Internet of Things with Eva Kaili: Future challenges

Eva Kaili, Member of the European Parliament, Chair of STOA, the European Parliament’s Science and Technology Options Assessment body talks about education systems, the digital single market, policy makers and the need for an Ai ethics code.

Ruben Gansen

Current advertising suffers from excess and poor targeting. Even with today's analytics, modern advertising fails. IoT promises different and personalized advertising rather than one-size-fits-all strategies. It transforms advertising from noise to a practical part of life because consumers interact with advertising through IoT rather than simply receiving it.

Fabricio Ruiz

In response to Ines Da Luz

Though IoT delivers an impressive set of benefits, it also presents a significant set of challenges. Here is a list of some its major issues Security − IoT creates an ecosystem of constantly connected devices communicating over networks. The system offers little control despite any security measures. This leaves users exposed to various kinds of attackers. Privacy − The sophistication of IoT provides substantial personal data in extreme detail without the user's active participation.

Here are a couple more: Complexity − Some find IoT systems complicated in terms of design, deployment, and maintenance given their use of multiple technologies and a large set of new enabling technologies. Flexibility − Many are concerned about the flexibility of an IoT system to integrate easily with another. They worry about finding themselves with several conflicting or locked systems. Compliance − IoT, like any other technology in the realm of business, must comply with regulations. Its complexity makes the issue of compliance seem incredibly challenging when many consider standard software compliance a battle.

Ines Da Luz

Though IoT delivers an impressive set of benefits, it also presents a significant set of challenges. Here is a list of some its major issues Security − IoT creates an ecosystem of constantly connected devices communicating over networks. The system offers little control despite any security measures. This leaves users exposed to various kinds of attackers. Privacy − The sophistication of IoT provides substantial personal data in extreme detail without the user's active participation.

Brianna Reid

IoT loses its distinction without sensors. They act as defining instruments which transform IoT from a standard passive network of devices into an active system capable of real-world integration.

Elfriede Rothenberg

New enabling technologies for networking, and specifically IoT networking, mean networks are no longer exclusively tied to major providers. Networks can exist on a much smaller and cheaper scale while still being practical. IoT creates these small networks between its system devices.

Анета Владимирова

We all know we should try to use less electricity, water and other resources, but actually changing our habits can be hard — especially when we can't see the immediate impact of our actions. A number of IoT products take aim at resource use by tracking and displaying real-time data to users, and by automating the operation of lights, appliances and heating and cooling systems to help reduce consumption.

Sárika Zsuzsi Görög

In response to Volodya Kuznetsov

Another major work related to iot is safety and security of these devices. Example, if you have health band on your wrist and you are entering your bank password then it may be hacked. How it will be hacked? The wrist band devices are so sensitive, that they catch each moment made by us. Suppose hackers get access to your band via application connected from your mobile, then they sneak into your band and record all your motions. These motions and your location is used to guess the password. Hence the security of such devices is of utmost important.

IoT has numerous number of applications. Just look around yourself, any mechanical, electrical or digital devices soon can be connected to internet to provide you data, to control them, regulate them and provide you with more clever usage and it's analysis.

Volodya Kuznetsov

Another major work related to iot is safety and security of these devices. Example, if you have health band on your wrist and you are entering your bank password then it may be hacked. How it will be hacked? The wrist band devices are so sensitive, that they catch each moment made by us. Suppose hackers get access to your band via application connected from your mobile, then they sneak into your band and record all your motions. These motions and your location is used to guess the password. Hence the security of such devices is of utmost important.

Doriane Mateu Phạm

While connectivity is key in IoT, the network enabled much more: the use of video, communication between/with miners, including the usage of collaboration and IM tools (which revolves a lot around the people aspect) and more.

Gunnr Østergård

Blockchain (there are many blockchains in fact and it’s more than the technology powering Bitcoin), has been mentioned by virtually all research firms as a rapidly accelerating evolution and it’s not just about financial services companies, the scope in which we tackled blockchain outside of its cryptocurrency roots the first time (namely FinTech or financial technology). In fact, the convergence of blockchain and the Internet of Things is on the agenda for many companies and there are existing implementations, solutions and initiatives in several areas, outside of IoT and financial services too.

Jalen Sepi Ozols

B2B technology marketing is fast becoming a data-driven business as marketers and their sales teams have more access to in-depth intelligence from inside and outside their ecosystems to help them inform communication and content development, set sophisticated follow-up strategies, and engage more prospects and customers in real-time. All of it predicated on the guiding principle that you can learn more from what someone is doing rather than what they are telling you.

Chares Valentinianus Kavanaugh

Another common issue facing IoT devices is that they are often resource-constrained and do not contain the compute resources necessary to implement strong security. As such, many devices do not or cannot offer advanced security features. For example, sensors that monitor humidity or temperature cannot handle advanced encryption or other security measures. Plus, as many IoT devices are "set it and forget it" -- placed in the field or on a machine and left until end of life -- they hardly ever receive security updates or patches.

Emīlija Bonomo

Customer data can offer a treasure trove of insight for companies to act on regarding customer preferences and behavior. This wealth of information provides a competitive advantage that helps companies attract and retain customers and grow revenue. But until now, much of this data was only available to tech companies.

Lizaveta Hersch

Prior to the emergence of the IoT, taking a step back to analyze all of the information provided by the assortment of devices it can encompass was exceedingly difficult, if not outright impossible. As David Smith, a principal program manager at Microsoft, noted in September 2014, "Getting access to data is something data scientists strive for. But all these devices are independent, and there's no way for anybody to aggregate that data together."

Elsa Hollis Bianco

In response to Maui Chibuzo Fèvre

The IoT application and solution architects are on the front lines to deal with the challenges from increasing data variety, volume and velocity. Their challenges include latency that impacts the availability of data, security of information and cost to manage and move the data.

The challenges we face in this area are still great - security being at the top of the list. Supporting the billions of connected devices through a stable network infrastructure is another. Soon enough, if all goes well, the phenomenon will be more than a trending hashtag - it will be a way of being in the world.

Jacquette Ionas Tennfjord

The word pervasive accurately describes how technology can be invasive and insidious, but the word ubiquitous accurately describes how universally accessible and compatible technology has become. Technology access has shifted from traditional desktop computers to intelligent handheld devices to household devices that are embedded with new connectivity. This information technology phenomenon provides easy and convenient access to relevant information through intelligent appliances that monitor, collect and transmit data.

Meltem Robledo

When data has to be analyzed and responded to in real-time, any delay is a formula for failure. Even with data traveling on the fastest networks, massive amounts converging on a local network and then a backbone can still take many seconds to reach a data center thousands of miles away, be analyzed, and the response returned to the recipient.

Maui Chibuzo Fèvre

The IoT application and solution architects are on the front lines to deal with the challenges from increasing data variety, volume and velocity. Their challenges include latency that impacts the availability of data, security of information and cost to manage and move the data.

YogaFan

Development of resource-constrained devices connected to the Internet also means that other applications like earthquake or tsunami early-warning systems can also be used by emergency services to provide more effective aid. IoT devices in this application typically span a large geographic area and can also be mobile.

Milburn Phillips

The Internet of Things is making sure that every single device you own is connected. Your refrigerator can tell you when the milk runs out. Alexa can order you a pizza.  The problem is that all of that interconnectedness makes consumers highly susceptible to cyberattacks. In fact, one study revealed that 70 percent of IoT devices have serious security vulnerabilities.  Specifically, insecure web interfaces and data transfers, insufficient authentication methods, and a lack of consumer security knowledge leave users open to attacks.

Aleksandra Galya

On the topic of education, are we going to see a better education system when it comes to personal skill and developement in the future? Not only do our kids require digital skills, some of them have better understanding of the social environments and some of them have better empathy, none of those skill are rewarded in school.

Odarka Katya

In response to Lucas Jessen

This is how it works, because you have hundreds of people trying to catch up with billions of people that are constantly coming up with something new. The more we exercise our creativity the more work for the politicians.

What is up to us is to make sure that we use all this technologies for good, but when it comes to policy makers, we have no control over. If AI is made well and given good amount of examples of how it should work, there is no obstacle for making a perfect decision, because human mind cant compare all these cases that efficiently.

Harald Normansson

A lack of security standards around the Internet of Things, means some devices might not have encrypted connections to the servers that power their smart features, or may be vulnerable to simple hacking techniques, making them ripe targets for cyber criminals.

Lucas Jessen

In response to Susan Boil

Countries and institutions always run a mile short when it comes to something new. I like that fact that the European Parliament is trying to understand, accept and improve what seems to be the future of the world.

This is how it works, because you have hundreds of people trying to catch up with billions of people that are constantly coming up with something new. The more we exercise our creativity the more work for the politicians.

Jessica Clemensen

The benefits of smart technology, 24-7 connectivity and the massive flow of accompanying data are clear for both businesses and everyday consumers. But, like any other new technology, as connected cars, smart phones, IoT-enabled manufacturing systems and countless other IoT products continue to come online en masse, new security concerns begin to surface, along with cyber criminals who are eager to exploit them.

jose bengoetxea

In response to PSJunkie

Thank you for the comments on using AI to improve our lives and the point about making profit.  It was spot on.

Here are six ways to make money in the Internet of Things.  I trust you will find this article most informative.

Анета Владимирова

Here are some of the technological challenges that IoT faces:

  • Many IoT Systems are poorly designed and implemented, using diverse protocols and technologies that create complex configurations.
  • Lack of mature IoT technologies and business processes
  • Limited guidance for life cycle maintenance and management of IoT devices
  • Limited best practices available for IoT developers
  • There is a lack of standards for authentication and authorization of IoT edge devices
  • There are no best practices for IoT-based incident response activities.
  • Audit and Logging standards are not defined for IoT components
  • Restricted interfaces available IoT devices to interact with security devices and applications.
  • No focus yet on identifying methods for achieving situational awareness of the security posture of an organization’s IoT assets.

YogaFan

In response to Gotthilf Engelbert

Hello. I am teaching IT in high school and it's very exciting. Can you tell me what are the most important technical skills we should be teaching in the classroom?

Gotthilf,

That would probably be decided by the schoole where you teach.  However, I would like to take this opportunity and list the basic technology skills that educators should have: Word Processing Skills, Spreadsheets Skills, Database Skills, Electronic Presentation Skills, Web Navigation Skills, Web Site Design Skills, E-Mail Management Skills, Digital Cameras, Computer Network Knowledge Applicable to your School System, File Management & Windows Explorer Skills, Downloading Software From the Web (Knowledge including eBooks), Installing Computer Software onto a Computer System, WebCT or Blackboard Teaching Skills, Videoconferencing skills, Computer-Related Storage Devices (Knowledge: disks, CDs, USB drives, zip disks, DVDs, etc.), Scanner Knowledge, Knowledge of PDAs, Deep Web Knowledge, Educational Copyright Knowledge, and Computer Security Knowledge.

Susan Boil

Countries and institutions always run a mile short when it comes to something new. I like that fact that the European Parliament is trying to understand, accept and improve what seems to be the future of the world.

PSJunkie

Thank you for the comments on using AI to improve our lives and the point about making profit.  It was spot on.

Slobodan Pavlicic

I find it amazing that politics can actually influence the evolution of new technologies.  I was wondering whether the opposite may be true too--are there ways that technology can shape politics too?

Gotthilf Engelbert

Hello. I am teaching IT in high school and it's very exciting. Can you tell me what are the most important technical skills we should be teaching in the classroom?

Sebastian Evander

I think more data can make technologies smarter. Every day we have new devices that offer incredible functionalities (like the fridges connected to your phone) and all these devices are connected one with the other in a growing personal network. Lot of stuff to read and lot of stuff to learn!


Please login to leave a response.