Open Haystack

Trend Micro among 22 joining AllSeen IoT Standards Group

In-brief: The security firm Trend Micro announced that it was joining the AllSeen Alliance, an open source platform for connecting Internet of Things devices. 

Has the IoT Standards Train Already Left the Station?

The Harvard Business Review has an interesting blog post from last week that looks at the effort to develop standards and promote RFID (Radio Frequency ID), a kind of Ur-technology for our current Internet of Things. Writing on the HBR blog, Thomas Davenport and Sanjay Sarma note that the effort to develop RFID standards, led by MIT’s Auto-ID Labs, provides a possible model for the development of cross-vendor standards for the Internet of Things. However, the authors caution that it may already be too late to achieve consensus on standards to govern Internet of Things communications, given the heavy investment of large and wealthy technology companies in the standards process. One of the most successful elements of the RFID standards effort, which developed and promoted the EPCGlobal standard, was close collaboration between academics, technology vendors and end users.End users of the RFID technology – notably retailer WalMart, Procter & Gamble and […]

Opinion: Toppling the IoT’s Tower of Babel

The five most feared words in the IT support person’s vocabulary are “This. Page. Can’t. Be. Displayed.” And yet, the growth of Service Oriented Architecture (SOA) based enterprises in the past eight years means that these dreaded words show up more and more, as services from different developers and vendors are consumed by larger, up stream platforms and and integrated to provide new capabilities. In this kind of environment, “This Page Can’t Be Displayed” is a cry for help: the first indication of a problem. For enterprise support personnel, that message is often the first step in a long journey complete with Sherlock Holmes-style sleuthing to try to find which service along an orchestrated chain is the bad actor. And, unfortunately, when an application is being attacked or gets hacked, support personnel may not even have an error message to go on. In both cases, the major roadblock for support and incident response staff is that application developers or development […]