THEIR Things or OUR Things? It s a sad, rainy day. Your house: today and in 2025. 2 Think about your own life. 3 If 2025 is like today, this is true.



Similar documents
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Top 10: Firewall Shopping Checklist NEXT. Best viewed with Adobe Reader

Four Things You Must Do Before Migrating Archive Data to the Cloud

All can damage or destroy your company s computers along with the data and applications you rely on to run your business.

How To Build An Internet Of Things (Iot)

M 2 M IWG. Eclipse, M2M and the Internet of Things. Overview. M 2 M Industry WorkGroup! M2M?

Business Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence.

NFV: Addressing Global Challenges for Telecom Service Providers

Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions

Sponsored by: Speaker: Brian Madden, Independent Industry Analyst and Blogger

Cloud computing an insight

Is Cloud Computing Inevitable for Lawyers?

Selling Windows Azure Projects IT INFRASTRUCTURE

BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE.

KURA M2M/IoT Gateway. reducing the distance between embedded and enterprise technologies. Tiziano Modotti, October 28 th, 2014

THE MOBlLE APP. REVOLUTlON. 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD

An Enterprise Architect s Guide to API Integration for ESB and SOA

The Case AGAINST. Virtualization

Systems of Discovery The Perfect Storm of Big Data, Cloud and Internet-of-Things

Tips For Buying Cloud Infrastructure

3.2 million consumer chats. 2 million consumer chats. Dealerships Use Chat WebWide. www. autodealerchat.com

NETWORK SECURITY, REIMAGINED FPO

Insanely Great Backup & Recovery. Physical or Virtual Appliance + Cloud DR No per agent, client, OS or anything fee Amazing support

WINDOWS AZURE EXECUTION MODELS

SIP TRUNKING CHECKLIST

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

OpenStack Private Cloud

STORAGE AS. A SERVICE (STaaS) ELASTIC CLOUD STORAGE. global.de/cloud-storage MADE IN GERMANY

Here a token, there a token...

Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems

Monitor Open stack environments from the bottom up and front to back. Roger Ruttimann VP Engineering, GroundWork OpenSource November 17, 2015

Running a Successful Proof of Concept

SIP Trunking Checklist

WHITE PAPER. Data Center Fabrics. Why the Right Choice is so Important to Your Business

Is it really all going into the Cloud? Dr Geoff Barrall CEO Connected Data

How Solace Message Routers Reduce the Cost of IT Infrastructure

WINDOWS AZURE DATA MANAGEMENT

Lecture 02a Cloud Computing I

Seven Ways to Create an Unbeatable Enterprise Mobility Strategy

bright blue Intelligent Access Management

KEEPING YOUR SANITY AS YOU EMBRACE CLOUD AND MOBILE

ARM mbed IoT Device Platform. November 3 rd, 2014

Internet of Things From Idea to Scale

Securing the Growth of IoT and M2M

Enterprise Application Enablement for the Internet of Things

12 Security Camera System Best Practices - Cyber Safe

Transcription. Crashplan vs Backblaze. Which service should you pick the short version

Insanely Great Backup & Recovery. Physical or Virtual Appliance + Cloud DR No per agent, client, OS or anything fee Amazing support

( ://.. / ) ( ://. / )

Business continuity. Protecting your systems in today s world

The CIO s Dream: A Cloud Platform With Lower Cost, More Agility and Better Performance. A publication by:

Software Outsourcing - Software Development. info@westtownwebservices.com

Alliance Key Manager A Solution Brief for Technical Implementers

ARP and DNS. ARP entries are cached by network devices to save time, these cached entries make up a table

7 Tips on Becoming an IT Service Broker

White Paper: Cloud Identity is Different. World Leading Directory Technology. Three approaches to identity management for cloud services

Introduction to Microsoft Small Business Server

How To Choose Data Center Colocation Over Cloud Computing

THE CLOUD STORAGE ARGUMENT

Cloud Failover Appliance

Firewalls for small business

How to Meet EDI Compliance with Cloud ERP

1 of 8 3/7/2014 8:38 AM

The 2014 Bottleneck Report on Enterprise Mobile

Systems Manager Cloud Based Mobile Device Management

What can the. SaaS Whitepaper. Cloud do for You?

DB ACCESS GERMAN, SWISS & AUSTRIAN CONFERENCE

A New Approach to IoT Security

Ten Myths of Cloud Computing. Gene Eun Sr. Director Product Marketing, Cloud September 29, 2014

Module 1: Facilitated e-learning

Computing: Public, Private, and Hybrid. You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds.

Open-Source vs. Proprietary Software Pros and Cons

Private and Hybrid Custom Cloud Hosting of Microsoft Applications For Enterprises and Government Agencies

Delivering Analytics that Scale

Guide to CLOUD ACCOUNTING How you can transform your business today

BitLocker Drive Encryption

Who s Endian?

Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration

4 Critical Risks Facing Microsoft Office 365 Implementation

Cloud computing is a marketing term that means different things to different people. In this presentation, we look at the pros and cons of using

Click. Schedule. Relax.

Selenium Grid Build vs. Buy

WISE-4000 Series. WISE IoT Wireless I/O Modules

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

ARTIK TM. MyungKoo Kang (VP) The Ultimate Platform Solution for IoT. Samsung Electronics

The Dangers of Consumer Grade File Sharing in a Compliance Driven World

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.

THE REVOLUTION TOWARDS SOFTWARE- DEFINED NETWORKING

Keystone 600N5 SERVER and STAND-ALONE INSTALLATION INSTRUCTIONS

Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application

Cloud Computing for Business and Non-Profits

Questions from The New SensorTag - IoT Made Easy Webinar

An Introduction to Cloud Computing Concepts

Securing the Internet of Things: Mapping Attack Surface Areas Using the OWASP IoT Top 10

Regulatory Compliance

In the pursuit of becoming smart

CTX OVERVIEW. Ucentrik CTX

Locus Technologies Duplan Advises on Navigation of Rapidly Changing World of EHS/Sustainability Management

API Management: Powered by SOA Software Dedicated Cloud

Transcription:

Presentation to IoT Silicon Valley, 2015-01-20 1 Usually shiny new thing presentation. This is not. THEIR Things or OUR Things? Two goals: 1. Think about the big picture. Extrapolate. World you want for yourself and for your children? 2. I want you to think hard about what you are going to do about it. And then do it. I ll tell you want I m doing. Why we need an Indie IoT and how to get there Johannes Ernst CEO, Indie Computing Corp. @Johannes_Ernst Your house: today and in 2025 Some questions: How many IoT devices? From how many vendors? How much data? How many connected devices? From how many vendors? Where does the data go? 2 Think about your own life. Show of hands for now. Now think in 10 years. 10-100 times: all windows, doors, appliances, lots of cameras, presence detection. toilet You walking around in your house. Think of the data you are generating, how much of it. Think how and where it flows. Credit: Iconstorm http://www.iconflow.de/icon-design/erfolgsfaktoren-fuer-das-internet-of-things-am-beispiel-smart-home.html It s a sad, rainy day 3 If 2025 is like today, this is true. From Kai Kreuzer, head of Eclipse Smart Home project. Architecture prevents data integration. Credit: Kai Kreuzer http://de.slideshare.net/xthirtynine/eclipse-smart-home-webinar

Anatomy of an IoT cloud silo Vendor cloud with app, data, API 4 Architecture is worth examining in detail. Sensors sometimes separate (thermometer), sometimes built into something (washing machine). Sensors send data to vendor cloud as quickly as possible. Data storage on vendor cloud. Gateway is protocol converter. Sometimes packed with sensor, sometimes separate. Everything is locked, except for API on vendor s cloud. Why this architecture? Gateway Sensor(s), actuator(s) 5 Theory #1 :-) CEO: We need this in the cloud Dev: Cool. How come? CEO: Because The Cloud Dev : But what benefit are we lo- CEO: THE CLOOUUD!!! https://twitter.com/markkirschstein/status/555693921821810688 IoT Silo pros & cons For vendor For customer Hosting & bandwidth costs Access over public internet + 6 Maybe there s more to it. Stated reason: access over the public internet / firewall / requires cloud. But there are other reasons. Note that benefits of architecture almost all for vendor. Downside almost all for customer. Easy application updates + Simple + Cannot disagree No money in devices ++ I m overpaying Can monetize my customer s data ++ I have a veto over who gets to connect, yeah + Customer lock-in because vendor has customer s data ++ I m being spied on Need vendor permission to innovate and integrate I m being held hostage

Second-order effects Locks out startups and innovation. New things you do can be vetoed by somebody else. Old things you do can now be vetoed by somebody else. Vendor becomes overlord. Customer becomes subject. Nobody can tell whether your device has been hacked. Governments can demand real-time access to your home without you knowing. 7 It gets worse. Overlord in medieval times was lawgiver, judge and executive. We got separation of powers for good reason. I call it overlord, because we have no separation of powers: IoT overlord decrees laws (terms of service, features), interprets them without your right of representation of appeal, and enforces them (can kick you off the service any time). You have no input into the process. 8 Whatever you think of spying by government in the US, most of the world is worse. What we build in Silicon Valley will be used world-wide, and in many cases, not subject to 4th-amendment kind of protections. You can bet some governments will demand, and get, real-time views into your home. Imagine being a dissident discussing politics with your friend at home, or being a Christian in ISIS controlled territory. more civil liberties Credit: Freedom House https://www.freedomhouse.org/report-types/freedom-world less civil liberties Questions 9 Time to ask ourselves some questions. Do we want more or less innovation? Do we want more or less competition? Do we want more or less privacy? Do we want more overlords or more freedom to do what we please?

Aspects of control 10 I ve found it helpful to distinguish between these aspects of control. Control over terms of use Control over code Control over data Fixing the overlord architecture Overlord territory 1. 11 Surprisingly easy to fix the overlord architecture: 1.Unlock the devices in my home. The customer needs to own them; they need root. 2.Move the data home. Obvious candidate location: upgrade the gateway to have a hard drive. 2. Data location Home territory Indie IoT Architecture Cloud (only) for: encrypted backup firewall tunneling 12 Gateway gets the data, so it becomes a personal server with disks. s can run on personal server. Cloud demoted. root#_ Personal Server with all my data, apps from many vendors, API Sensor(s), actuator(s)

Analogy: self-tracking 13 Same architecture as for self-tracking apps: Silos inhibit. Personal Server needed. Credit: Aaron Parecki http://aaronparecki.com/articles/2013/10/11/1/the-future-of-quantified-self-devices Personal Server 14 Details. APIs for cloud services Manual or automatic management Installable 3rd party apps Personal data store Linux distro UBOS Many IoT protocols Many kinds of hardware You Boss Open-source Linux distro Aim: make it 10x easier to run apps on personal servers and keep them maintained for yourself and your family Single command: app install full-stack software upgrade other maintenance tasks http://ubos.net/ No backdoors, no lock-in. UBOSTM Indie Computing offers management services for humans; geeks can do their own management. 15 What I m doing about all of this: Need industrial-strength OS for personal servers. But needs to be open-source: no lock-in.

16 Open Indie IoT Ecosystem Sensors Management Service & Support Solutions Open-source operating system (UBOS) Personal Server Hardware Sensors Personal Server Hardware Sensors Personal Server Hardware Actuators Actuators Actuators Business Impact Specialization becomes possible, like in the PC ecosystem New product category: Personal Server Market for IoT software apps Management services Build solutions from other vendors products 17 18 Bruce Sterling: IoT is neither about internet nor things, but a battle for the control of property https://twitter.com/alvarodotcc/status/535526588528738304

Ask Tell Call to Action Overlord or Indie? I don t want overlords to control my things. It only needs a slight change in architecture. 19 What I want you to do: Ask yourself this question. Ask others this question. Think about your children. Tell others. And do. Would love to collaborate with people who have same goals. Do Build, productize, partner and buy consistent with your values. 20 Now go forth and take the world back from the overlords! And stay in touch: @Johannes_Ernst http://ubos.net/