The Wall Street Journal reports on an address that FTC Chairwoman Edith Ramirez gave to the folks out at CES, the Consumer Electronics Show, in Las Vegas. From the report: “Ramirez outlined several concerns including ubiquitous data collection, or the ability of sensors to collect sensitive personal information about consumers all the time and in real time; unexpected uses of consumer data, such using individual energy use patterns to set their homeowners’ insurance rates; and cybersecurity threats. “She also noted opportunities. ‘Whether it’s a remote valet parking assistant, which allows drivers to get out of their cars and remotely guide their empty car to a parking spot; a new fashionable bracelet that allows consumers to check their texts and see reviews of nearby restaurants; or smart glucose meters, which make glucose readings accessible both to those afflicted with diabetes and their doctors, the IoT has the potential to transform […]
Recent Posts
No IoT Adoption? Security and Privacy Fears may be the Reason
As the Consumer Electronics Show (CES) rages in Las Vegas this week, its tempting to look at the reports about connected devices and wonder when it is, exactly, that the tsunami of smart devices, wearable tech and intelligent appliances will finally wash over us. But it might be even more useful to wonder why – given all the hype- we haven’t been washed out to sea already by the IoT wave. A recent article in Adweek calls attention to one leading theory about why the IoT isn’t gaining traction with everyday consumers: consumer worries about privacy and the security of data. The Adweek article (and groovy infograph) make hay out of a case study by Affinnova, a marketing technology firm that was acquired by Nielsen. The study asked consumers to evaluate “more than 4 million product concept variations and identify the most desired products and functions.” The goal: insight into consumer preferences as well […]
Senator Warns of DHS Struggle with Cyber Security
U.S. Senator Tom Coburn (R-OK) used his final days in office to warn that the U.S. Department of Homeland Security (DHS) is struggling to fulfill its mission to protect the nation from cyber attack. The report, “A Review of the Department of Homeland Security’s Missions and Performance,” (PDF) was released on Saturday, as the retiring Senator from Oklahoma was leaving office. In it, the outgoing Senator said that DHS’s strategy and programs “are unlikely to protect us from the adversaries that pose the greatest cybersecurity threat.” The warnings on DHS cyber operations were part of a larger critique of the Department in the report, in which Coburn called on reforms of Homeland Security focused on accountability and streamlining. Despite spending $700 million annually on a range of cybersecurity programs, Coburn said it is hard to know whether the Department’s efforts to assist the private sector in identifying, mitigating or remediating cyber […]
Have we been wrong about the Internet of Things all along?
I’m just slogging through all the articles I marked “to read” but never got around to during the relax-o-frenzy that is the holiday season. One of the better ones I’ve found comes from the Web site Techbitzz.com. On December 31, they ran a nice and succinct write up that addresses one of the most confusing nomenclature problems in the technology world today: the differences between “machine-to-machine” (or M2M) technology and the “Internet of Things” (or IoT). As the article notes, the tendency these days is to just conflate “M2M” and “IoT” – as if the latter is just a newer, cooler term for the former. But that’s not the case. In fact: the two terms refer to very different things. According to the article: “M2M can be defined in simple terms as, ‘Machines’ (can be a sensor, meter, valve etc) using network resources (can comprise of core telecom network, back-end […]
U.S. Sanctions 10 For Sony Hack, Keeps Mum on Evidence
As the New York Times reports, the Obama administration doubled down on its recent allegation that the Democratic Peoples Republic of North Korea (DPRK) was behind the hacking of Sony Pictures, announcing sanctions on 10 senior North Korean officials and several organizations in response to the incident. Paradoxically, the administration acknowledged that there is no evidence that the 10 officials took part in either ordering or planning the Sony attack. Instead, they described them as “central to a number of provocative actions against the United States,” the Times reported. Those ‘provocative actions’ were not described. The actions mirror the Administration’s controversial decision, in May, to charge five Chinese military officers in May, 2014, for their connection to computer hacking and cyber espionage campaigns directed at U.S. firms in the nuclear power, metals and solar products industries. In the case of the Chinese nationals, however, the FBI cited evidence linking the five military officers to […]