SlideShare a Scribd company logo
1 of 3
Download to read offline
 
	
  
	
  
A	
  Guided	
  Tour	
  to	
  the	
  Internet	
  of	
  Things	
  in	
  the	
  SIM	
  Connected	
  World	
  
By	
  Tom	
  Howells,	
  Fraud	
  &	
  Technology	
  Wire	
  	
  
Oct	
  30,	
  2015	
  
	
  
	
  
	
  
	
  
	
  
Everywhere	
  we	
  look	
  we	
  are	
  constantly	
  reminded	
  that	
  we	
  are	
  living	
  in	
  an	
  increasingly	
  connected	
  
world.	
  In	
  2014	
  over	
  1.5	
  billion	
  smartphone	
  and	
  tablets	
  shipped	
  versus	
  308	
  million	
  portable	
  PCs	
  
and	
  desktop	
  PCs.	
  Ericsson’s	
  June	
  2015	
  Mobility	
  Report	
  indicates	
  that	
  there	
  are	
  over	
  2.6	
  
billion	
  smartphone	
  subscriptions	
  worldwide,	
  a	
  figure	
  that	
  will	
  double	
  by	
  2020	
  as	
  smartphone	
  
penetration	
  rises	
  in	
  the	
  developing	
  world	
  (smartphone	
  penetration	
  has	
  largely	
  leveled	
  out	
  in	
  
markets	
  like	
  the	
  US,	
  Europe	
  and	
  China).	
  We	
  are	
  getting	
  to	
  the	
  point	
  where	
  the	
  majority	
  of	
  
computing	
  power	
  in	
  the	
  world	
  is	
  on	
  smartphones	
  not	
  computers.	
  The	
  common	
  denominator	
  
here	
  is	
  that	
  they’re	
  all	
  connected,	
  not	
  by	
  an	
  ethernet	
  card,	
  but	
  by	
  a	
  SIM	
  card.	
  This	
  industry	
  shift	
  
is	
  only	
  going	
  to	
  accelerate	
  with	
  the	
  myriad	
  of	
  devices	
  connected	
  through	
  	
  the	
  Internet	
  of	
  Things	
  
(IoT)	
  
This	
  “guided	
  tour”	
  series	
  of	
  posts	
  will	
  focus	
  on	
  the	
  Internet	
  of	
  Things	
  as	
  a	
  series	
  of	
  sensors	
  
connected	
  to	
  computer	
  systems	
  performing	
  analytics	
  and	
  machine	
  learning.	
  The	
  key	
  distinction	
  
here	
  is	
  sensors	
  are	
  automatically	
  feeding	
  machine	
  data	
  into	
  analytics	
  and	
  machine	
  learning	
  
engines	
  as	
  opposed	
  to	
  human	
  entered	
  data	
  via	
  a	
  touchscreen	
  or	
  mouse.	
  
The	
  IoT	
  industry	
  is	
  estimated	
  to	
  have	
  an	
  astonishing	
  maximum	
  potential	
  of	
  $3.9	
  to	
  	
  $11	
  trillion	
  
dollars.	
  This	
  guided	
  tour	
  will	
  look	
  at:	
  
• The	
  industries	
  that	
  IoT	
  will	
  impact	
  the	
  most	
  
• The	
  geographies	
  that	
  IoT	
  will	
  impact	
  the	
  most	
  
• Will	
  IoT	
  impact	
  B2B	
  or	
  B2C	
  the	
  most	
  
• The	
  economic	
  impact	
  
• The	
  critical	
  technological	
  requirements	
  to	
  guide	
  the	
  impact	
  to	
  $11	
  not	
  $3.9	
  trillion	
  dollars	
  
A	
  recent	
  McKinsey	
  report,	
  “The	
  Internet	
  of	
  Things:	
  Mapping	
  the	
  Value	
  Beyond	
  the	
  Hype”	
  found	
  
that:	
  
• Less	
  than	
  1%	
  of	
  the	
  data	
  collected	
  is	
  fully	
  exploited	
  
• Interoperability	
  between	
  IoT	
  systems	
  is	
  required	
  to	
  capture	
  40%	
  of	
  potential	
  value	
  
The	
  guided	
  tour	
  of	
  IoT	
  will	
  analyze,	
  in	
  a	
  series	
  of	
  posts:	
  
• The	
  Connected	
  Human/Self	
  
• The	
  Connected	
  Home	
  
• The	
  Connected	
  City	
  
• The	
  Connected	
  Car	
  
• The	
  Connected	
  Retailer	
  
• The	
  Connected	
  Office	
  
• The	
  Connected	
  Factory	
  
• The	
  Connected	
  Worksite	
  
• The	
  Connected	
  Utility	
  
• The	
  Connected	
  Outside	
  
The	
  importance	
  of	
  this	
  shift	
  is	
  important	
  not	
  only	
  to	
  these	
  areas	
  but	
  also	
  to	
  carriers.	
  Fierce	
  
Wireless	
  reported	
  that	
  in	
  Q3	
  2015,	
  “nearly	
  two-­‐thirds	
  of	
  AT&T’s	
  wireless	
  customer	
  growth	
  in	
  the	
  
quarter	
  came	
  from	
  connected	
  devices,	
  including	
  connected	
  cars.	
  While	
  AT&T	
  has	
  emphasized	
  
that	
  is	
  where	
  its	
  business	
  is	
  going	
  as	
  it	
  provides	
  cellular	
  connectivity	
  for	
  wearables,	
  cars	
  and	
  
devices	
  inside	
  in	
  smart	
  homes,	
  such	
  devices	
  typically	
  come	
  with	
  lower	
  average	
  revenue	
  per	
  user	
  
than	
  smartphones.”	
  
In	
  July,	
  British	
  telco	
  Vodafone,	
  the	
  second	
  largest	
  telecommunications	
  company	
  in	
  the	
  world,	
  
released	
  its	
  third	
  annual	
  M2M	
  Barometer	
  report,	
  which	
  offers	
  a	
  qualitative	
  and	
  quantitative	
  
glimpse	
  into	
  how	
  businesses	
  are	
  adopting	
  Machine-­‐to-­‐Machine	
  (M2M)	
  technology.	
  
At	
  a	
  high	
  level,	
  the	
  report’s	
  researchers,	
  analyzing	
  data	
  from	
  16	
  countries	
  and	
  650	
  business	
  
executives	
  across	
  seven	
  industries,	
  found	
  that	
  businesses	
  are	
  increasingly	
  adopting	
  and	
  
prioritizing	
  M2M	
  (compared	
  to	
  the	
  previous	
  reports	
  from	
  2013	
  and	
  2014),	
  and	
  that	
  M2M	
  is	
  not	
  
only	
  driving	
  new	
  business	
  and	
  operating	
  models,	
  but	
  is	
  also	
  significantly	
  augmenting	
  and	
  
improving	
  business	
  processes	
  through	
  a	
  number	
  of	
  means,	
  including	
  by	
  helping	
  businesses	
  to	
  
add	
  actionable	
  real-­‐time	
  analytics	
  to	
  their	
  data,	
  to	
  expand	
  their	
  reach	
  to	
  new	
  countries	
  and	
  
regions	
  and	
  to	
  connect	
  with	
  customers	
  more	
  effectively,	
  among	
  other	
  benefits.	
  In	
  fact,	
  83%	
  of	
  
M2M	
  adopters	
  agreed	
  that	
  they	
  had	
  gained	
  a	
  competitive	
  business	
  advantage	
  from	
  M2M	
  and	
  
59%	
  said	
  they	
  had	
  seen	
  significant	
  ROI,	
  mostly	
  within	
  the	
  first	
  12	
  months	
  of	
  adoption.	
  
This	
  new	
  world	
  is	
  also	
  a	
  new	
  playground	
  for	
  new	
  attacks.	
  We	
  are	
  in	
  a	
  land	
  of	
  opportunity	
  both	
  
for	
  the	
  vendor	
  and	
  the	
  cyber	
  fraudster.	
  Many	
  people	
  will	
  have	
  read	
  about	
  the	
  hacked	
  Jeep	
  in	
  
wired	
  magazine.	
  
The	
  problem	
  is	
  the	
  old	
  way	
  of	
  protecting	
  computer	
  systems	
  behind	
  a	
  firewall	
  and	
  analyzing	
  
signatures	
  or	
  log	
  files	
  doesn’t	
  work	
  in	
  the	
  IoT	
  world.	
  There’s	
  no	
  firewall	
  on	
  your	
  ioT	
  device.	
  Big	
  
data	
  applications	
  using	
  machine	
  learning	
  against	
  a	
  data	
  lake	
  of	
  IoT	
  packets	
  will	
  go	
  hand-­‐in-­‐hand	
  
with	
  the	
  hardware	
  sensors	
  of	
  IoT.	
  
Stay	
  tuned	
  for	
  future	
  articles.	
  
	
  
Tom	
  Howells	
  is	
  a	
  contributing	
  writer	
  for	
  Fraud	
  &	
  Technology	
  Wire	
  (www.fraudtechwire.com),	
  a	
  
weekly	
  publication	
  sponsored	
  by	
  Argyle	
  Data,	
  Inc.	
  
	
  
Sources:	
  
http://www.fiercewireless.com/story/att-­‐leans-­‐prepaid-­‐connected-­‐devices-­‐subscriber-­‐growth-­‐
q3/2015-­‐10-­‐22?utm_medium=nl&utm_source=internal	
  
http://www.forbes.com/sites/niallmccarthy/2015/01/27/connected-­‐cars-­‐by-­‐the-­‐numbers-­‐
infographic/	
  
http://www.wired.com/2015/01/consumers-­‐are-­‐in-­‐the-­‐connected-­‐cars-­‐driver-­‐seat-­‐in-­‐2015/	
  
http://www.autoblog.com/2015/02/06/bmw-­‐hack-­‐cyber-­‐security-­‐warning-­‐feature-­‐video/	
  
http://www.databreachtoday.com/blogs/internet-­‐buggy-­‐things-­‐p-­‐1862	
  
http://www.businessinsider.com/how-­‐the-­‐internet-­‐of-­‐things-­‐market-­‐will-­‐grow-­‐2014-­‐10	
  
http://money.cnn.com/2015/03/18/technology/apple-­‐pay-­‐fraud/	
  
http://www.wired.com/2015/07/hackers-­‐remotely-­‐kill-­‐jeep-­‐highway/	
  
	
  

More Related Content

What's hot

The Amazing Ways Telecom Companies Use Artificial Intelligence And Machine Le...
The Amazing Ways Telecom Companies Use Artificial Intelligence And Machine Le...The Amazing Ways Telecom Companies Use Artificial Intelligence And Machine Le...
The Amazing Ways Telecom Companies Use Artificial Intelligence And Machine Le...Bernard Marr
 
State of the internet of things (IoT) market 2016 edition
State of the internet of things (IoT) market 2016 editionState of the internet of things (IoT) market 2016 edition
State of the internet of things (IoT) market 2016 editionPrayukth K V
 
Top 10 trends of internet of things in 2020
Top 10 trends of internet of things in 2020Top 10 trends of internet of things in 2020
Top 10 trends of internet of things in 2020Claritus Consulting
 
Technology Trends 2016
Technology Trends 2016Technology Trends 2016
Technology Trends 2016James Lee
 
Idcb2 b integration_3rdplatform
Idcb2 b integration_3rdplatformIdcb2 b integration_3rdplatform
Idcb2 b integration_3rdplatformIDCMarketing
 
Top 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docxTop 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docxSameerShaik43
 
2017 Strategic Technology and Marketing Trends - Sacha Vekeman
2017 Strategic Technology and Marketing Trends - Sacha Vekeman2017 Strategic Technology and Marketing Trends - Sacha Vekeman
2017 Strategic Technology and Marketing Trends - Sacha Vekeman247 Invest
 
Ten trends of IoT in 2020 - InsideAIML
Ten trends of IoT in 2020 - InsideAIMLTen trends of IoT in 2020 - InsideAIML
Ten trends of IoT in 2020 - InsideAIMLVijaySharma802
 
IoT 1-H 2014 Forecast OnV1F 1-5KCg
IoT 1-H 2014 Forecast  OnV1F 1-5KCgIoT 1-H 2014 Forecast  OnV1F 1-5KCg
IoT 1-H 2014 Forecast OnV1F 1-5KCgDennis Ward
 
SVB Analytics Report on The Internet of Things
SVB Analytics Report on The Internet of ThingsSVB Analytics Report on The Internet of Things
SVB Analytics Report on The Internet of ThingsSilicon Valley Bank
 
IoT Training, Learn IoT From Scratch With Tonex Training
IoT Training, Learn IoT From Scratch With Tonex TrainingIoT Training, Learn IoT From Scratch With Tonex Training
IoT Training, Learn IoT From Scratch With Tonex TrainingBryan Len
 
Internet of Things (IoT) Expert Session Webinar
Internet of Things (IoT) Expert Session WebinarInternet of Things (IoT) Expert Session Webinar
Internet of Things (IoT) Expert Session Webinaribi
 
Designing for Manufacturing's 'Internet of Things'
Designing for Manufacturing's 'Internet of Things'Designing for Manufacturing's 'Internet of Things'
Designing for Manufacturing's 'Internet of Things'Cognizant
 
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...Son Phan
 
Technological Trends Ready to Revolutionize in 2022!
Technological Trends Ready to Revolutionize in 2022! Technological Trends Ready to Revolutionize in 2022!
Technological Trends Ready to Revolutionize in 2022! Inexture Solutions
 
IoT Trends and Statistics
IoT Trends and StatisticsIoT Trends and Statistics
IoT Trends and StatisticsCloudOne
 

What's hot (20)

The Amazing Ways Telecom Companies Use Artificial Intelligence And Machine Le...
The Amazing Ways Telecom Companies Use Artificial Intelligence And Machine Le...The Amazing Ways Telecom Companies Use Artificial Intelligence And Machine Le...
The Amazing Ways Telecom Companies Use Artificial Intelligence And Machine Le...
 
State of the internet of things (IoT) market 2016 edition
State of the internet of things (IoT) market 2016 editionState of the internet of things (IoT) market 2016 edition
State of the internet of things (IoT) market 2016 edition
 
Top 10 trends of internet of things in 2020
Top 10 trends of internet of things in 2020Top 10 trends of internet of things in 2020
Top 10 trends of internet of things in 2020
 
Technology Trends 2016
Technology Trends 2016Technology Trends 2016
Technology Trends 2016
 
Idcb2 b integration_3rdplatform
Idcb2 b integration_3rdplatformIdcb2 b integration_3rdplatform
Idcb2 b integration_3rdplatform
 
Top 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docxTop 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docx
 
2017 Strategic Technology and Marketing Trends - Sacha Vekeman
2017 Strategic Technology and Marketing Trends - Sacha Vekeman2017 Strategic Technology and Marketing Trends - Sacha Vekeman
2017 Strategic Technology and Marketing Trends - Sacha Vekeman
 
Ten trends of IoT in 2020 - InsideAIML
Ten trends of IoT in 2020 - InsideAIMLTen trends of IoT in 2020 - InsideAIML
Ten trends of IoT in 2020 - InsideAIML
 
IoT 1-H 2014 Forecast OnV1F 1-5KCg
IoT 1-H 2014 Forecast  OnV1F 1-5KCgIoT 1-H 2014 Forecast  OnV1F 1-5KCg
IoT 1-H 2014 Forecast OnV1F 1-5KCg
 
SVB Analytics Report on The Internet of Things
SVB Analytics Report on The Internet of ThingsSVB Analytics Report on The Internet of Things
SVB Analytics Report on The Internet of Things
 
IoT Training, Learn IoT From Scratch With Tonex Training
IoT Training, Learn IoT From Scratch With Tonex TrainingIoT Training, Learn IoT From Scratch With Tonex Training
IoT Training, Learn IoT From Scratch With Tonex Training
 
Internet of Things (IoT) Expert Session Webinar
Internet of Things (IoT) Expert Session WebinarInternet of Things (IoT) Expert Session Webinar
Internet of Things (IoT) Expert Session Webinar
 
Designing for Manufacturing's 'Internet of Things'
Designing for Manufacturing's 'Internet of Things'Designing for Manufacturing's 'Internet of Things'
Designing for Manufacturing's 'Internet of Things'
 
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
 
Internet of Things Facts and Stats
Internet of Things Facts and StatsInternet of Things Facts and Stats
Internet of Things Facts and Stats
 
IoT Growth: A Forecast
IoT Growth: A ForecastIoT Growth: A Forecast
IoT Growth: A Forecast
 
Technological Trends Ready to Revolutionize in 2022!
Technological Trends Ready to Revolutionize in 2022! Technological Trends Ready to Revolutionize in 2022!
Technological Trends Ready to Revolutionize in 2022!
 
IoT Trends and Statistics
IoT Trends and StatisticsIoT Trends and Statistics
IoT Trends and Statistics
 
Idc predictions 2015
Idc predictions 2015Idc predictions 2015
Idc predictions 2015
 
IoT Trends in 2015
IoT Trends in 2015IoT Trends in 2015
IoT Trends in 2015
 

Viewers also liked

Cartonlab: cardboard ecodesign
Cartonlab: cardboard ecodesignCartonlab: cardboard ecodesign
Cartonlab: cardboard ecodesignCartonLab
 
Sesión 15 ejercitación
Sesión 15 ejercitaciónSesión 15 ejercitación
Sesión 15 ejercitaciónAndrés García
 
Sesión 13 ejercitación
Sesión 13 ejercitaciónSesión 13 ejercitación
Sesión 13 ejercitaciónAndrés García
 
Connectem VCM powered by VMware - partner brief
Connectem VCM powered by VMware - partner briefConnectem VCM powered by VMware - partner brief
Connectem VCM powered by VMware - partner briefMary McEvoy Carroll
 
Ecodesign with cardboard.CartonLAB Co&Co Bilbao 26 02_2014
Ecodesign with cardboard.CartonLAB Co&Co Bilbao 26 02_2014Ecodesign with cardboard.CartonLAB Co&Co Bilbao 26 02_2014
Ecodesign with cardboard.CartonLAB Co&Co Bilbao 26 02_2014CartonLab
 
Lessini Durello: Autentico Autoctono
Lessini Durello: Autentico AutoctonoLessini Durello: Autentico Autoctono
Lessini Durello: Autentico AutoctonoAIS Como
 
Riesling: nobiltà e lignaggio al servizio del terroir
Riesling: nobiltà e lignaggio al servizio del terroirRiesling: nobiltà e lignaggio al servizio del terroir
Riesling: nobiltà e lignaggio al servizio del terroirAIS Como
 
What is the connected retail environment?
What is the connected retail environment?What is the connected retail environment?
What is the connected retail environment?Mary McEvoy Carroll
 
Hadoop top 20 influencers of 2015
Hadoop top 20 influencers of 2015Hadoop top 20 influencers of 2015
Hadoop top 20 influencers of 2015Mary McEvoy Carroll
 
Secure from GO: Design considerations for the integration of security into L...
Secure from GO:  Design considerations for the integration of security into L...Secure from GO:  Design considerations for the integration of security into L...
Secure from GO: Design considerations for the integration of security into L...Mary McEvoy Carroll
 
Infonetics and Stoke webinar: Security at the speed of VoLTE
Infonetics and Stoke webinar: Security at the speed of VoLTEInfonetics and Stoke webinar: Security at the speed of VoLTE
Infonetics and Stoke webinar: Security at the speed of VoLTEMary McEvoy Carroll
 
Securing the LTE Core: the Road to NFV
Securing the LTE Core:  the Road to NFVSecuring the LTE Core:  the Road to NFV
Securing the LTE Core: the Road to NFVMary McEvoy Carroll
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerationsMary McEvoy Carroll
 

Viewers also liked (17)

Ventanas
VentanasVentanas
Ventanas
 
Escaleras 2
Escaleras 2Escaleras 2
Escaleras 2
 
Cartonlab: cardboard ecodesign
Cartonlab: cardboard ecodesignCartonlab: cardboard ecodesign
Cartonlab: cardboard ecodesign
 
Sec conf london_v07
Sec conf london_v07Sec conf london_v07
Sec conf london_v07
 
Sesión 15 ejercitación
Sesión 15 ejercitaciónSesión 15 ejercitación
Sesión 15 ejercitación
 
Sesión 13 ejercitación
Sesión 13 ejercitaciónSesión 13 ejercitación
Sesión 13 ejercitación
 
Connectem VCM powered by VMware - partner brief
Connectem VCM powered by VMware - partner briefConnectem VCM powered by VMware - partner brief
Connectem VCM powered by VMware - partner brief
 
Ecodesign with cardboard.CartonLAB Co&Co Bilbao 26 02_2014
Ecodesign with cardboard.CartonLAB Co&Co Bilbao 26 02_2014Ecodesign with cardboard.CartonLAB Co&Co Bilbao 26 02_2014
Ecodesign with cardboard.CartonLAB Co&Co Bilbao 26 02_2014
 
Lessini Durello: Autentico Autoctono
Lessini Durello: Autentico AutoctonoLessini Durello: Autentico Autoctono
Lessini Durello: Autentico Autoctono
 
Riesling: nobiltà e lignaggio al servizio del terroir
Riesling: nobiltà e lignaggio al servizio del terroirRiesling: nobiltà e lignaggio al servizio del terroir
Riesling: nobiltà e lignaggio al servizio del terroir
 
What is the connected retail environment?
What is the connected retail environment?What is the connected retail environment?
What is the connected retail environment?
 
Hadoop top 20 influencers of 2015
Hadoop top 20 influencers of 2015Hadoop top 20 influencers of 2015
Hadoop top 20 influencers of 2015
 
Secure from GO: Design considerations for the integration of security into L...
Secure from GO:  Design considerations for the integration of security into L...Secure from GO:  Design considerations for the integration of security into L...
Secure from GO: Design considerations for the integration of security into L...
 
Lte transport requirements
Lte transport requirementsLte transport requirements
Lte transport requirements
 
Infonetics and Stoke webinar: Security at the speed of VoLTE
Infonetics and Stoke webinar: Security at the speed of VoLTEInfonetics and Stoke webinar: Security at the speed of VoLTE
Infonetics and Stoke webinar: Security at the speed of VoLTE
 
Securing the LTE Core: the Road to NFV
Securing the LTE Core:  the Road to NFVSecuring the LTE Core:  the Road to NFV
Securing the LTE Core: the Road to NFV
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerations
 

Similar to Guide to the Impact of IoT in Connected World

State-of-market-the-market-the-internet-of-things-2015
State-of-market-the-market-the-internet-of-things-2015State-of-market-the-market-the-internet-of-things-2015
State-of-market-the-market-the-internet-of-things-2015Jerome Stembridge
 
An Internet of Things blueprint for a smarter world
An Internet of Things blueprint for a smarter worldAn Internet of Things blueprint for a smarter world
An Internet of Things blueprint for a smarter worldMarc Jadoul
 
Governança de TI em um mundo cada vez mais hiperconectado
Governança de TI em um mundo cada vez mais hiperconectadoGovernança de TI em um mundo cada vez mais hiperconectado
Governança de TI em um mundo cada vez mais hiperconectadoCezar Taurion
 
Deloitte étude TMT Prédictions 2015
Deloitte étude TMT Prédictions 2015Deloitte étude TMT Prédictions 2015
Deloitte étude TMT Prédictions 2015polenumerique33
 
Tmt predictions 2015 deloitte
Tmt predictions 2015 deloitteTmt predictions 2015 deloitte
Tmt predictions 2015 deloitteOptimediaSpain
 
Technology, media and Telecommunications predictions for 2015
Technology, media and Telecommunications predictions for 2015Technology, media and Telecommunications predictions for 2015
Technology, media and Telecommunications predictions for 2015Thierry Labro
 
Middle East IoT Workshop
Middle East IoT WorkshopMiddle East IoT Workshop
Middle East IoT WorkshopHaider Iqbal
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...Ahmed Banafa
 
iot-bringing-trust-to-iot[1]
iot-bringing-trust-to-iot[1]iot-bringing-trust-to-iot[1]
iot-bringing-trust-to-iot[1]Haider Iqbal
 
A Guide To The Internet Of Things
A Guide To The Internet Of ThingsA Guide To The Internet Of Things
A Guide To The Internet Of ThingsBryan K. O'Rourke
 
Report 3 the fourth industrial revolution - things to tighten the link betwe...
Report 3  the fourth industrial revolution - things to tighten the link betwe...Report 3  the fourth industrial revolution - things to tighten the link betwe...
Report 3 the fourth industrial revolution - things to tighten the link betwe...Rick Bouter
 
Internet-of-Things_Report
Internet-of-Things_ReportInternet-of-Things_Report
Internet-of-Things_ReportOceane Rime
 
The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...
The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...
The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...VINTlabs | The Sogeti Trendlab
 
Sogeti things - the fourth industrial revolution - things to tighten the li...
Sogeti   things - the fourth industrial revolution - things to tighten the li...Sogeti   things - the fourth industrial revolution - things to tighten the li...
Sogeti things - the fourth industrial revolution - things to tighten the li...polenumerique33
 
Device democracy -Saving the future of the #InternetOfThings @IBMIBV
Device democracy -Saving the future of the #InternetOfThings  @IBMIBV Device democracy -Saving the future of the #InternetOfThings  @IBMIBV
Device democracy -Saving the future of the #InternetOfThings @IBMIBV Diego Alberto Tamayo
 
The Definitive Guide to IoT for Business
The Definitive Guide to IoT for BusinessThe Definitive Guide to IoT for Business
The Definitive Guide to IoT for BusinessAeris
 

Similar to Guide to the Impact of IoT in Connected World (20)

Top 14 IoT Trends to Emerge in 2023.pdf
Top 14 IoT Trends to Emerge in 2023.pdfTop 14 IoT Trends to Emerge in 2023.pdf
Top 14 IoT Trends to Emerge in 2023.pdf
 
State-of-market-the-market-the-internet-of-things-2015
State-of-market-the-market-the-internet-of-things-2015State-of-market-the-market-the-internet-of-things-2015
State-of-market-the-market-the-internet-of-things-2015
 
An Internet of Things blueprint for a smarter world
An Internet of Things blueprint for a smarter worldAn Internet of Things blueprint for a smarter world
An Internet of Things blueprint for a smarter world
 
Governança de TI em um mundo cada vez mais hiperconectado
Governança de TI em um mundo cada vez mais hiperconectadoGovernança de TI em um mundo cada vez mais hiperconectado
Governança de TI em um mundo cada vez mais hiperconectado
 
Deloitte - 2015 Teknoloji, Medya ve Telekominikasyon tahmini
Deloitte - 2015 Teknoloji, Medya ve Telekominikasyon tahminiDeloitte - 2015 Teknoloji, Medya ve Telekominikasyon tahmini
Deloitte - 2015 Teknoloji, Medya ve Telekominikasyon tahmini
 
Deloitte étude TMT Prédictions 2015
Deloitte étude TMT Prédictions 2015Deloitte étude TMT Prédictions 2015
Deloitte étude TMT Prédictions 2015
 
Tmt predictions 2015 deloitte
Tmt predictions 2015 deloitteTmt predictions 2015 deloitte
Tmt predictions 2015 deloitte
 
Technology, media and Telecommunications predictions for 2015
Technology, media and Telecommunications predictions for 2015Technology, media and Telecommunications predictions for 2015
Technology, media and Telecommunications predictions for 2015
 
Middle East IoT Workshop
Middle East IoT WorkshopMiddle East IoT Workshop
Middle East IoT Workshop
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
 
iot-bringing-trust-to-iot[1]
iot-bringing-trust-to-iot[1]iot-bringing-trust-to-iot[1]
iot-bringing-trust-to-iot[1]
 
A Guide To The Internet Of Things
A Guide To The Internet Of ThingsA Guide To The Internet Of Things
A Guide To The Internet Of Things
 
Report 3 the fourth industrial revolution - things to tighten the link betwe...
Report 3  the fourth industrial revolution - things to tighten the link betwe...Report 3  the fourth industrial revolution - things to tighten the link betwe...
Report 3 the fourth industrial revolution - things to tighten the link betwe...
 
Internet-of-Things_Report
Internet-of-Things_ReportInternet-of-Things_Report
Internet-of-Things_Report
 
Ss eb31
Ss eb31Ss eb31
Ss eb31
 
2018 App Segments for IoT to Invest
2018 App Segments for IoT to Invest2018 App Segments for IoT to Invest
2018 App Segments for IoT to Invest
 
The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...
The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...
The Fourth Industrial Revolution – Internet of Things to Tighten the Link bet...
 
Sogeti things - the fourth industrial revolution - things to tighten the li...
Sogeti   things - the fourth industrial revolution - things to tighten the li...Sogeti   things - the fourth industrial revolution - things to tighten the li...
Sogeti things - the fourth industrial revolution - things to tighten the li...
 
Device democracy -Saving the future of the #InternetOfThings @IBMIBV
Device democracy -Saving the future of the #InternetOfThings  @IBMIBV Device democracy -Saving the future of the #InternetOfThings  @IBMIBV
Device democracy -Saving the future of the #InternetOfThings @IBMIBV
 
The Definitive Guide to IoT for Business
The Definitive Guide to IoT for BusinessThe Definitive Guide to IoT for Business
The Definitive Guide to IoT for Business
 

More from Mary McEvoy Carroll

Machine learning's 2015 top influencers
Machine learning's 2015 top influencersMachine learning's 2015 top influencers
Machine learning's 2015 top influencersMary McEvoy Carroll
 
Top5 protectiondomains infographic_final
Top5 protectiondomains infographic_finalTop5 protectiondomains infographic_final
Top5 protectiondomains infographic_finalMary McEvoy Carroll
 
Secure from go: Stoke Guide to Securing LTE Networks from Day 1
Secure from go:  Stoke Guide to Securing LTE Networks from Day 1Secure from go:  Stoke Guide to Securing LTE Networks from Day 1
Secure from go: Stoke Guide to Securing LTE Networks from Day 1Mary McEvoy Carroll
 
Infonetics white paper: Security at the Speed of VoLTE
Infonetics white paper:  Security at the Speed of VoLTEInfonetics white paper:  Security at the Speed of VoLTE
Infonetics white paper: Security at the Speed of VoLTEMary McEvoy Carroll
 

More from Mary McEvoy Carroll (6)

Machine learning's 2015 top influencers
Machine learning's 2015 top influencersMachine learning's 2015 top influencers
Machine learning's 2015 top influencers
 
Latency considerations in_lte
Latency considerations in_lteLatency considerations in_lte
Latency considerations in_lte
 
Securing the shared network
Securing the shared networkSecuring the shared network
Securing the shared network
 
Top5 protectiondomains infographic_final
Top5 protectiondomains infographic_finalTop5 protectiondomains infographic_final
Top5 protectiondomains infographic_final
 
Secure from go: Stoke Guide to Securing LTE Networks from Day 1
Secure from go:  Stoke Guide to Securing LTE Networks from Day 1Secure from go:  Stoke Guide to Securing LTE Networks from Day 1
Secure from go: Stoke Guide to Securing LTE Networks from Day 1
 
Infonetics white paper: Security at the Speed of VoLTE
Infonetics white paper:  Security at the Speed of VoLTEInfonetics white paper:  Security at the Speed of VoLTE
Infonetics white paper: Security at the Speed of VoLTE
 

Recently uploaded

Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Guide to the Impact of IoT in Connected World

  • 1.       A  Guided  Tour  to  the  Internet  of  Things  in  the  SIM  Connected  World   By  Tom  Howells,  Fraud  &  Technology  Wire     Oct  30,  2015             Everywhere  we  look  we  are  constantly  reminded  that  we  are  living  in  an  increasingly  connected   world.  In  2014  over  1.5  billion  smartphone  and  tablets  shipped  versus  308  million  portable  PCs   and  desktop  PCs.  Ericsson’s  June  2015  Mobility  Report  indicates  that  there  are  over  2.6   billion  smartphone  subscriptions  worldwide,  a  figure  that  will  double  by  2020  as  smartphone   penetration  rises  in  the  developing  world  (smartphone  penetration  has  largely  leveled  out  in   markets  like  the  US,  Europe  and  China).  We  are  getting  to  the  point  where  the  majority  of   computing  power  in  the  world  is  on  smartphones  not  computers.  The  common  denominator   here  is  that  they’re  all  connected,  not  by  an  ethernet  card,  but  by  a  SIM  card.  This  industry  shift   is  only  going  to  accelerate  with  the  myriad  of  devices  connected  through    the  Internet  of  Things   (IoT)   This  “guided  tour”  series  of  posts  will  focus  on  the  Internet  of  Things  as  a  series  of  sensors   connected  to  computer  systems  performing  analytics  and  machine  learning.  The  key  distinction   here  is  sensors  are  automatically  feeding  machine  data  into  analytics  and  machine  learning   engines  as  opposed  to  human  entered  data  via  a  touchscreen  or  mouse.   The  IoT  industry  is  estimated  to  have  an  astonishing  maximum  potential  of  $3.9  to    $11  trillion   dollars.  This  guided  tour  will  look  at:   • The  industries  that  IoT  will  impact  the  most   • The  geographies  that  IoT  will  impact  the  most  
  • 2. • Will  IoT  impact  B2B  or  B2C  the  most   • The  economic  impact   • The  critical  technological  requirements  to  guide  the  impact  to  $11  not  $3.9  trillion  dollars   A  recent  McKinsey  report,  “The  Internet  of  Things:  Mapping  the  Value  Beyond  the  Hype”  found   that:   • Less  than  1%  of  the  data  collected  is  fully  exploited   • Interoperability  between  IoT  systems  is  required  to  capture  40%  of  potential  value   The  guided  tour  of  IoT  will  analyze,  in  a  series  of  posts:   • The  Connected  Human/Self   • The  Connected  Home   • The  Connected  City   • The  Connected  Car   • The  Connected  Retailer   • The  Connected  Office   • The  Connected  Factory   • The  Connected  Worksite   • The  Connected  Utility   • The  Connected  Outside   The  importance  of  this  shift  is  important  not  only  to  these  areas  but  also  to  carriers.  Fierce   Wireless  reported  that  in  Q3  2015,  “nearly  two-­‐thirds  of  AT&T’s  wireless  customer  growth  in  the   quarter  came  from  connected  devices,  including  connected  cars.  While  AT&T  has  emphasized   that  is  where  its  business  is  going  as  it  provides  cellular  connectivity  for  wearables,  cars  and   devices  inside  in  smart  homes,  such  devices  typically  come  with  lower  average  revenue  per  user   than  smartphones.”   In  July,  British  telco  Vodafone,  the  second  largest  telecommunications  company  in  the  world,   released  its  third  annual  M2M  Barometer  report,  which  offers  a  qualitative  and  quantitative   glimpse  into  how  businesses  are  adopting  Machine-­‐to-­‐Machine  (M2M)  technology.   At  a  high  level,  the  report’s  researchers,  analyzing  data  from  16  countries  and  650  business   executives  across  seven  industries,  found  that  businesses  are  increasingly  adopting  and   prioritizing  M2M  (compared  to  the  previous  reports  from  2013  and  2014),  and  that  M2M  is  not   only  driving  new  business  and  operating  models,  but  is  also  significantly  augmenting  and   improving  business  processes  through  a  number  of  means,  including  by  helping  businesses  to   add  actionable  real-­‐time  analytics  to  their  data,  to  expand  their  reach  to  new  countries  and   regions  and  to  connect  with  customers  more  effectively,  among  other  benefits.  In  fact,  83%  of   M2M  adopters  agreed  that  they  had  gained  a  competitive  business  advantage  from  M2M  and   59%  said  they  had  seen  significant  ROI,  mostly  within  the  first  12  months  of  adoption.   This  new  world  is  also  a  new  playground  for  new  attacks.  We  are  in  a  land  of  opportunity  both   for  the  vendor  and  the  cyber  fraudster.  Many  people  will  have  read  about  the  hacked  Jeep  in   wired  magazine.   The  problem  is  the  old  way  of  protecting  computer  systems  behind  a  firewall  and  analyzing   signatures  or  log  files  doesn’t  work  in  the  IoT  world.  There’s  no  firewall  on  your  ioT  device.  Big   data  applications  using  machine  learning  against  a  data  lake  of  IoT  packets  will  go  hand-­‐in-­‐hand   with  the  hardware  sensors  of  IoT.   Stay  tuned  for  future  articles.     Tom  Howells  is  a  contributing  writer  for  Fraud  &  Technology  Wire  (www.fraudtechwire.com),  a   weekly  publication  sponsored  by  Argyle  Data,  Inc.    
  • 3. Sources:   http://www.fiercewireless.com/story/att-­‐leans-­‐prepaid-­‐connected-­‐devices-­‐subscriber-­‐growth-­‐ q3/2015-­‐10-­‐22?utm_medium=nl&utm_source=internal   http://www.forbes.com/sites/niallmccarthy/2015/01/27/connected-­‐cars-­‐by-­‐the-­‐numbers-­‐ infographic/   http://www.wired.com/2015/01/consumers-­‐are-­‐in-­‐the-­‐connected-­‐cars-­‐driver-­‐seat-­‐in-­‐2015/   http://www.autoblog.com/2015/02/06/bmw-­‐hack-­‐cyber-­‐security-­‐warning-­‐feature-­‐video/   http://www.databreachtoday.com/blogs/internet-­‐buggy-­‐things-­‐p-­‐1862   http://www.businessinsider.com/how-­‐the-­‐internet-­‐of-­‐things-­‐market-­‐will-­‐grow-­‐2014-­‐10   http://money.cnn.com/2015/03/18/technology/apple-­‐pay-­‐fraud/   http://www.wired.com/2015/07/hackers-­‐remotely-­‐kill-­‐jeep-­‐highway/