Rick Richardson's Views On Technology
  • Home
  • Blog

IoT Security: Smart Devices Must Have These Three Features to Be Secure

2/9/2020

0 Comments

 
Picture
In the UK, all Internet of Things (IoT) and smart consumer devices will need to adhere to specific security requirements, under new government proposals.

The legislation aims is to help protect citizens and businesses from the threats posed by cybercriminals increasingly targeting Internet of Things devices.

By hacking IoT devices, cybercriminals can build an army of devices that can be used to conduct DDoS attacks to take down online services, while poorly secured IoT devices can also serve as an easy way for hackers to get into networks and other systems across a network.

The proposed measures from the Department for Culture, Media and Sport (DCMS) have been developed in conjunction with the UK's National Cyber Security Centre (NCSC) and come following a consultation period with information security experts, product manufacturers and retailers and others.

"Our new law will hold firms manufacturing and selling internet-connected devices to account and stop hackers threatening people's privacy and safety," said Matt Warman, minister for digital and broadband at DCMS.

They also follow on from the previously suggested voluntary best practice requirements. Still, the legislation would require that IoT devices sold in the UK must follow three particular rules to be allowed to sell products in the UK. They are:

  • All consumer internet-connected device passwords must be unique and not resettable to any universal factory setting.
  • Manufacturers of consumer IoT devices must provide a public point of contact so anyone can report a vulnerability, and it will be acted on promptly.
  • Manufacturers of consumer IoT devices must explicitly state the minimum length of time for which the device will receive security updates at the point of sale, either in-store or online.

It is currently unclear how these rules will be enforced under any future law. While the government has said that its "ambition" is to introduce legislation in this area, and said this would be done "as soon as possible," there is no detail on when this would take place. A DCMS spokesperson said that the department would be working with retailers and manufacturers as the proposals move forward.

Many connected devices are shipped with simple, default passwordswhich in many cases can't be changed. At the same time, some IoT product manufacturers often lack a means of being contacted to report vulnerabilities – especially if that device is produced on the other side of the world.

In addition to this, it's been known for IoT products to stop receiving support from manufacturers suddenly, and by providing an exact length of time that devices will be supported will allow users to think about how secure the product will be in the long-term.

If products don't follow these rules, the new law proposes that these devices could potentially be banned from sale in the UK.

"Whilst the UK Government has previously encouraged industry to adopt a voluntary approach, it is now clear that decisive action is needed to ensure that strong cybersecurity is built into these products by design," said Warman.

"Our new law will hold firms manufacturing and selling internet-connected devices to account and stop hackers from threatening people's privacy and safety. It will mean robust security standards are built-in from the design stage and not bolted on as an afterthought," he added.

"Smart technology is increasingly central to the way we live our lives, so the development of this legislation to ensure that we are better protected is hugely welcomed," said Nicola Hudson, Policy and Communications Director at the NCSC.

"It will give shoppers increased peace of mind that the technology they are bringing into their homes is safe, and that issues such as pre-set passwords and sudden discontinuation of security updates are a thing of the past."
​
The UK isn't alone in attempting to secure the Internet of Things – ENISA, the European Union's cybersecurity agency, is also working towards legislation in this area. At the same time, the US government is also looking to regulate IoT to protect against cyber-attacks.
0 Comments

Apple, Google, Amazon, and the Zigbee Alliance Will Develop an Open-Source Smart Home Standard

2/2/2020

0 Comments

 
Picture
The Smart Home market is currently badly fragmented because each vendor has been focusing on creating a separate ecosystem with devices that are difficult or impossible to connect with those of their competitors.
This situation may be about to end with the announcement of a new project called Project Connected Home over IP.

In a surprising move, Amazon, Apple, Google, along with the Zigbee Alliance have announced a joint effort to define a new standard that would remove those barriers by increasing interoperability and simplifying development for smart device manufacturers. They will join Zigbee Alliance members such as IKEA, NXP Semiconductors, Samsung SmartThings, Schneider Electric, and Signify in contributing to a project that aims to increase trust and adoption of smart things.

The new project is essentially a way to certify that whatever smart device you buy will work with your existing home setup and connect with your smartphone or voice assistant of choice. In other words, it will allow smart things to speak a common language, so they know what the other devices do and how to interact with them, hopefully, governed by better, end-to-end security and privacy protections.

The success of this project hinges on the idea that if companies build their products to connect using Internet Protocol-based technologies, it will be easier for consumers to invest in building up mixed ecosystems that are "secure, reliable, and seamless to use."

The companies involved will take an open-source approach, so each will bring some of their smart home technologies to the table so that a common protocol can be developed as quickly as possible with relatively lower costs. That includes Amazon's Alexa, Apple's HomeKit and Siri, Zigbee's Dotdot, and Google Weave and Thread.

Once that new standard is ready, it will work alongside existing connectivity standards such as Wi-Fi, cellular, and Bluetooth Low Energy. A logo on the boxes of smart things will make it easy for consumers to discern what devices are guaranteed to work with each other, and this should also make things easier for manufacturers who no longer need to worry about which standards to support. Similarly, developers will be able to follow a standard for "lifecycle events such as provisioning/onboarding, removal, error recovery, and software update."

Before you get too excited about the new development, keep in mind that a preliminary draft will be completed by the end of 2020, so we'll probably have to wait until at least 2021 to see this project bear fruit. And be ready to buy new smart things if you want these benefits, as existing ones won't necessarily be able to work with the new protocol.
​
The new industry group will initially focus on physical safety products like smart locks, gas sensors, smoke alarms, security cameras, smart electrical plugs, and thermostats. Then they'll move on to cover most other smart home and commercial devices.

0 Comments

The Five Technologies for the Next Decade

12/29/2019

0 Comments

 
Picture
Heraclitus, the Greek philosopher of Ephesus, is credited with the quote, “The only constant in life is change.” It comes as no surprise that technology is gradually taking over all aspects of our day to day life. 
The rise of cutting-edge technology, including cloud-based computing, big data analysis, wearables, machine learnings, Internet of Things, AR/VR, and drones has been exhibiting nothing but change. Moreover, the rise of 5G technology is establishing even further growth prospects.
So, looking at the coming decade, these top 5 technologies are set to have the most significant impact and change: 
  • Artificial Intelligence (AI)
  • Blockchain
  • Augmented Reality and Virtual Reality (AR/VR)
  • Big Data
  • Internet of Things (IoT).
 
Artificial intelligence (AI)remains a hot spot, with its ever-increasing impact on numerous industries all over the world. AI is the most substantial and significant driving technology factor with its speedy execution in sectors like banking, retail, healthcare, agriculture, manufacturing, and defense. AI applications allow machines to learn from experience and work like humans by simulating human performance.
Whether it’s Apple’s self-driving car, Amazon’s Alexa and Echo, or Google’s Lens, the application of artificial intelligence holds the most vital prospect.
AI can impact the world economy on numerous grounds, like aiding or replacing human labor to finish the assigned work more rapidly. Consequently, it expands production, speeds up the processing of data flows, increases production and service development, thereby generating more wealth worldwide.
According to several media reports, 80% of emerging technologies will implement AI technology by 2021.
The important spheres where AI is used: 
•      Knowledge Reasoning
•      Machine Learning
•      Robotics
•      Natural Language Processing.
•      Planning 
 
Blockchainis significantly speedier and more reliable than the legacy technologies in completing a transaction and recording it securely. This is primarily due to the lack of manual processing or verification by mediators as it applies a distributed consensus.
Additionally, blockchain technology is expected to be honest and intended to deliver unaffected information. Thus, the probability of financial deficits is low, with the slightest possibilities of double counting and hacking.
Overall, the cohesive use of the technology can enable countries to attain better economic growth with streamlined day-to-day systems. Bitcoin is one of the best examples of blockchain technology use.
The important spheres where blockchain is used: 
•      Encrypted Messaging
•      Decentralized Internet
•      Distributed Cloud Storage
•      Networking Sites
•      Stock Exchange
•      Real Estate
 
Augmented Reality (AR) and Virtual Reality (VR)is seeing significant new implementations due to the shift in consumer desires and business demands. With hardware possibilities and digital capabilities becoming more easily accessible and inexpensive to the ordinary person, AR/VR technologies have evolved extraordinarily well in the last few years.

Almost every major sector, including healthcare, retail, pharma, gaming, entertainment, automobiles, and construction, are utilizing the technology to interrelate between the actual world and 3D virtual objects in real-time.

The important spheres where AR/VR is used: 
  • Design & Modelling
  • Business Logistics
  • Field Service
  • Entertainment Properties
  • Retail
  • Medical Training
 
Big Data is turning out to be an essential component for businesses to remain aggressive and competitive in most industries. Companies are utilizing this technology to identify and calculate consumption models or enhance operational effectiveness.

Investments in big data analytics software, hardware, and services are anticipated to increase in the new decade, due to the enormous amount of structured and unstructured data generated universally. This pervasive implementation of big data analytics is a significant tailwind driving the big data market on a global basis.

Big Data technology aids in controlling vast amounts of structured and unstructured information, thereby making it more straightforward for companies to make better business decisions. Moreover, big data analytics acts as a booster for marketing strategies, thereby improving customer relationships.

Additionally, with rising cyber-threats and cyber-crimes, big data is the best answer to fight fraud in online deals.

The important spheres where big data is used: 
  • Location Tracking
  • Precision Medicine
  • Fraud Detection & Handling
  • Advertising
  • Entertainment & Media.
 
Internet of Things (IoT)unites manufacturing, medical devices, vehicles, and a range of consumer and everyday products, which allows enhanced monitoring, analytics, and more.

IoT, in simple terms, implies connecting devices over the network or internet for the intent of interaction. In IoT, devices gather and distribute data that is accumulated in the cloud, thereby helping in faster analyzing information, gaining more accurate insights.

According to media reports, by 2025, the total installed base of IoT connected devices is expected to be around 75.44 billion globally. This represents a 500% increase over the last decade.
​
The important spheres where IoT is used: 
  • Connected Devices
  • Smart Homes
  • Wearables
  • Smart Cities.
0 Comments

Tim Berners-Lee Launches Plan to Fix the Web

12/8/2019

0 Comments

 
Picture
Tim Berners-Lee, the inventor of the world wide web, has officially launched the Contract for the Web, a set of principles designed to “fix” the internet and prevent us from sliding into a “digital dystopia,” The Guardian reports. The Contract lists nine core principles for governments, companies, and individuals to adhere to, including responsibilities to provide affordable, reliable internet access and to respect civil discourse and human dignity.

At launch, the initiative has received the backing of over 180 organizations, including tech companies such as Microsoft, Google, DuckDuckGo, and Facebook, and nonprofit groups such as the Electronic Frontier Foundation. The Guardian initially reported that Amazon and Twitter were absent from the list of backers, however now Twitter’s logo appears on the Contract’s homepage. Twitter’s increasing role in political discourse was recently brought into sharp focus after it chose to ban political ads on its platform, citing the “challenges to civic discourse” that they create.

The contract’s launch comes as tech companies such as Facebook and Google have faced mounting pressure around both the amount of user data they collect and how they collect it. The Contract for the Web includes principles designed to prevent this, including a requirement for companies to respect people’s privacy and personal data. If companies do not show that they are working to support these aims, they risk being removed from the list of the project’s endorsers.

It’s not that we need a 10-year plan for the web, we need to turn the web around now,” Berners-Lee said. The Contract, which includes 72 clauses alongside its nine principles, offers a shared vision for the web that Berners-Lee’s Web Foundation wants to see built, as well as a roadmap for action. Finally, it also provides a tool to try and hold companies and governments to account.

The governments of Germany, France, and Ghana have also signed up to the Contract’s founding principles. The Contract calls on governments to ensure everyone can connect to the internet, and to keep the internet available all of the time. This latter point feels especially timely in light of the Iranian government’s recent decision to shut down the internet in an attempt to prevent protests from spreading.
​
“The forces taking the web in the wrong direction have always been very strong,” Berners-Lee said, noting that it will be vital for citizens to hold governments and companies to account if the situation is to improve.

0 Comments

Global Survey Outlines the Next Wave of Technology Disruptors

8/18/2019

0 Comments

 
Picture
Frost & Sullivan's Information & Communications Technology (ICT) team conducted a small-scale survey, Global Next Wave Technology Disruptors, 2018, of 112 thought leaders from around the world to seek opinions on the technologies that will have a profound transformative impact on existing industry dynamics, value chains, and business models across multiple vertical markets in the next 10 years.

In addition to providing quantitative insight, the study also provides a top-level assessment of eight emerging technologies: 5G, Artificial Intelligence (AI), Blockchain and Distributed Ledger, Human Brain-Computer Interface, Human Intelligence Augmentation, Internet of Things (IoT), Natural Language Interfaces (NLIs) and Quantum Computing.

"Numerous technologies with limited adoption/availability at present will rise in relevance over the next ten years. 5G will play an important role over the next five years as commercial deployments commence, while Quantum Computing is set to have a huge impact in the coming decade," said Adrian Drozd, Research Director, ICT. "However, thinking of these emerging technologies in isolation will limit their effectiveness. For instance, IoT cannot reach its potential without AI, and AI can be powerful only by accessing the data generated by IoT."

"Technologies will reach maturity at different times; while some are already widely used, others are still in the development phase," noted Drozd. "Technology development should be guided by the use cases and real-life deployments that the solutions promise to enable."

New technologies are emerging at an unprecedented rate, each promising to be the next transformative force that will drive fundamental shifts across industries and society. Companies looking to tap growth opportunities in their respective sectors should consider joining Frost & Sullivan's global IoT & Digital Transformation Growth Partnership Service program.

0 Comments

Ford Wants All of Its Cars to ‘Talk’ and ‘Listen’to Each Other by 2022

1/27/2019

0 Comments

 
Picture
Several companies demonstrated C-V2X (cellular vehicle-to-everything)communications technology developed by Qualcomm at CES 2019. But Ford may be the most aggressive in bringing C-V2X to market. The Detroit automaker will add it to every new car and truck sold in the United States by 2022, Don Butler, executive director for Ford connected vehicle platform and product, wrote in a blog post.

C-V2X is the latest incarnation of so-called vehicle-to-everything (V2X), a communications technology that allows cars to “talk” to each other and infrastructure. The claimed advantage of this technology is that it can warn a driver of things beyond his or her line of sight. If a car is stopped at an intersection with poor visibility, it could, for example, pick up signals from other V2X-equipped cars or sensors mounted on nearby buildings to tell the driver if it’s okay to go.

Vehicles could also communicate with stoplights, telling drivers when a light is about to change. Audi already offers this in the form of its Traffic Light Information system. The system gives a countdown when a light is about to turn green, but it only works in a handful of cities (Audi also offers a built-in toll transponder that relies on V2X tech). Aptiv has placed sensors on traffic lights in Las Vegas to guide its self-driving cars, even when they’re onboard cameras don’t have a direct line of sight to the light.

Ford could take things even further, Butler wrote. C-V2X could be integrated with driver aids, like those in Ford’s recently introduced Co-Pilot360 suite. Or it could be added to self-driving cars. Emergency vehicles could be equipped with C-V2X transmitters, allowing cars to detect their presence and move out of the way.

The difference between the C-V2X tech embraced by Ford and previous systems is that it’s based on 5G. All other V2X systems to-date have used a competing setup called Dedicated Short-Range Communications (DSRC). But that means Ford will have to rely on the smooth rollout of 5G. Even the deployment of DSRC-based V2X vehicles and infrastructure has been slow, and DSRC is based on a more familiar technology derived from Wi-Fi.

“A conducive regulatory environment must be in place for C-V2X to be deployed, which is why we are working just as much with industry and government organizations to create such a technology-neutral environment,” Butler wrote in his blog post. He also told Bloombergthat he hopes other automakers will adopt C-V2X alongside Ford. He added that C-V2X is a simpler solution because telecom companies are already spending billions on 5G cell towers and antennas, while DSRC would require a separate government investment.
​
Despite the potential hurdles, Qualcomm expects C-V2X and other related technologies to become a significant part of its business. The company believes that, within five years, 75% of cars will have some form of connectivity. A critical mass of vehicles will be needed to realize the technology’s full benefit since cars that aren’t equipped with C-V2X or similar systems can’t communicate with each other. The more vehicles on the network, the more effective it is.

0 Comments

This Is How Artificial Intelligence Will Become Weaponized in Future Cyberattacks

11/25/2018

0 Comments

 
Picture
Artificial intelligence has the potential to bring a select set of advanced techniques to the table when it comes to cyber offense, researchers say.

Last week, researchers from Darktracesaid that the current threat landscape is full of everything from opportunistic attacks from teen hackers to advanced, state-sponsored assaults, and in the latter sense, attacks continue to evolve.

However, for each sophisticated attack currently in use, there is the potential for further development through the future use of AI.

Within the report, the cybersecurity firm documented three active threats in the wild which have been detected within the past 12 months. Analysis of these attacks – and a little imagination – has led the team to create scenarios using AI which could one day become reality.

"We expect AI-driven malware to start mimicking behavior that is usually attributed to human operators by leveraging contextualization," said Max Heinemeyer, Director of Threat Hunting at Darktrace. "But we also anticipate the opposite; advanced human attacker groups utilizing AI-driven implants to improve their attacks and enable them to scale better."

Trickbot. The first attack relates to an employee at a law firm who fell victim to a phishing campaign leading to a Trickbot infection.

Trickbot is a financial Trojan which uses the Windows vulnerability EternalBluein order to target banks and other institutions. The malware continues to evolve and is currently equipped with injectors, obfuscation, data-stealing modules, and locking mechanisms.

In this example, Trickbot was able to infect a further 20 devices on the network, leading to a costly clean-up process. Empire Powershell modules were also uncovered which are typically used in remote, keyboard-based infiltration post-infection.

AI's Future Role.Darktrace believes that in the future, malware bolstered through artificial intelligence will be able to self-propagate and use every vulnerability on offer to compromise a network.

"Imagine a worm-style attack, like WannaCry, which, instead of relying on one form of lateral movement (e.g., the EternalBlue exploit), could understand the target environment and choose lateral movement techniques accordingly," the company says.

If chosen vulnerabilities are patched, for example, the malware could then switch to brute-force attacks, keylogging, and other techniques which have proven to be successful in the past in similar target environments.

As the AI could sit, learn, and 'decide' on an attack technique, no traditional command-and-control (C2) servers would be necessary.

AI's Future Role.It is possible that AI could be used to further adapt to its environment. In the same manner, as before, contextualization can be used to blend in, but AI could also be used to mimic trusted system elements, improving stealth.

"Instead of guessing during which times normal business operations are conducted, it will learn it," the report suggests. "Rather than guessing if an environment is using mostly Windows machines or Linux machines, or if Twitter or Instagram would be a better channel, it will be able to gain an understanding of what communication is dominant in the target's network and blend in with it."

Take It Slow. In the final example, Darktrace uncovered malware from a medical technology company. What made the findings special was that data was being stolen at such a slow pace and in tiny packages that it avoided triggering data volume thresholds in security tools.

Multiple connections were made to an external IP address, but each connection contained less than 1MB. Despite the small packets, it did not take long before over 15GB of information was stolen.

By fading into the background of daily network activity, the attackers behind the data breach were able to steal patient names, addresses, and medical histories.

AI's Future Role. AI could not only provide a conduit for incredibly fast attacks but also "low and slow" assaults. It can also be used as a tool to learn what data transfer rates would flag suspicion to security solutions.

Instead of relying on a hard-coded threshold, for example, AI-driven malware would be able to dynamically adapt data theft rates and times to exfiltrate information without detection.
​
"Defensive cyber AI is the only chance to prepare for the next paradigm shift in the threat landscape when AI-driven malware becomes a reality," the company added. "Once the genie is out of the bottle, it cannot be put back in again."

0 Comments

The Largest Internet Company in 2030

9/23/2018

0 Comments

 
Picture
Thirty years ago, it was a big deal when schools got their first computers. Today, it's a big deal when students get their own laptops.

According to Thomas Frey, the senior futurist at the DaVinci Institute think tank, “In 14 years it'll be a big deal when students learn from robot teachers over the Internet.”

It's not just because the technology will be that sophisticated, Frey says, but because the company responsible for it will be the largest of its kind.

"I've been predicting that by 2030 the largest company on the Internet is going to be an education-based company that we haven't heard of yet," Frey said.

Frey's prediction comes amid a boom in artificial intelligence research. Google is developing DeepMind; a complex piece of machine-learning software and IBM is developing Watson-powered robots.

"Nobody has quite cracked the code for the future of education," Frey contends.

His vision for 2030 includes a massively enhanced version of today's open online courses – the kind of instruction you may find with Khan Academy, Coursera, or MIT OpenCourseWare. Only, the instructors won't be humans beamed through videos. They'll be bots, and they'll be smart enough to personalize each lesson plan to the student sitting in front of the screen.

Frey suspects that a new kind of efficiency will allow students to learn at much faster rates than if they had to compete with 19 other students for the teacher's attention. Students will breeze through their material at four or 10 times the speed, completing an undergraduate education in less than half a year.

"It learns what your proclivities are, it learns what your idiosyncrasies are," Frey explains. "It learns what your interests are, your reference points. And it figures out how to teach you in a faster way over time."

He uses the example of Google's DeepMindlearning to play the Atari video game "Breakout." Not only did it quickly pick up on the rules, but within a half hour it figured out a way to achieve incredibly high scores – all with little human input.

Machine learning will accelerate similarly in the education space, Frey says. Online bots will pick up on a student's strengths and weaknesses and use a series of algorithms to tailor the lessons accordingly. Research suggeststhis personalized method is among the most effective at raising kids' overall achievement.
Frey doesn't go so far as to argue education bots will replace traditional schooling outright. He sees them more as a supplement or a kind of tutor. If a child struggles with algebra, a bot may be able to offer some help during homework time or over the weekend.

It's up for debate whether AI can master the subtleties of language, thought, and reason all within the next 14 years. One of the most significant hurdles for machine learning is grasping social interactions. Many AI systems today are still less capable cognitively than a 6-year-old.

Frey trusts 14 years isn't too generous a timeline for the technology to ramp up, given how quickly technology innovation builds on itself. The Internet was beginning to enter a lot of people's homes 14 years ago. But by 2007 people were already surfing the Web on their iPhones, and today the Internet is almost omnipresent in daily life.
​
Frey predicts that artificial intelligence will have the same trajectory in the education space. By 2030, DeepMind's ability to master "Breakout" could seem as quaint as dial-up modems do today, and what seemed like a massive library of online content in 2016 could look to future students like a skimpy collection that hardly does anything.
0 Comments

Why Public Cloud and Edge Computing Are Essential to the Future of Smart Cities

7/29/2018

0 Comments

 
Picture
Sometime in early 2019, the self-driving e.GO Mover bus will hit the streets in Germany. The electrically powered vehicle can transport up to ten people, with a battery that lasts for ten hours or so.

And, it's powered by the cloud – the Microsoft Azure cloud platform, to be exact.

While autonomous vehicles powered by the cloud are not new, e.GO Mover highlights how artificial intelligence (AI), the Internet of Things (IoT), and edge computing projects are increasingly coming together to power smart cities. Amazon Web Services (AWS), for example, boasts customers including DriveAI, nuTonomy, TuSimple, and Mapillary—all of which work on autonomous vehicle systems.

Google Cloud Platform also lists best practicesfor building a connected vehicle solution for autonomous driving and vehicle-to-vehicle (V2V) communication on its platform as well.

The growth of such a trend is enabled by the availability of powerful AI tools on these cloud platforms. Machine learning tools are crucial to the development of such autonomous systems, and public cloud giants make them much more accessible. This helps the growth of IoT projects in smart cities as well.

Of course, the cloud on its own will not be able to drive the digital transformation of smart cities fully. Improved latency through next-generation 5G connectivity will also play a role, as autonomous vehicles and IoT devices will be able to send and receive critical data while operating more readily.

But, what happens when connectivity is spotty? That's when edge computing comes into play. Edge computing occurs when data is processed at the same location where it is collected. This means that autonomous vehicles or IoT devices will need some compute power on-board to be able to analyze the data they're receiving, without having to send it over a network to be processed and sent back.

Edge computing is especially crucial in autonomous vehicles, as the potential danger posed by poor operations is immense.
​
As more and more cities begin to embrace digital transformation, these three technologies will play an integral role in their future. And, as city officials start to rely more and more on these tools, we may see network operators, public cloud vendors, and IoT providers operating similarly to the way our utility providers operate today.
0 Comments

IBM Has Created a Computer Smaller Than a Grain of Salt

4/1/2018

0 Comments

 
Picture
If there's one downside to powerful computers, it's that they're too big.
Luckily, that's about to change. At least, if IBM has anything to say about it.

Earlier this month, IBM held its flagship conference, Think 2018, where the company unveiled what it claims is the world's smallest computer. They're not kidding: It's smaller than a grain of salt.

But don't let the size fool you: This little fella has the computing power of the x86 chip from 1990. Okay, so that's not great compared to what we have today but cut it some slack — you need a microscope to see it.

The computer will cost less than ten cents to manufacture, and will also pack "several hundred thousand transistors," according to the company. These will allow it to "monitor, analyze, communicate, and even act on data."

It even works with blockchain. Specifically, this computer will be a data source for blockchain applications. It's intended to help track the shipment of goods and detect theft, fraud, and non-compliance. It can also do basic AI tasks, such as sorting the data it's given.

According to IBM, this is only the beginning. "Within the next five years, cryptographic anchors — such as ink dots or tiny computers smaller than a grain of salt — will be embedded in everyday objects and devices," says IBM head of research Arvind Krishna. If he's correct, we'll see way more of these tiny systems in objects and devices in the years to come.
​
It's not clear yet when this thing will be released — IBM researchers are currently testing its first prototype. But one thing's for sure: The future is here. You just might need a microscope to see it.

0 Comments
Forward>>

    Author

    Rick Richardson, CPA, CITP, CGMA

    Rick is the editor of the weekly newsletter, Technology This Week. You can subscribe to it by visiting the website.

    Rick is also the Managing Partner of Richardson Media & Technologies, LLC. Prior to forming his current company, he had a 28-year career in technology with Ernst & Young, the last twelve years of which he served as National Director of Technology.

    Mr. Richardson has been named to the "Technology 100"- the annual honors list of the 100 key achievers in technology in America. He has also been honored by the American Institute of CPAs with two Lifetime Achievement awards and a Special Career Recognition Award for his contributions to the profession in the field of technology.

    In 2012, Rick was inducted into the Accounting Hall of Fame by CPA Practice Advisor Magazine. He has also been named to the 100 most influential individuals in the accounting profession in America by Accounting Today magazine.

    In 2017, Rick was inducted as a Marquis Who’s Who Lifetime Achiever, a registry of professionals who have excelled in their fields for many years and achieved greatness in their industry.

    He is a sought after speaker around the world, providing his annual forecast of future technology trends to thousands of business executives, professionals, community leaders, educators and students.

    Picture
    Picture
    Picture
    Picture
    Picture

    Archives

    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015

    Categories

    All
    Artificial Intelligence
    Audit
    Back Up
    Back-Up
    Blockchain
    Climate
    Cloud
    Collaboration
    Communication
    Coronavirus
    COVID 19
    COVID-19
    Digital Assistant
    Display
    Drone
    Edge Computing
    Education
    Enterprise
    Hardware
    Home Automation
    Internet Of Things
    Law
    Medicine
    Metaverse
    Mobile
    Mobile Payments
    Open Source
    Personalization
    Power
    Privacy
    Quantum Computing
    Remote Work
    Retail
    Robotics
    Security
    Software
    Taxes
    Transportation
    Wearables
    Wi Fi
    Wi-Fi

    RSS Feed

    View my profile on LinkedIn
Powered by Create your own unique website with customizable templates.