The Programmable Internet of Things
Upcoming SlideShare
Loading in...5

The Programmable Internet of Things



This talk will focus on a concept first described as “the internet of things” and subsequently as the “internet of everything” and “the programmable world/internet.”

This talk will focus on a concept first described as “the internet of things” and subsequently as the “internet of everything” and “the programmable world/internet.”



Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds


Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

The Programmable Internet of Things The Programmable Internet of Things Presentation Transcript

  • INTRODUCTION AND DEFINITION What is it? The confluence of… 1. physical things (including humans) that can sense and/or broadcast information, 2. purely digital things in the internet that can both gather and transmit information, and 3. software that can interconnect all these things and trigger thing actions based on the occurrence of events. Related/Synonymous labels      Internet of things Internet of everything Industrial internet Programmable world Sensor web *This topic is closely related to last year’s Human Feedback Loop panel, in that things may be used to both gather and feedback information to humans
  • IT IS BECOMING AN INCREASINGLY HOT TOPIC  Carla Diana  NYT video (1:45)  WIRED - Welcome to the Programmable world  TECHCRUNCH - Making Sense Of The Internet Of Things  READWRITEWEB – Collection of articles related to Internet of Things  MASHABLE - Collection of articles related to Internet of Things Internet of Things Consortium  Invisible Usability  Open Data  Interoperability  Security
  • EXAMPLE EVENT-BASED ACTION SYSTEM OF THE PAST Relied on an event being detected by a sensor …but the sensor was the actual human user How would the internet of things handle this situation? …and users had to initiate the action (press button on a pendant to contact the dispatch service, which simply substituted for a phone call)
  • LANDSCAPE ACCORDING TO TECHCRUNCH Platforms 1. it is easier and cheaper than ever to produce hardware 2. the world of wireless connectivity has dramatically evolved 3. the Internet of Things is able to leverage an entire infrastructure Verticals 1. lot of early action directly at the vertical application level. 2. Nest Labs seem to have adopted a deeply integrated vertical strategy where they control key pieces of the product Building Blocks 1. the ultimate prize for many ambitious players in the space is to become the software platform 2. Successful players will be open and cooperative with other players
  • EXAMPLE APPLICATIONS AND PLAYERS (BY VERTICAL) Quantified Self / Fitness-Health • Withings • Fitbit • Jawbone Lifestyle Connected Home • Fitbark • Bitponics • Belkin • Smarthings • Nest Industries & Industrial Internet • Dashlabs • Telcare • Robotics • 3D printing
  • HOME AUTOMATION EXAMPLES * motion detector triggers picture capture Ray: …PS. No trick or treaters here yet. I am watching the front walk from my dlink while working Todd …here's a normal set of shots (we have 2 cams) of my wife arriving home from work (top is from upstairs camera)
  • -Physical and purely digital things can gather and/or broadcast info -Rules are used to connect things and control the world Examples of things that do 1 or 2 of 3 but not all -blink and Phillips lights = no gather or broadcast (most things that gather also broadcast) -an oil rig in South Dakota gathers and broadcasts info but mostly about itself -an evernote folder can gather info about itself and modify its attributes/contents
  • EARLY DAYS DRIVEN BY EARLY ADOPTERS Russell M Davies says…  A friend …Andy Huntingdon calls this stage the Geocities of things. It is about making stuff that might be a bit trivial and a bit silly and a bit pointless, but you get the satisfaction of making it yourself.  …"creating something personal, even of moderate quality, has a different kind of appeal to consuming something made by others, even of high quality".  This is a world where people make the things you would make if you were left to invent stuff on your own….. only gets thought about and only gets made by people who are tinkering, imagining and playing around the edges. Then when it really hits the mainstream….  According to one estimate, there will be 50 billion things online by 2020; another estimate suggests it will be a trillion - nobody really knows
  • THE INTERNET OF THINGS DESIGN SPACE Nature of thing Origin of Control Physical Purely Digital Local/manual - Switch dog collar transmitter on/off n/a? -direct - Use app to find out where dog ran away to - Manually add note to evernote folder -indirect -rule-based - Create rule to text you when dog breaches the perimeter - Create rule to auto-add to evernote folder all captured pics Remote/networked Each cell represents a user interface
  • THINGS TO CONSIDER RE: USER BEHAVIOR AND DESIGN • Design needs to take into account 1) the physical things, 2) the purely digital things, and especially 3) the definition, awareness and controlling of things • Shifting from a socially-dominated internet to one that is more pragmatic and functional? • Transcending notification/alerting to a new age of personal automation which involves things performing tasks on your behalf • Thinking in terms of tools/channels decomposed from larger applications • How will/should the creation and execution of rules manifest itself in user interfaces? This is the classic tradeoff between simplicity and power/control. • Open vs. closed rule-management and execution systems • Some things follow their own local rules, e.g. termites, flying robot insects, etc. • Analytics are an essential component in communication between things, and often in the form of a thing’s attributes
  • DESIGN GUIDELINES – CARLA DIANA “It’s an enormous puzzle where the pieces are disparate products, tools and protocols, but those designers who are up for the challenge are the ones the ones who will truly succeed in creating a future filled with products that have a positive impact on people’s lives.” 6 overarching guidelines when designing for the Internet of Things. 1. Watch out for information overload 2. Life now, data later (easy start with basics, get into deeper capabilities later) 3. Focus on the when, where and why (e.g. avoid bothering human at 2:30 am) 4. Connect with people emotionally 5. Play nice with others (cooperation between thing-makers) 6. Know when to borrow the screen (e.g. things without displays can leverage smartphone)
  • DESIGN GUIDELINES – JAMES STOLP 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. Design + technology. It’s not one or the other Design can drive global adoption of very complex things. Design can integrate new technology seamlessly into daily life. This hasn’t happened yet for the physical graph. We don’t need to start from scratch. Make it easy. Make it intelligent Make it open. Make it mobile. Make it beautiful. Make it agile. Make it together Add it all up, and we’re making it livable Keep the conversation going!
  • MORE DESIGN GUIDANCE The Open Design method (based on Open Source) suggests that… • In a world full of connectivity…we need new business models in the internet of things, e.g. quick and dirty experiments and trial and error design, demonstrated by the auto industry. Yves Behar • High-profile designer behind products like the Jawbone, Jambox and the Ouya gaming console… • Says…the biggest reason design is so critical, specifically for connected devices, is that these items need to integrate with their surroundings more than other devices. • …e.g….there’s no way, aside from making it available in a few different colors, for Behar to know how a user has decorated his living space Upcoming book
  • IMPLICATIONS FOR THIS YEAR’S THEME HEALTHCARE: COLLABORATING FOR BETTER SYSTEMS • Healthcare is probably as deep into this as any industry • Healthcare necessarily includes a wide range of very sophisticated things • Healthcare has long been determining the appropriate resource allocation between humans and machines, so probably can teach other industries about how to best leverage PIOT • “Sensing” is a huge component of healthcare, so more sensors communicating status is a good thing if it is kept under control
  • GENERAL CAPABILITIES OF THINGS AUTOMATION       Monitor and alert Communications support Create and/or combine content Copy/backup content from one location to another Keeping records of activities, organizing content Seeking more information about related events, things, etc.
  • TOOLS FOR PROGRAMMING THE WEB • = if this then that • Programming things • Yahoo Pipes • Creating and manipulating data to feed to things • Yahoo Query Language • Based on SQL, allows one to extract data from the web • APIs and other programmatic interfaces • Provide capability to leverage valuable, organized data services
  • EXAMPLES AND DEMONSTRATIONS  Points to consider  Tools are becoming increasingly accessible to “mere mortals”  The possibilities are endless  There is still much progress to be made  Demos  IFTTT + Phillips hue light bulbs  IFTTT + Blink(1) USB light  Yahoo Pipes, YQL, and APIs + IFTTT
  • EXAMPLE IFTTT RECIPES -creat recipe to text me every reddit TIL -turn on reddit to bilnk recipes
  • ONE MAN’S QUEST TO CONTROL ROOM LIGHTING Phil Wittmer says… Couple of videos to share after my Phillips Hue install.  First, here are some IFTTT recipes in action:  And here’s one that’s much more fun—using my phone’s mic input to create a dynamic light show based on music that’s playing:  It’s lots of fun, but already running up against some limitations of what the IFTTT and Hue recipes can do. With a bit more development, this is going to be super powerful.
  • BLINK WARS – RIGHT VS. LEFT SIDE OF THE ROOM Right side of the room sends email with subject: red to vs. Left side of the room sends email with subject: green to Which team can create more blinks? Meanwhile….
  • GETTING DATA USING YAHOO PIPES, YQL, ETC. 1. Using YQL and Yahoo Fantasy sports API to extract a fantasy basketball team roster  …which provides input to… 2. Using yahoo pipes to create RSS news feeds for all players on a fantasy team  …which can then be feed to the IFTTT RSS channel, e.g.
  • QUESTIONS AND DISCUSSION  Contact info     Twitter = @millerrich  Slideshare =  Slides for this talk will be posted, but feel free to email me directly
  • JEFF SOPER ON SECURITY There was one question ask yesterday about how secure are these devices. I don’t remember who asked the question but I was hoping that you might remember who it was. Anyway I have an answer the that question. Most of the intern enable device like cameras, light witch controllers, etc. do not have a lot of security around them. Most of them do not use SSL and if they require authentication it is generally basic authentication. Many of these devices are running small microcontrollers. The memory is limited and they are processing the request directly. The generally looking at the network as a serial data stream, think of the data coming from an old dial up modem. Larger devices like printers, media centers, etc. are usually running on a microprocessor. This means they are generally running some form of Linux the security on these device can very. Again most of these devices are not utilizing SSL due to the overhead both in hardware and software. Generally these devices rely on external security. They generally assume they are on a closed network or a network protected by a firewall. In other words if a network is not secured the device are open for attack. So what are the risks? Some might say, I am not worried that someone sees my driveway, backyard, etc. I have nothing to hide. This is not always the risk involved. In the case of many IP camera and routers you can update the firmware on these devices. Since most of these devices are running Linux and they open to hacking and uploading of custom code. The risk becomes greater if the device is opened to the internet. The general safety rules for connected device think of these devices as you would any computer on your network. Always change the default passwords on the device if it is behind a fire wall. If you change the ID do that also. I have a different password for your router than your attached devices. This provides multiple levels of protection. Only expose the devices that you really need on the internet. Remember you do not need to expose a device if it makes requests to the outside. Do not assume just because you change the port that it is hidden. Port scanners are simple scripts that can be run by almost anyone and it does not offer protect. Jeffrey W. Soper Senior Software Engineer Interactive Citation Workstation/LDC CPM Rep.