more so than other burgeoning smart cities, silos are seen as the enemy. And no one knows this better than Ann-Louise Hohlfält, urban development officer for the City of Gothenburg.
Virtual reality and augmented reality remain nascent technologies, but Mastercard is already working on its plans to leverage them as they anticipate mass adoption among consumers.
We speak with Rinat Guy, CIO for the Municipality of Israel's award-winning smart city.
Industrial internet leader Bosch tells us about the IoT power tool products their working on & how long until these solutions hit the mass-market.
Our interview with Boeing Senior Systems Engineer Robert Rencher reveals that aviation IoT has implications for digital factories and supply chains, but its the operational environment where the biggest inroads will be made.
Upcoming Live Events
May 16-18, 2017, Santa Clara Convention Center
May 16-18, 2017, Santa Clara Convention Center
May 16-18, 2017, Millennium Gloucester Hotel, London
June 13-15, 2017, ExCeL, London
June 13-15, 2017, ExCeL, London
All Upcoming Live Events
Flash Poll
Video
Wilhelm Nehring, CEO of ThyssenKrupp Elevator UK, talks through his favorite applications of IoT in buildings and cities with IoT World News.
David Holecek, Director of Connected Products & Services at Volvo Car Group , speaks with IoT World News on Volvo's moves in the connected car ...
Liat Ben-Zur, SVP and digital technology leader at Philips, describes the plethora of ways IoT will be used to transform healthcare via hospitals, ...
Richard Corbridge, CIO at Health Service Executive, explains how IoT is already impacting digital healthcare in Ireland and where he sees the ...
Mimmis Cleeren, Global Director of marketing (IoT BU) at MediaTek, covers some of the special IoT projects that have emerged from MediaTek's ...
All Videos
Webinars
ARCHIVED
Tuesday, March 14, 2017
1:00 p.m. EST

Identifying and solving the practical security challenges encountered by businesses embarking on an Internet of Things deployment.

Realizing your company's IoT vision starts with connecting and securing your infrastructure. IoT infrastructures require organizations to collect and transmit commands and data from devices, applications and people -- securing all of this is a sizeable challenge.

Our expert panelists will identify and solve the key issues that arise during this process, enabling a safe and steady beginning to your organization's IoT journey.

The webinar will cover:

  • Identity Issuance: Security at Scale
  • Identity Management: Authentication and Authorization
  • Identity and Data Security: Data Integrity and Granular Policy Definition

Webinar attendees will learn:

  • How to ensure that data is only accessed by authorized devices, applications and users in an IoT setting
  • Methods for transmitting data from devices in the field to value engines securely and efficiently
  • Best practice for implementing tried-and-trusted IoT ecosystems and safeguarding data flow across your company's entire infrastructure
  • How to create a holistic and protected IoT ecosystem for your company

Information Resources
All resources
Twitter Feed
like us on facebook
IoT World News
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with