Data Science
41.7K subscribers
1.67K photos
3 videos
47 files
2.06K links
DS
По всем вопросам- @haarrp

@ai_machinelearning_big_data - machine learning

@pythonl - Python

@itchannels_telegram - 🔥 best it channels

@ArtificialIntelligencedl - AI

@pythonlbooks-📚

@programming_books_it -📚

Реестр РКН: https://clck.ru/3Fk3zS
Download Telegram
​​🔋Battery-less power source coming for IoT devices?

US research centre Bridg has teamed up with a private company, Face International, to produce a battery-less source of power for IoT sensors – although its description sounds similar to a perpetual motion machine, which has been deemed to be impossible.

The device, called Evercell, “employs a unique design and advanced materials to harvest thermal energy in any environment where the ambient temperature is above absolute zero – reliably generating the microwatts of electrical power needed to run wireless IoT sensors without the need for batteries,” according to a Bridg press release.

The research firm says it expects its first generation of the postage stamp sized Evercells to come in three versions, each generating 1.2V and, respectively, 4.32 microwatts, 400 nanowatts and 800 nanowatts of continuous power.

These are tiny amounts of power, but the output could be increased by using multiple devices. According to Bridg, an Evercell demonstration device has been operating continuously for 16 months with undiminished performance, producing enough electrical output to power a typical wireless sensor.

The firm says that it and Evercell intend to cooperatively undertake technology validation for product integration development and prototype manufacturing of Evercell power cells at Bridg’s NeoCity campus in central Florida, with the goal to achieve mass production by 2019, based on customer-driven demand.

Bridg’s director of strategic partnerships, Dan Holladay, said that Evercell had the potential to be to batteries what the light bulb was to candles and oil lamps.

“The cost, inconvenience, and inaccessibility associated with battery replacement make them impractical as a power source for many of the IoT sensor applications,” he said.

“The promise of the Evercell technology could address an unmet annual demand for tens of billions of IoT devices relying on batteries that otherwise could not be deployed.”
​​IoT by name or nature? Delivering experience over appearance

The last few years have seen a whole raft of IoT vanity projects, where connectivity for connectivity’s sake was the order of the day.....
​​Wonder chip reduces IoT encryption power consumption by 99.75pc

This week in IoT, a new chip not only makes encrypting 500 times faster, but it can do so with 99.75pc less energy.

There was a lot going on this week in the internet of things (IoT) realm, particularly on the hardware side of things as prestigious academic institution MIT revealed a number of new technological breakthroughs.

Among them was a new chip that can take the power of neural networks, capable of crunching huge amounts of data, and put them natively on your smartphone.

The special-purpose chip can not only speed up the rate of computation in neural networks by a factor of seven, it also manages to reduce its power consumption by up to 95pc.

MIT also recently revealed a device that sounds too good to be true, known as the thermal resonator, which can generate energy just by the simple passing of day into night.

By availing of the shift in temperature between the two times of day, the device could enable a continuous, years-long operation of remote sensing systems, making it ideal for IoT technologies.

New wonder chip makes IoT encryption a doddle
Just to make it a hat-trick this week, MIT also revealed a special-purpose chip hardwired to perform encryption, consuming 99.75pc less power than software execution using the same protocols would.

It also uses about one-tenth as much memory and executes 500 times faster, all through public-key cryptography that lets computers share information securely without first agreeing on a secret encryption key.

Like most modern public-key encryption systems, the researchers’ chip uses a technique called elliptic-curve encryption. As its name suggests, elliptic-curve encryption relies on a type of mathematical function called an elliptic curve.

“There is a lot of debate regarding which curve is secure and which curve to use, and there are multiple governments with different standards coming up that talk about different curves,” said Utsav Banerjee, first author of the research.

“With this chip, we can support all of them and, hopefully, when new curves come along in the future, we can support them as well.”

Advent of 5G leaves Sigfox struggling to meet growth
French start-up Sigfox has achieved enormous success with its low-power, wide-area IoT networks established in dozens of countries, including Ireland.

However, according to Reuters, the firm has admitted that it is now struggling to meet its growth targets as companies wait to see how 5G networks are progressing.

Sigfox said that it missed its revenue targets for last year, but CEO Ludovic Le Moan believes his company’s technology is still showing promise and will at least break even by the end of 2018.

“There’s a lot of noise around 5G these days,” Le Moan said. “But these technologies 5G that are being put in place are much more costly. For telecom players, this is all about generating new revenue.”

He argued that while the roll-out of 5G networks towards the end of the decade will cost billions of euro per national market, Sigfox’s IoT networks would cost millions.

5G hits the slopes in Pyeongchang
Speaking of 5G, one of the first places in the world to avail of the super-high speeds is Pyeongchang, currently the site of the 2018 Winter Olympics.

According to Bloomberg, the technology is being used by the South Koreans to create an animal control system that uses sensors to see when porcines wander into tracks.

When it senses them, the system will not only shoot rays and emit tiger roars to keep them away, but will also throw in some foul-smelling gases just to make sure the creatures don’t go where they’re not supposed to.

Some other technologies on display include a fleet of autonomous shuttles to bring people around, as well as 360-degree images in real time showing competing figure skaters as they glide around the ice.
​​🤖Robot Investments Weekly: Drone and IoT Matches Get Made

- Drone and IoT partnerships;

- Acquisition to promote STEM training;

- Mirae marries Global X as ETFs grow fast;

- Industrial automation gets funding;

- Service robotics startups get support.
​​Google to acquire Xively IoT platform from LogMeIn for $50M

Google announced today that it intends to buy Xively from LogMeIn for $50 million, giving Google Cloud an established IoT platform to add to their product portfolio...
​​IoT Network Tracks the Weather

The co-founder of a weather network and analytics company describes a proprietary IoT sensor network it is deploying to give it an edge.

Understory was built by two University of Wisconsin–Madison graduate students in 2012, Alex Kubicek and I. Our idea was to create a sensor that would measure and record weather in real-time to optimize business operations, improve safety and help people anticipate and prepare for weather events.

So far, the Understory network is deployed in five metro areas including Dallas-Ft. Worth, Houston, Denver, St. Louis and Kansas City, covering six million homeowners. We have plans to expand to 75 metro areas, installing more than 5,000 sensors by 2020.

The road from a great idea to a new product passed through several challenges. Understory had a goal to build an innovative solution for the market that could withstand extreme weather and bypass common IoT pitfalls.

The heart of Understory’s analytics platform is what we call RTi, which stands for real-time and is also refers to Artie, a scientist diligently taking measurements in the field. RTi is a solid-state weather sensing device that detects hail impacts, rainfall and other real-time measurements and transmits them wirelessly to our cloud.

With no moving parts, RTi is well-suited for permanent installation in remote, harsh conditions. The proprietary hardware consists of a metallic sphere that simultaneously senses impacts of hail, wind speed, direction and rain, combining three sensors into one. Our team built RTi with off-the-shelf hardware that enabled us to cost effectively deploy a robust sensor network quickly.

Pressure, humidity and temperature measurements are performed by commodity components. RTi also uses cellular networks, giving us adequate bandwidth to provide real-time weather data. Our hardware is cellular carrier agnostic and adapts to the best carrier for the region. Due to its low maintenance and cost-effective construction, a network of devices can be deployed to capture hyperlocal weather phenomena in new ways.

Since Understory installs, maintains and upgrades the networks, making it easy for a potential site host to agree to the installation is a top priority. The networks were designed from the ground up to allow us to deploy an entire city of 50 or more sensors in less than three months

Iterating on the hardware was paramount as we encountered new challenges in the field. No one has deployed industrial weather networks in this manner before, so the learnings were critical to our success.

Our top design priorities included using sensors that can stay connected to our cloud 24/7 using only solar power. For security, we wanted a consistentcloud connection that enabled fast debugging, failure assessment and the ability to push out updates to counter cyber-attacks.

On-board digital signal processing and storage means only essential data is transmitted. If connectivity is lost, data is saved to be transmitted upon reconnection.

An RTi only needs servicing once every five years as opposed to the semiannual care traditional weather stations need. Installation requires a single wrench and takes less than an hour. The RTi self-calibrates and transmits data to the cloud moments after activation, enabling deployment of a metro network within a few weeks.

Combining these priorities allows us to scale our networks quickly and enables Understory to create an entirely new sensing infrastructure that provides accurate and timely measurements to our customers.
​​A "leather" display showing the state of human health

At Tokyo University, a gadget has been created in the form of an electronic skin, which is attached to the human body and reads the most important data on the health of the wearer.
As Engadget tells, the development facilitates the provision of the first medical aid due to the constant display of vital indicators. Sensors that measure the pulse and remove the cardiogram are installed in the skin-coated "skin". Data from the sensors can be wirelessly synchronized with the smartphone or immediately sent to the "cloud".

As for the LEDs, which 384 pieces in 16 rows, they form a display on which the information about health is displayed. Such a screen, capable of stretching by 45%, is enough for deducing even dynamic data, including cardiograms. Along with the elasticity of the electronic skin, another important property is that it passes air, which does not cause the wearer any discomfort.
​​Kaspersky Lab, ITU-T partner to strengthen IoT security

New Delhi India, Feb 20 (ANI): Amid rising prevalence of cyber threats and elaboration on crucial industry standards, Kaspersky Lab ICS CERT experts teamed up with ITU's Telecommunication Standardisation Sector (ITU-T) to develop Recommendation ITU-T Y.4806 "Security capabilities supporting safety of the Internet of Things."

In January, a new international standard on "Security capabilities supporting safety of the Internet of Things" (Recommendation ITU-T Y.4806) officially came into play. Recommendation ITU-T Y.4806 was developed by Study Group 20 "Internet of things (IoT) and smart cities and communities" of ITU-T, classifying security issues for IoT, examining possible threats for security systems, and clearing out the safe execution of IoT cyber-physical systems supported by security capabilities.

Kaspersky Lab researchers have shown that non-computing connected devices incidents are among the top three incidents with the most severe financial impact, for both SMB and enterprise organisations, and are going to increase.

In the wake of the recent TRITON attack targeting industrial control systems, it became obvious that attacks on cyber-physical systems can affect not only the information aspects, but also functional safety. Therefore, the study group collaborated to determine which security capabilities specified in Recommendation ITU-T Y.4401/Y.2068 "Functional framework and capabilities of the Internet of things" support safe execution of IoT.

The experts provided up-to-date specific recommendations for IoT framework security. Recommendation ITU-T Y.4806 is mostly applicable to safety-critical Internet of things (IoT) systems, such as industrial automation, automotive systems, transportation, smart cities, and wearable and standalone medical devices. Additionally, Recommendation ITU-T Y.4806 considers how the joint analysis of threats and security capabilities mentioned herein may be used to establish security requirements for the different applications of the Internet of things.

"In the wake of the recent TRITON attack targeting industrial safety systems, it became obvious that attacks on cyberphysical systems can affect not only the information aspects, but also the functional safety. Our aim was not only to plant the flag on the idea of high probability of security breach attacks, but also to determine the methodology for developing specific requirements. We believe that our contribution to ITU-T's IoT security standard (Recommendation ITU-T Y. 4806) will help organisations develop more efficient cybersecurity strategies to fully face up to modern cyber threats," said Andrey Doukhvalov, Head of Future Techs, Kaspersky Lab.

To counter the above vulnerabilities and other less frequent IoT security challenges, recommendations developed by Kaspersky Lab ICS CERT experts described how to proceed from consideration of the types of impact on the cyber-physical system to the analysis and modeling of threats to functional safety, and then to the development of recommendations on security measures, illustrating the described method with concrete examples.

To avoid attacks such as TRITON, and as per Recommendation ITU-T Y.4806 which summarises the data necessary to establish the requirements for industrial control systems to resist security threats that could affect safety, Kaspersky Lab experts urged the implementation of reliable communication infrastructure and monitoring mechanisms, as well as mutual authentication and authorisation for management and control.

Furthermore, experts also suggested better audit of management and control procedures and attack detection mechanisms, and installation of measures to monitor the load on equipment and communication channels, including the detection of both unintentional overload and denial of service attacks. (ANI)
​​Consumer IoT Applications Segment to Reflect the Highest CAGR in the Global IoT Sensor Market

The global market for IoT sensor is anticipated to account for an estimation of about $9,900 million through the end of the calculated period in 2026, up from an estimated value of about $3,350 million through 2017.

Organizations and industries have been utilizing different sensors for a while, however, the invent of the internet of things has participated as sensors along with developments of sensors to an entirely unusual level. By blending an arrangement of sensors along with a communication network, the devices can share data with each other and are enhancing their functionality and effectiveness. There are a variety of types of IoT sensors in the market such as temperature, pressure, magnetometer, humidity, gyroscope, accelerometer, image and inertial.

In the automotive segment, most sensors on a car record their view of the surroundings and transfer that data into databases. The information is then processed and all the vital new snippets of data are sent to every other vehicle. This is a progressing procedure, through which the vehicles are getting to be consistently smarter.

In the manufacturing segment, IoT sensors are utilized to diminish the cost of making along with the cost of upkeep and decrease the utilization of wastage of materials and energy.

The global market for IoT sensor is anticipated to account for an estimation of about $9,900 million through the end of the calculated period in 2026, up from an estimated value of about $3,350 million through 2017 end, reflecting a 12.7 percent CAGR all through the forecast time frame of 2017-2026.

The key aspects fuelling the expansion of the IoT sensors market comprise increasing demand for smart devices, supportive government initiatives of the various developing nations, advancements in sensors themselves, requirement for real-time computing of applications, strong requirement in the automation industry, expansion of smaller, smarter and cheaper sensors, expansion in the automotive industry as well as purpose of sensor fusion perception in IoT sensors market.
👨🏻‍⚖️Businesses could be overwhelmed by useless IoT data, says vendor CTO


Without an understanding of what data resides where, the Internet of Things (IoT) could become a dangerous place with too much data that’s of too little business value, says software provider Yotta. Adrian Bridgwater spoke to CTO Manish Jethwa.

Businesses risk being overwhelmed by IoT data that has little use to the enterprise, claims software provider, Yotta.

This is why Internet of Things (IoT) apps need to be engineered and architected for the data landscape in which they will run, according to Manish Jethwa, CTO of the infrastructure asset management software firm.

“The application itself needs to provide an interface that is capable of applying a structure around the data it comes into contact with, such as its hierarchy, so that it can establish which information to classify as useful for business insight.

“More, the use of data queues – with high uptime specifications – can help resolve resiliency issues by providing a temporary store for data, which the application can process when it has the capacity,” he explained.

The madness of data crowds

Jethwa believes that developers should push applications towards a better appreciation of data structure and queuing principles, especially on the journey towards smart cities or heavyweight Industrial Internet of Things (IIoT) applications. In these areas, cloud-based metadata analytics will be essential to stop organisations being overwhelmed by the sheer volume of data being gathered by sensors.

“For sensors and probes that operate with low power limitation, the cloud provides the first opportunity to analyse data, and identify important trends or patterns using elastic resources,” he said. “In this way, the analysis process to extract metadata can act as a filter, only passing on key information that requires action.”

Microservice modular boundaries

Jethwa believes that microservices will be critical in driving data to the right place on the IoT data map. But there are hurdles to clear in installing and managing them, he said. “The challenges of maintaining microservices are the same as with any distributed system, in that managing multiple services on a regular basis demands efficient operations management skills.

“Microservices provide strong modular boundaries, but maintaining consistency with other components poses a challenge. Realistically, problems like these can only be solved through the use of ‘distribution automation’, using tools to connect directly to cloud services platforms, such as AWS and Azure.”

From a technical viewpoint, what are the key elements to consider when developing a set of software layers that are intended to operate as an IoT network?

“With a typical IoT network, the business requirements for the data being collected, and for the network engineering, are most likely being developed by separate organisations. So it is quite possible that the data provided by IoT sensors may not be what the business requires.

“Again, microservices can serve as a translation mechanism in the data stream to make the data more useful. But it is vital that the business case for the data is assessed beforehand, to ensure that the commercial need to use the data exists.”

Internet of business says

Wise words. Simply powering up IoT applications and turning on the data pipe will be of little use to organisations if they then drown in a torrent of useless data. Jethwa’s commentary provides welcome granular detail, as well as stressing the need for strategic business use cases.

What happens next will perhaps come down to the new breed of data-developers, who will engineer this complexity into real-world IoT systems. Programming the IoT requires a developer who has an appreciation for data architecture and topography, and an understanding of just how fast the data pipe filling up the business.
NIST develops security standards for IoT

The National Institute of Standards and Technology (NIST) published a draft document entitled "The Status of International Cybersecurity Standardization for IOT". The document should help in the development of security standards for IoT.
NIST proposes to divide the IoT into five functional areas: connected devices; IoT consumer class; medical equipment and devices used in health care; "Smart" buildings; "Smart" production (including ACS TP). For each area, their standards must be developed in accordance with their characteristics.
There are differences between the standards of cybersecurity for each of the above areas and generally accepted standards. If, traditionally, confidentiality, integrity and accessibility are considered to be priorities in ensuring cybersecurity (in the descending order), the main priority in ensuring IoT security is availability. The exception is the consumer class IoT area, where the main priority is still the protection of privacy and privacy.
Protecting the privacy of patients is also one of the main tasks in ensuring the safety of medical equipment. However, it is also important to ensure the integrity and inviolability of the work of both medical devices and the medical institutions themselves. Cyber ​​attacks can stop the work of hospitals, thereby exposing the health and life of patients to a great threat.
The main difference between traditional cyber security and IoT cybersecurity lies in the fact that the latter is closer to operational technologies (OT) than to information technologies (IT).
Forwarded from Интернет-журнал Allowwonder
Why we forget everything: books, films and people's names

Among us there are lucky ones who perfectly remember movies that had been watched a long time ago, books that had been read at school, the names of random acquaintances and phone numbers of friends. But most people complain about forgetfulness, writes Julie Beck in a column published in The...

https://allowwonder.com/why-we-forget-everything/
​​Google’s Cloud IoT Core is now generally available

Cloud IoT Core, Google’s fully managed service for connecting, managing and ingesting data from IoT devices, is now out of beta and generally available. Google envisions the service, which launched in public beta last September, as the first entry point for IoT data into its cloud. Once the data has been ingested, users can use Cloud IoT Core to push data to Google’s cloud databases, analytics tools, serverless platform and machine learning services.

One feature the company stresses is that Cloud IoT Core is able to support data “from millions of globally dispersed devices.” Like similar services, Cloud IoT Core supports the standard MQTT and HTTP protocols for talking to devices.

Unsurprisingly, the service supports Google’s own Android Things platform out of the box, but Google has also partnered with the likes of ARM, Cisco, Intel, NXP, Sierra Wireless and other hardware partners to make their products work with its service.

Current users include the likes of Schlumberger, which uses it as part of its IoT integration strategy, Smart Parking in New Zealand, bike-sharing service Blaze and Mexican bus operator Grupo ADO.

To use Cloud IoT Core, users pay per megabyte of ingested data. The first 250 megabytes per month are free and after that, Google charges $0.0045 per megabyte for the first 250 GB of data (with significant discounts for users with higher data volumes).
​​📲4G IoT network may ease aviation sector fears over drone safety

Vodafone is testing mobile and internet of things network technology to protect commercial aircraft from badly flown drones

Mobile network operator (MNO) Vodafone has commenced trials of what it claims is the world’s first air traffic control drone tracking and safety service, using a 4G mobile network and internet of things (IoT) technology to protect air passengers.

Since unregulated, commercially available drones are too small to be tracked by conventional radar, the risk to life should a drone collide with an airliner is a source of serious concern for civil aviation authorities.

Indeed, over the past few years there has been a steady stream of high-profile incidents in which irresponsible drone hobbyists flew their toys too close to airliners taking off and landing.

According to the Single European Sky Air Traffic Management Research (Sesar) project, drones will log more than 250 million flying hours a year above Europe – over seven times the cumulative annual flying hours of conventional aircraft in the same space.

In response to the problem, Vodafone has developed a radio positioning system (RPS) using a 4G modem and SIM embedded within each drone to enable real-time tracking – with up to 50m accuracy – by operators and air traffic controllers, and over-the-horizon/beyond-line-of-sight control for users.

The system also incorporates protective geofencing, with drones pre-programmed to land automatically or fly back to their operators if they stray too close to exclusion zones, emergency remote control intervention to enable authorities to override a user’s commands, and SIM-based identification and registration.

It has also incorporated artificial intelligence (AI) algorithms to allow large numbers of drones to be tracked and controlled remotely.

“This groundbreaking innovation by Vodafone will help to ensure the skies stay safe as drones become ubiquitous, everywhere,” said Vodafone group CTO Johan Wibergh.

Matthew Baldwin, European Commission (EC) deputy director general, added: “The Commission supports all trials aimed at realising our vision for safe commercial drone operations in the EU – there is a growing network of demonstrations and projects across the EU. We look forward to hearing the results of Vodafone’s work.”

A preliminary trial in the autumn of 2017 saw a 2kg X-UAV drone with a 1.2m wingspan tracked along a 32km course in southern Spain, during which the drone was able to transmit a constant real-time high-definition (HD) video feed and flight data, including its speed, RPS location and GPS coordinates.

Further tests of the technology will take place in Germany and Spain this year, with the intention of making it available commercially in 2019. Vodafone has additionally placed its RPS research and intellectual property in the public domain to enable other innovators to work with the technology.

The operator said it saw a number of other applications for the technology besides protecting air traffic. These include preventing inadvertent or malicious drone incursions at sensitive locations, such as hospitals or prisons, or addressing the so-far hypothetical worst-case scenario in which a terrorist organisation might use a drone to deliver explosive or biological payloads to targeted locations.

RPS technology could also boost functionality for other IoT devices, even replacing GPS in some scenarios, such as indoor location tracking, where GPS may not be viable.
​​6 strategies to reduce customer frustration with IoT devices

1. Sell or produce universally compatible tech products
Whether you manufacture or just sell your own IoT products, you should require that these devices conform to industry interoperability and compatibility standards. This eases the installation of the devices in homes, where consumers can be counted on to have a plurality of devices from many different manufacturers.

2.Hire infrastructure-savvy technicians and tech support personnel
You might have to pay experienced infrastructure persons more than entry-level junior techs, but the investment is well worth it if you can assemble a corps of techs who really understand your products and the home tech environments that your products operate in. These techs, with their home tech infrastructure knowledge, will be more likely to resolve tech issues on the first visit.

3. Use videos to help more junior techs
Junior techs aren't going to have a broad base of experience when they first make home service calls. At the same time, they might be hesitant to call someone for help while they are on presumes with the customer watching them. "One option is to give them a library of YouTube-style videos on different troubleshooting accounts and procedure they can use in problem solving," said Braswell. "This brings the expert into the home, and the junior tech can more easily address the issue."

4. Map out the entire customer journey
"Once the customer purchases your product, think about how that customer is going to interact with the technology," said Braswell. "What type of value does the customer expect from the technology? What types of problems are they likely to experience when they first install the product? How can your service manuals, online help and onsite visits be positioned to solve these issues quickly?"

5. Think about your customer's infrastructure at the point of sale—not when they need servicing
"You can be proactive and eliminate needless service calls by having the salesperson ask the customer if (they have) the necessary equipment at home that your product will need to interact with," said Braswell. "If the customer confirms that he or she already has all of the necessary equipment, many problems resulting from failed installations can be precluded."

6. Consolidate omnichannel services for a 360 degree view of the customer
Customers get frustrated when they are asked repeatedly to give their names, account numbers, trouble tickets, and problem statements to the service reps they are passed to via chat, phones, in person, etc. This frustration is well-founded. It is fair for consumers to expect companies to be as aware and as interested in their problems as they are. Many companies fail at this—even though they offer omnichannel sales. There is no reason for this to happen anymore. For years, CRM (customer relationship management) systems have provided for integration of omnichannel sales channels into a single view of a customer that gives everyone a single view of the customer experience—from sales to service.
​​How IoT supports connected health and process optimization


Why do healthcare organizations need to think about the Internet of Things? Do they need a strategy?

Organizations do not need to think about the Internet of Things ― they need to think about how they want to transform their business and which transformational path will reap the largest benefit. Path No. 1 is optimization of existing business processes. Path 2 is a complete change in business process. Each path will require efforts in re-engineering the people, processes and technologies that are applied to deliver care.

There is an old saying, “When you don’t know where you are going, any road will get you there.” At CDW, we have a methodology for the development of a long-term strategy for digital transformation that creates a roadmap based on the individual needs of the organization.

1. Start by bringing all stakeholders to the table ― clinical, administrative and IT ― to identify business challenges (such as HCAPHS scores, 30-day readmission, operating costs or reducing clinician stress), and assign dollar values to each of these challenges.

2. Take these challenges and determine what a solution would look like in general terms (for example, a 30-day readmission solution, or the ability to recognize a negative trend in patients’ health and intervene before he or she shows up at the emergency department), and what measurements will be used for success.

3. Evaluate existing capabilities and infrastructure as well as determine what additional technologies are needed. Create a process map of dataflows and workflows that will support the desired outcome.

4. Roll out a pilot program. Measure and adjust until it delivers consistent results, and then move to production.

5. Repeat this process for all identified challenges and updated challenges.

What are some of the most promising technologies emerging in the healthcare IoT space, and how will they improve connected health?

CDW has seen tremendous growth in technologies in the areas of wearables, mHealth/telemedicine and smart rooms ― all engineered to address the need to provide care outside the institutional walls and to improve the care and safety of patients and seniors.

Wearables will soon have a broad range of form factors (e.g., on your wrist, shoe or clothing) that will have the ability to measure and send to the cloud important physiological data points for evaluation by a decision support technology, which, depending on the trend, may or may not forward to a clinician for review, at which point a telehealth session can be initiated if needed.

mHealth is moving from being a passive collector of data via patient data entry to an active aggregator of data from multiple sources for real-time evaluation. Additionally, a lot of eff ort is being put into utilizing mHealth to engage patients in the management of their disease.

Smart rooms in homes, senior living and hospitals are being developed

1. to optimize the time an individual can safely and comfortably live at home, relieving the financial pressure on families;

2. to act as a force multiplier for senior-living operators staff to ensure the comfort and safety of residents; and

3. to improve the patient experience in hospital stays, driving up HCAPHS scores and improving safety.

These advances, as well as the rapid development of more forward-leaning technologies in artificial intelligence and natural language processing, will have an immense impact on the quality and delivery of care.
​​A new ARM solution will integrate SIM cards into IoT chips

ARM announced new technologies for the introduction of SIM-cards in IoT solutions, which can scale up to billions of devices. The Arm Kigen family supports the iSIM standard and is designed to integrate SIM cards directly into the SoC for IoT applications.

In combination with built-in hardware protection (for example, ARM CryptoIsland), the new solution will integrate the MCU, cellular modem and SIM card into a single IoT-chip, which will significantly reduce the cost of devices.

The presented platform includes ARM Kigen OS, a hardware-independent software stack that allows to fully integrate the functionality of the SIM card into IoT SoC.

Server solutions for remote management of ARM Kigen will also be available, which offer flexibility, modular design and easy integration with the IoT platform providers.

As noted in ARM, the platform has already received support from key players of the ecosystem, including BT, SoftBank and Sprint.
​​How smart furniture extends the boundaries of small apartments

Scientists from the Massachusetts Institute of Technology (MIT) apparently resolved the problems of one-room apartments. Researchers have developed a solution that allows using a mobile application to remotely control a bed, cabinets, desk and other furniture. You just need to say a command or press a button on your smartphone...
​​IoT reigniting the Oil & Gas Industry

Among the technologies that are in vanguard as a consequence of ongoing fourth industry revolution and is poised for a huge leap forward is called “Internet of Things”...