SlideShare a Scribd company logo
Artificially Intelligent
or why we always knew we’d be
talking about all this at some point.
Alexandra Deschamps-Sonsino
@iotwatch
alex@designswarm.com
Industrial & interaction designer
First UK distributor of the Arduino
Clients
Founder Good Night Lamp
London Internet of things Meetup
‘Evolution is apparently intent that man fulfill a much
greater destiny than that of being a simple muscle
and reflex machine – a slave automaton- automation
displaces automatons.’
‘Behaviour of whole systems unpredicted by the separately
observed behaviours of any of the system’s separate parts
or any subassembly of the system’s parts.’
Buckminster Fuller
‘We’re prepared for the apocalypse we want.’
- Unknown
We’re prepared for a mathematically coherent future.
open #iotmark iotmark.org
trust/risk
lifecycle
openness
permissions & ownership
security
minimum cryptographic security on its backend and
secure configuration
backend which implements additional security options
implement reliable and appropriate backend patching
procedures which should be evidenced
enforce a strong user identity policy
clear admin user rights management
33 principles iotmark.org
8 categories iotmark.org
open process github.com/openiotmark
open tools
open tools
frameworks in time and space
Adafruit IoT Bill of Rights
Adam Greenfield's Everyware Principles
Arduino IoT Manifesto
A trustmark for IoT
Better Things
BSI Kitemark
CE, FCC, UL mark
Charter of Trust
CrowdSupply Proclamation of User Rights
Cyber Independent Testing Lab
Doteveryone trustworthy tech mark
ENISA Baseline Security Recommendations for IoT
Global Ecolabelling Network
Greenpeace Guide to greener Electronics
I am the Cavalry Five Star Automotive Cyber Safety Program
IEEE Standard for Harmonization of Internet of Things (IoT) Devices and Systems
IEEE Standard for Privacy and Security Architecture for Consumer Wireless Devices
iFixit Repairability score
Ind.ie Ethical Design Manifesto
IoT and public interest
IoT CyberSecurity Improvement Act of 2017
IoT Design Manifesto
IoT Facts
IoT Security Foundation Best Practice User Mark
Application Note: Mapping the IoT Security Foundation’s Compliance Framework to the DCMS proposed Code of Practice for Security in Consumer IoT
IoT Security Foundation Principles
Jen Persson Making of an IoT Trust Mark
Project Sopris Seven Properties of Highly Secure Devices
Respects your freedom hardware product certification
Secure by Design: Improving the cyber security of consumer Internet of Things Report
Securing consumer trust in the IoT, Principles and Recommendations 2017
Security Checklist for IoT
Seven Properties of Higly Secure Devices
"The Internet of Things and challenges
for consumer protection"
Doteveryone Ethical Tech Directory
What does any artifact enlarge or enhance?
What does it erode or obsolesce?
What does it retrieve that has been earlier obsolesced?
What does it reverse or flip into when pushed to the
limits of its potential?
marshall mcluhan
What is the problem to which the technology is the
solution?
Whose problem is it?
Which problem and what institutions might be more
seriously harmed by a technological solution?
What new problems might be created because we have
solved this problem?
What sort of people and institutions might acquire special
economic and political power because of technological
change?
What changes in language are being enforced by new
technologies and what is being gained and lost by such
changes?
neil postman
Jozeph Weisenbaum
Artificially Intelligent
or why we always knew we’d be
talking about all this at some point.
@iotwatch
alex@designswarm.com

More Related Content

What's hot

SmartSecuritySolution_for_IoT
SmartSecuritySolution_for_IoTSmartSecuritySolution_for_IoT
SmartSecuritySolution_for_IoTShiven Chawla
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
Vishnupriya T H
 
Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)
Inria
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
sreelekha appakondappagari
 
Intel’s Strategy in IoT Standards
Intel’s Strategy in IoT StandardsIntel’s Strategy in IoT Standards
Intel’s Strategy in IoT Standards
NFC Forum
 
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1EnergySec
 
Nazmul haq abir
Nazmul haq abirNazmul haq abir
Nazmul haq abir
NazmulHaqAbir
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
Ravindra Dastikop
 
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
Alexander Hirner
 
IoT Security
IoT SecurityIoT Security
IoT Security
Peter Waher
 
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
David Glover
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoT
IoT613
 
Iot
IotIot
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
VodqaBLR
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
ChromeInfo Technologies
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
ClicTest
 
Living life on the edge - Thingmonk 2016
Living life on the edge - Thingmonk 2016 Living life on the edge - Thingmonk 2016
Living life on the edge - Thingmonk 2016
martinjgale
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
Muhammad Ahad
 
Iot
IotIot

What's hot (20)

SmartSecuritySolution_for_IoT
SmartSecuritySolution_for_IoTSmartSecuritySolution_for_IoT
SmartSecuritySolution_for_IoT
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Intel’s Strategy in IoT Standards
Intel’s Strategy in IoT StandardsIntel’s Strategy in IoT Standards
Intel’s Strategy in IoT Standards
 
Bankinfonews
BankinfonewsBankinfonews
Bankinfonews
 
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1
 
Nazmul haq abir
Nazmul haq abirNazmul haq abir
Nazmul haq abir
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoT
 
Iot
IotIot
Iot
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
Living life on the edge - Thingmonk 2016
Living life on the edge - Thingmonk 2016 Living life on the edge - Thingmonk 2016
Living life on the edge - Thingmonk 2016
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
 
Iot
IotIot
Iot
 

Similar to Artificially intelligent

All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
John D. Johnson
 
1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdf1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdf
drputtanr
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
Bob Marcus
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Mark Underwood
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
Usman Anjum
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Product of Things
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliverMadison Oliver
 
azeem final iot report.docx
azeem final iot report.docxazeem final iot report.docx
azeem final iot report.docx
QadeerAhmadShaikh
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
vishal dineshkumar soni
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
ForgeRock
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
LabSharegroup
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptx
ugushe
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
Daksh Raj Chopra
 
IOT presentation
IOT presentationIOT presentation
IOT presentation
Al Asmaull husna Asha
 
On Internet of Everything and Personalization. Talk in INTEROP 2014
On Internet of Everything and Personalization. Talk in INTEROP 2014On Internet of Everything and Personalization. Talk in INTEROP 2014
On Internet of Everything and Personalization. Talk in INTEROP 2014Opher Etzion
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
LabSharegroup
 
Creating an Internet of Everything
Creating an Internet of Everything Creating an Internet of Everything
Creating an Internet of Everything
AllSeen Alliance
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoT
Semyon Teplisky
 
The Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxThe Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docx
jmindy
 

Similar to Artificially intelligent (20)

All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdf1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdf
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
 
azeem final iot report.docx
azeem final iot report.docxazeem final iot report.docx
azeem final iot report.docx
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptx
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
 
IOT presentation
IOT presentationIOT presentation
IOT presentation
 
On Internet of Everything and Personalization. Talk in INTEROP 2014
On Internet of Everything and Personalization. Talk in INTEROP 2014On Internet of Everything and Personalization. Talk in INTEROP 2014
On Internet of Everything and Personalization. Talk in INTEROP 2014
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Creating an Internet of Everything
Creating an Internet of Everything Creating an Internet of Everything
Creating an Internet of Everything
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoT
 
The Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxThe Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docx
 

More from Alexandra Deschamps-Sonsino

Good for What?
Good for What?Good for What?
Portfolio 2023
Portfolio 2023Portfolio 2023
Sustainable Sustainability
Sustainable SustainabilitySustainable Sustainability
Sustainable Sustainability
Alexandra Deschamps-Sonsino
 
Systemic Mindsets
Systemic MindsetsSystemic Mindsets
Systemic Mindsets
Alexandra Deschamps-Sonsino
 
Ways of Learning
Ways of LearningWays of Learning
Ways of Learning
Alexandra Deschamps-Sonsino
 
Smarter Homes
Smarter HomesSmarter Homes
Regenerative Bursts Keynote
Regenerative Bursts KeynoteRegenerative Bursts Keynote
Regenerative Bursts Keynote
Alexandra Deschamps-Sonsino
 
All together now
All together nowAll together now
All together now
Alexandra Deschamps-Sonsino
 
Repairable by design? (January 2022 meeting notes)
Repairable by design? (January 2022 meeting notes)Repairable by design? (January 2022 meeting notes)
Repairable by design? (January 2022 meeting notes)
Alexandra Deschamps-Sonsino
 
Design for repairability / Green shoots
Design for repairability / Green shootsDesign for repairability / Green shoots
Design for repairability / Green shoots
Alexandra Deschamps-Sonsino
 
Repairable by design
Repairable by designRepairable by design
Repairable by design
Alexandra Deschamps-Sonsino
 
Ideas to reframe your corporate innovation activities
Ideas  to reframe  your corporate  innovation activitiesIdeas  to reframe  your corporate  innovation activities
Ideas to reframe your corporate innovation activities
Alexandra Deschamps-Sonsino
 
Good for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good designGood for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good design
Alexandra Deschamps-Sonsino
 
Good for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good designGood for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good design
Alexandra Deschamps-Sonsino
 
Connected Product Experiences
Connected Product ExperiencesConnected Product Experiences
Connected Product Experiences
Alexandra Deschamps-Sonsino
 
IoT & Public Space
IoT & Public SpaceIoT & Public Space
IoT & Public Space
Alexandra Deschamps-Sonsino
 
Invisible colleges: wealth, friends and fame in art and design.
Invisible colleges: wealth, friends and fame in art and design. Invisible colleges: wealth, friends and fame in art and design.
Invisible colleges: wealth, friends and fame in art and design.
Alexandra Deschamps-Sonsino
 
Creating a Culture of Innovation
Creating a Culture of InnovationCreating a Culture of Innovation
Creating a Culture of Innovation
Alexandra Deschamps-Sonsino
 
Don't press snooze: design in a crisis.
Don't press snooze: design in a crisis.Don't press snooze: design in a crisis.
Don't press snooze: design in a crisis.
Alexandra Deschamps-Sonsino
 
Death by a thousand cuts: information fatigue in the smart cities of tomorrow.
Death by a thousand cuts: information fatigue in the smart cities of tomorrow. Death by a thousand cuts: information fatigue in the smart cities of tomorrow.
Death by a thousand cuts: information fatigue in the smart cities of tomorrow.
Alexandra Deschamps-Sonsino
 

More from Alexandra Deschamps-Sonsino (20)

Good for What?
Good for What?Good for What?
Good for What?
 
Portfolio 2023
Portfolio 2023Portfolio 2023
Portfolio 2023
 
Sustainable Sustainability
Sustainable SustainabilitySustainable Sustainability
Sustainable Sustainability
 
Systemic Mindsets
Systemic MindsetsSystemic Mindsets
Systemic Mindsets
 
Ways of Learning
Ways of LearningWays of Learning
Ways of Learning
 
Smarter Homes
Smarter HomesSmarter Homes
Smarter Homes
 
Regenerative Bursts Keynote
Regenerative Bursts KeynoteRegenerative Bursts Keynote
Regenerative Bursts Keynote
 
All together now
All together nowAll together now
All together now
 
Repairable by design? (January 2022 meeting notes)
Repairable by design? (January 2022 meeting notes)Repairable by design? (January 2022 meeting notes)
Repairable by design? (January 2022 meeting notes)
 
Design for repairability / Green shoots
Design for repairability / Green shootsDesign for repairability / Green shoots
Design for repairability / Green shoots
 
Repairable by design
Repairable by designRepairable by design
Repairable by design
 
Ideas to reframe your corporate innovation activities
Ideas  to reframe  your corporate  innovation activitiesIdeas  to reframe  your corporate  innovation activities
Ideas to reframe your corporate innovation activities
 
Good for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good designGood for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good design
 
Good for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good designGood for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good design
 
Connected Product Experiences
Connected Product ExperiencesConnected Product Experiences
Connected Product Experiences
 
IoT & Public Space
IoT & Public SpaceIoT & Public Space
IoT & Public Space
 
Invisible colleges: wealth, friends and fame in art and design.
Invisible colleges: wealth, friends and fame in art and design. Invisible colleges: wealth, friends and fame in art and design.
Invisible colleges: wealth, friends and fame in art and design.
 
Creating a Culture of Innovation
Creating a Culture of InnovationCreating a Culture of Innovation
Creating a Culture of Innovation
 
Don't press snooze: design in a crisis.
Don't press snooze: design in a crisis.Don't press snooze: design in a crisis.
Don't press snooze: design in a crisis.
 
Death by a thousand cuts: information fatigue in the smart cities of tomorrow.
Death by a thousand cuts: information fatigue in the smart cities of tomorrow. Death by a thousand cuts: information fatigue in the smart cities of tomorrow.
Death by a thousand cuts: information fatigue in the smart cities of tomorrow.
 

Recently uploaded

Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...
Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...
Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...
Mansi Shah
 
Design-Thinking-eBook for Public Service Delivery
Design-Thinking-eBook for Public Service DeliveryDesign-Thinking-eBook for Public Service Delivery
Design-Thinking-eBook for Public Service Delivery
farhanaslam79
 
一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理
一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理
一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理
smpc3nvg
 
Can AI do good? at 'offtheCanvas' India HCI prelude
Can AI do good? at 'offtheCanvas' India HCI preludeCan AI do good? at 'offtheCanvas' India HCI prelude
Can AI do good? at 'offtheCanvas' India HCI prelude
Alan Dix
 
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With DesignsGame Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
184804
 
一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理
一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理
一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理
h7j5io0
 
Design Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinkingDesign Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinking
cy0krjxt
 
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
7sd8fier
 
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
9a93xvy
 
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
9a93xvy
 
Book Formatting: Quality Control Checks for Designers
Book Formatting: Quality Control Checks for DesignersBook Formatting: Quality Control Checks for Designers
Book Formatting: Quality Control Checks for Designers
Confidence Ago
 
Design Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinkingDesign Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinking
cy0krjxt
 
原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样
原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样
原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样
gpffo76j
 
Research 20 slides Amelia gavryliuks.pdf
Research 20 slides Amelia gavryliuks.pdfResearch 20 slides Amelia gavryliuks.pdf
Research 20 slides Amelia gavryliuks.pdf
ameli25062005
 
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
Febless Hernane
 
一比一原版(BU毕业证)波士顿大学毕业证如何办理
一比一原版(BU毕业证)波士顿大学毕业证如何办理一比一原版(BU毕业证)波士顿大学毕业证如何办理
一比一原版(BU毕业证)波士顿大学毕业证如何办理
peuce
 
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
kecekev
 
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptxUNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
GOWSIKRAJA PALANISAMY
 
Storytelling For The Web: Integrate Storytelling in your Design Process
Storytelling For The Web: Integrate Storytelling in your Design ProcessStorytelling For The Web: Integrate Storytelling in your Design Process
Storytelling For The Web: Integrate Storytelling in your Design Process
Chiara Aliotta
 
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdf
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdfPORTFOLIO FABIANA VILLANI ARCHITECTURE.pdf
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdf
fabianavillanib
 

Recently uploaded (20)

Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...
Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...
Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...
 
Design-Thinking-eBook for Public Service Delivery
Design-Thinking-eBook for Public Service DeliveryDesign-Thinking-eBook for Public Service Delivery
Design-Thinking-eBook for Public Service Delivery
 
一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理
一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理
一比一原版(Bristol毕业证书)布里斯托大学毕业证成绩单如何办理
 
Can AI do good? at 'offtheCanvas' India HCI prelude
Can AI do good? at 'offtheCanvas' India HCI preludeCan AI do good? at 'offtheCanvas' India HCI prelude
Can AI do good? at 'offtheCanvas' India HCI prelude
 
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With DesignsGame Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
 
一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理
一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理
一比一原版(BU毕业证书)伯恩茅斯大学毕业证成绩单如何办理
 
Design Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinkingDesign Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinking
 
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
一比一原版(UNUK毕业证书)诺丁汉大学毕业证如何办理
 
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
 
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
 
Book Formatting: Quality Control Checks for Designers
Book Formatting: Quality Control Checks for DesignersBook Formatting: Quality Control Checks for Designers
Book Formatting: Quality Control Checks for Designers
 
Design Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinkingDesign Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinking
 
原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样
原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样
原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样
 
Research 20 slides Amelia gavryliuks.pdf
Research 20 slides Amelia gavryliuks.pdfResearch 20 slides Amelia gavryliuks.pdf
Research 20 slides Amelia gavryliuks.pdf
 
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
 
一比一原版(BU毕业证)波士顿大学毕业证如何办理
一比一原版(BU毕业证)波士顿大学毕业证如何办理一比一原版(BU毕业证)波士顿大学毕业证如何办理
一比一原版(BU毕业证)波士顿大学毕业证如何办理
 
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
 
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptxUNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
 
Storytelling For The Web: Integrate Storytelling in your Design Process
Storytelling For The Web: Integrate Storytelling in your Design ProcessStorytelling For The Web: Integrate Storytelling in your Design Process
Storytelling For The Web: Integrate Storytelling in your Design Process
 
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdf
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdfPORTFOLIO FABIANA VILLANI ARCHITECTURE.pdf
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdf
 

Artificially intelligent

  • 1. Artificially Intelligent or why we always knew we’d be talking about all this at some point.
  • 3. Industrial & interaction designer First UK distributor of the Arduino
  • 6. London Internet of things Meetup
  • 7. ‘Evolution is apparently intent that man fulfill a much greater destiny than that of being a simple muscle and reflex machine – a slave automaton- automation displaces automatons.’
  • 8. ‘Behaviour of whole systems unpredicted by the separately observed behaviours of any of the system’s separate parts or any subassembly of the system’s parts.’
  • 10. ‘We’re prepared for the apocalypse we want.’ - Unknown
  • 11.
  • 12. We’re prepared for a mathematically coherent future.
  • 13.
  • 16.
  • 17.
  • 18.
  • 20.
  • 21.
  • 23.
  • 24.
  • 25.
  • 27.
  • 28.
  • 30. minimum cryptographic security on its backend and secure configuration backend which implements additional security options implement reliable and appropriate backend patching procedures which should be evidenced enforce a strong user identity policy clear admin user rights management
  • 36. frameworks in time and space
  • 37. Adafruit IoT Bill of Rights Adam Greenfield's Everyware Principles Arduino IoT Manifesto A trustmark for IoT Better Things BSI Kitemark CE, FCC, UL mark Charter of Trust CrowdSupply Proclamation of User Rights Cyber Independent Testing Lab Doteveryone trustworthy tech mark ENISA Baseline Security Recommendations for IoT Global Ecolabelling Network Greenpeace Guide to greener Electronics I am the Cavalry Five Star Automotive Cyber Safety Program IEEE Standard for Harmonization of Internet of Things (IoT) Devices and Systems IEEE Standard for Privacy and Security Architecture for Consumer Wireless Devices iFixit Repairability score Ind.ie Ethical Design Manifesto IoT and public interest IoT CyberSecurity Improvement Act of 2017 IoT Design Manifesto IoT Facts IoT Security Foundation Best Practice User Mark Application Note: Mapping the IoT Security Foundation’s Compliance Framework to the DCMS proposed Code of Practice for Security in Consumer IoT IoT Security Foundation Principles Jen Persson Making of an IoT Trust Mark Project Sopris Seven Properties of Highly Secure Devices Respects your freedom hardware product certification Secure by Design: Improving the cyber security of consumer Internet of Things Report Securing consumer trust in the IoT, Principles and Recommendations 2017 Security Checklist for IoT Seven Properties of Higly Secure Devices "The Internet of Things and challenges for consumer protection" Doteveryone Ethical Tech Directory
  • 38.
  • 39. What does any artifact enlarge or enhance? What does it erode or obsolesce? What does it retrieve that has been earlier obsolesced? What does it reverse or flip into when pushed to the limits of its potential?
  • 41. What is the problem to which the technology is the solution? Whose problem is it? Which problem and what institutions might be more seriously harmed by a technological solution? What new problems might be created because we have solved this problem? What sort of people and institutions might acquire special economic and political power because of technological change? What changes in language are being enforced by new technologies and what is being gained and lost by such changes?
  • 43.
  • 45. Artificially Intelligent or why we always knew we’d be talking about all this at some point. @iotwatch alex@designswarm.com