INTRODUCTION AND DEFINITION
What is it?
The confluence of…
physical things (including humans) that can sense and/or broadcast information,
purely digital things in the internet that can both gather and transmit information, and
software that can interconnect all these things and trigger thing actions based on the
occurrence of events.
Internet of things
Internet of everything
*This topic is closely related to last year’s Human Feedback Loop panel, in that things may be used to both gather
and feedback information to humans
IT IS BECOMING AN INCREASINGLY HOT TOPIC
NYT video (1:45)
WIRED - Welcome to the Programmable world
TECHCRUNCH - Making Sense Of The Internet Of Things
READWRITEWEB – Collection of articles related to Internet of Things
MASHABLE - Collection of articles related to Internet of Things
Internet of Things Consortium
EXAMPLE EVENT-BASED ACTION SYSTEM OF THE PAST
Relied on an event being
detected by a sensor
…but the sensor was the
actual human user
How would the internet
of things handle this
…and users had to initiate the action (press
button on a pendant to contact the dispatch
service, which simply substituted for a phone call)
EXAMPLES OF CONNECTED THINGS IN THE REAL WORLD
5 STAGES OF THE INTERNET OF THINGS
I.O.T. IS POTENTIALLY (ALREADY?) VAST
LANDSCAPE ACCORDING TO TECHCRUNCH
1. it is easier and cheaper
than ever to produce
2. the world of wireless
3. the Internet of Things is
able to leverage an entire
1. lot of early action directly
at the vertical application
2. Nest Labs seem to have
adopted a deeply
strategy where they
control key pieces of the
1. the ultimate prize for
many ambitious players in
the space is to become the
2. Successful players will be
open and cooperative with
EXAMPLE APPLICATIONS AND PLAYERS (BY VERTICAL)
Quantified Self /
• 3D printing
HOME AUTOMATION EXAMPLES
* motion detector triggers picture capture
…PS. No trick or treaters here yet.
I am watching the front walk from my dlink while working
…here's a normal set of shots (we have 2 cams) of
my wife arriving home from work (top is from
-Physical and purely
digital things can
-Rules are used to
connect things and
control the world
Examples of things that do 1 or 2 of 3 but not all
-blink and Phillips lights = no gather or broadcast
(most things that gather also broadcast)
-an oil rig in South Dakota gathers and broadcasts
info but mostly about itself
-an evernote folder can gather info about itself and
modify its attributes/contents
EARLY DAYS DRIVEN BY EARLY ADOPTERS
Russell M Davies says…
A friend …Andy Huntingdon calls this stage the Geocities of things. It is about
making stuff that might be a bit trivial and a bit silly and a bit pointless, but you get
the satisfaction of making it yourself.
…"creating something personal, even of moderate quality, has a different kind of
appeal to consuming something made by others, even of high quality".
This is a world where people make the things you would make if you were left to
invent stuff on your own….. only gets thought about and only gets made by people
who are tinkering, imagining and playing around the edges.
Then when it really hits the mainstream….
According to one estimate, there will be 50 billion things online by 2020; another
estimate suggests it will be a trillion - nobody really knows
THE INTERNET OF THINGS DESIGN SPACE
Nature of thing
Origin of Control
- Switch dog collar
- Use app to find
out where dog ran
- Manually add
note to evernote
- Create rule to text
you when dog
- Create rule to
evernote folder all
THINGS TO CONSIDER RE: USER BEHAVIOR AND DESIGN
Design needs to take into account 1) the physical things, 2) the purely digital things,
and especially 3) the definition, awareness and controlling of things
Shifting from a socially-dominated internet to one that is more pragmatic and
Transcending notification/alerting to a new age of personal automation which
involves things performing tasks on your behalf
Thinking in terms of tools/channels decomposed from larger applications
How will/should the creation and execution of rules manifest itself in user
interfaces? This is the classic tradeoff between simplicity and power/control.
Open vs. closed rule-management and execution systems
Some things follow their own local rules, e.g. termites, flying robot insects, etc.
Analytics are an essential component in communication between things, and often
in the form of a thing’s attributes
DESIGN GUIDELINES – CARLA DIANA
“It’s an enormous puzzle where the pieces are disparate products, tools and protocols,
but those designers who are up for the challenge are the ones the ones who will
truly succeed in creating a future filled with products that have a positive impact on
6 overarching guidelines when designing for the Internet of Things.
1. Watch out for information overload
2. Life now, data later (easy start with basics, get into deeper capabilities later)
3. Focus on the when, where and why (e.g. avoid bothering human at 2:30 am)
4. Connect with people emotionally
5. Play nice with others (cooperation between thing-makers)
6. Know when to borrow the screen (e.g. things without displays can leverage
DESIGN GUIDELINES – JAMES STOLP
Design + technology. It’s not one or the other
Design can drive global adoption of very complex things.
Design can integrate new technology seamlessly into daily life.
This hasn’t happened yet for the physical graph.
We don’t need to start from scratch.
Make it easy.
Make it intelligent
Make it open.
Make it mobile.
Make it beautiful.
Make it agile.
Make it together
Add it all up, and we’re making it livable
Keep the conversation going!
MORE DESIGN GUIDANCE
The Open Design method (based on Open Source) suggests that…
In a world full of connectivity…we need new business models in the
internet of things, e.g. quick and dirty experiments and trial and
error design, demonstrated by the auto industry.
High-profile designer behind products like the Jawbone, Jambox and
the Ouya gaming console…
Says…the biggest reason design is so critical, specifically for
connected devices, is that these items need to integrate with their
surroundings more than other devices.
…e.g….there’s no way, aside from making it available in a few
different colors, for Behar to know how a user has decorated his
IMPLICATIONS FOR THIS YEAR’S THEME
HEALTHCARE: COLLABORATING FOR BETTER SYSTEMS
Healthcare is probably as deep into this as any industry
Healthcare necessarily includes a wide range of very sophisticated things
Healthcare has long been determining the appropriate resource allocation between
humans and machines, so probably can teach other industries about how to best
“Sensing” is a huge component of healthcare, so more sensors communicating
status is a good thing if it is kept under control
GENERAL CAPABILITIES OF THINGS AUTOMATION
Monitor and alert
Create and/or combine content
Copy/backup content from one location to another
Keeping records of activities, organizing content
Seeking more information about related events, things, etc.
TOOLS FOR PROGRAMMING THE WEB
IFTTT.com = if this then that
• Programming things
• Creating and manipulating data to feed to things
Yahoo Query Language
• Based on SQL, allows one to extract data from the web
APIs and other programmatic interfaces
• Provide capability to leverage valuable, organized data services
EXAMPLES AND DEMONSTRATIONS
Points to consider
Tools are becoming increasingly accessible to “mere mortals”
The possibilities are endless
There is still much progress to be made
IFTTT + Phillips hue light bulbs
IFTTT + Blink(1) USB light
Yahoo Pipes, YQL, and APIs + IFTTT
EXAMPLE IFTTT RECIPES
-creat recipe to text
me every reddit TIL
-turn on reddit to
ONE MAN’S QUEST TO CONTROL ROOM LIGHTING
Phil Wittmer says…
Couple of videos to share after my Phillips Hue install.
First, here are some IFTTT recipes in action:
And here’s one that’s much more fun—using my phone’s mic input to create a dynamic
light show based on music that’s playing:
It’s lots of fun, but already running up against some limitations of what the IFTTT and
Hue recipes can do. With a bit more development, this is going to be super powerful.
BLINK WARS – RIGHT VS. LEFT SIDE OF THE ROOM
Right side of the room sends email with subject: red to firstname.lastname@example.org
Left side of the room sends email with subject: green to email@example.com
Which team can create more blinks?
GETTING DATA USING YAHOO PIPES, YQL, ETC.
1. Using YQL and Yahoo Fantasy sports API to extract a fantasy basketball team roster
…which provides input to…
2. Using yahoo pipes to create RSS news feeds for all players on a fantasy team
…which can then be feed to the IFTTT RSS channel, e.g.
QUESTIONS AND DISCUSSION
Twitter = @millerrich
Slideshare = http://www.slideshare.net/rdm121
Slides for this talk will be posted, but feel free to email me directly
JEFF SOPER ON SECURITY
There was one question ask yesterday about how secure are these devices. I don’t remember who asked the question but I was
hoping that you might remember who it was. Anyway I have an answer the that question.
Most of the intern enable device like cameras, light witch controllers, etc. do not have a lot of security around them. Most of
them do not use SSL and if they require authentication it is generally basic authentication. Many of these devices are
running small microcontrollers. The memory is limited and they are processing the request directly. The generally looking
at the network as a serial data stream, think of the data coming from an old dial up modem. Larger devices like printers,
media centers, etc. are usually running on a microprocessor. This means they are generally running some form of Linux the
security on these device can very. Again most of these devices are not utilizing SSL due to the overhead both in hardware
Generally these devices rely on external security. They generally assume they are on a closed network or a network protected by
a firewall. In other words if a network is not secured the device are open for attack. So what are the risks? Some might
say, I am not worried that someone sees my driveway, backyard, etc. I have nothing to hide. This is not always the risk
involved. In the case of many IP camera and routers you can update the firmware on these devices. Since most of these
devices are running Linux and they open to hacking and uploading of custom code. The risk becomes greater if the device is
opened to the internet.
The general safety rules for connected device think of these devices as you would any computer on your network. Always
change the default passwords on the device if it is behind a fire wall. If you change the ID do that also. I have a different
password for your router than your attached devices. This provides multiple levels of protection. Only expose the devices
that you really need on the internet. Remember you do not need to expose a device if it makes requests to the
outside. Do not assume just because you change the port that it is hidden. Port scanners are simple scripts that can be run
by almost anyone and it does not offer protect.
Jeffrey W. Soper
Senior Software Engineer
Interactive Citation Workstation/LDC CPM Rep.