Like the rest of the tech media, Kevin and I kick off the show with a discussion about data collection and privacy in light of the allegations against Cambridge Analytica. It’s a stark reminder on what can be gleaned from your information as well as how much of your data is being gathered without your knowledge or real consent. We also talk about smart home lock in, Alexa’s new “brief” mode, shopping on Google Home and my IoT Spring Clean. IBM’s new crypto chip and Watson Assistant made the show as well as several industrial IoT news bits such as Foghorn’s industrial IoT integration with Google’s cloud and a new hardware platform for IIoT from Resin.io. We also answer a listener question about IoT for new parents.
I’ve heard that smart home tech is the new equivalent of granite countertops (basically it’s a big deal for buyers) for several years now, but I had never investigated what that tech experience would look like or how it would come to be. It’s pretty complicated, as you’ll learn from David Kaiserman, president with Lennar Ventures, the investment arm of Lennar Homebuilders. Kaiserman walked me through a Lennar home outfitted with a bunch of smarts last month, and shares his thoughts on what matters to buyers and the gear inside. He also sheds light on Amazon’s Alexa-focused geek squad and explains why Lennar backed out of its plans for a Apple HomeKit home and banked on Alexa instead. Enjoy.
Hosts: Stacey Higginbotham and Kevin Tofel Guest: David Kaiserman of Lennar Ventures Sponsors: Samsung Artik and IoT World
Get ready for an IoT spring clean
Kevin thinks shopping with Google Assistant is “brilliant”
This board’s build for industrial use
How Amazon’s team of Alexa experts changes the smart home experience
Once again it’s time for the holiday episode of the Internet of Things Podcast, where Kevin and I gather weeks ahead of the show’s air date to predict what we think will happen next year. We kick it off with our disappointments from 2017, such as very limited (at best) presence detection in the home and a lack of flexible cellular plans for IoT devices. From there we shared our predictions for 2018 such as Kevin’s expectation that local machine learning will finally offer contextual smarts in the home and my prediction that IT shops will reassess how they value IoT deployments. We end with our big questions for the industry wondering what havoc GDPR regulations will wreck and if we’ll get a new security model that works for IoT.
Just like last year and the year before, the guest portion of the show features my family, sharing what they liked and didn’t like about our smart home this year. Much of what we use has become so ingrained in our lives we don’t think of it anymore, but there are still the usual challenges and irritations that show how far the smart home needs to come. Enjoy the show, and I hope you have a restful end of the year.
One more note: I used a different microphone to record this show. I will not be using it again.
Hosts: Kevin Tofel and Stacey Higginbotham Guests: Andrew and Anna Allemann Sponsors: ADT and FSG
For those that want to experience a chill, stick around for Mike Spear, the ?Global Operations Manager, Industrial Cyber Security at ?Honeywell Process Solutions. He discusses everything from the differences in securing oil refiners and paper-making plants to how to train IT folks to think like a manufacturing security expert, if something along these lines of securing networks and systems sounds like a dream job to you, you might want to pursue an MS MIS from a university such as the University of Alabama Birmingham. We also revisit Petya and dig into who should pay for securing plants when compromising them doesn’t necessarily hurt the company’s bottom line, but might hurt the environment or national security. Enjoy the show!
Hosts: Stacey Higginbotham and Kevin Tofel Guest: Mike Spear of Honeywell Process Solutions Sponsors: HiQo Solutions and Eero
I can’t believe how many T-shirts this factory makes
HomeKit breaks Apple’s historical model and that’s okay
The Mighty player rocks!
How to train an IT security expert for manufacturing security
Which countries are creating good cyber risk regulations?