From an Irrational Fear of Basement Flooding to an Ongoing Amazon Web Services IoT Class What began as a project rooted in paranoia that my basement would flood evolved first into a lunch-and-learn I hosted for Cardinal Peak employees. During my initial presentation, I focused on Amazon Web Services’ “internet of things” (AWS IoT) services and how I created “SumPy,” an AWS IoT-driven sump pump monitor and alert system.
Some Predictions About the IoT in 2015 I generally am not a fan of the lists-of-predictions articles that tend to come out at the beginning of a year, but when I was approached by SiliconANGLE to make some predictions about the Internet of Things in 2015, I couldn’t resist: In 2015, we will see the proliferation of frameworks for communicating with and… View Article
Inside-Out Security for the IoT I’ve got a new blog post up on the Altera system design blog. It’s about designing secure IoT devices: Many Internet of Things (IoT) devices are real-world objects like appliances and thermostats, and therefore network security should be a paramount concern for vendors of IoT systems. Nothing erodes trust faster than real-world and personal consequences:… View Article
The IoT Ahead I had the pleasure of attending and speaking at the EE Live Internet-of-Things conference in San Jose last month. Since then, I’ve been reflecting on some of the bleeding edge technical concepts that were discussed there. It occurs to me that many of the IoT devices we are asked to design act as a standalone… View Article
IoT Comms Software Is Hard I’ve got a new blog post up at EE Times, talking about how to architect the network communications protocols for Internet-of-Things devices: Crafting a communications software stack tailored to the needs of your Internet of Things design is crucial — and not necessarily easy, given that options are continually evolving. Read the whole thing here.
“Who Am I” in the Internet of Things? Out of the box, Chromecast has no idea who I am, or what my available content is. In a few simple steps I’m up and running with my content. I didn’t even enter my username and password! How did Google do that? The answer involves a protocol called oAuth.