Big Data: Election Analytics and More

During the 2016 election season, we’ve seen considerable media coverage on big data and predictive analytics.  The access to massive quantities of data has played an increasingly important role not only for predicting the election winner, but also for driving candidates’ campaigns. During the 2012 election we saw political data science and big data leveraged by campaign managers to tap into the public opinions of the candidates. The information garnered from those data points led to decisions that shaped campaign strategies. Since 2012, we’ve seen substantial advancements in political data analytics. A recent Forbes article explains this well, “In recent years, political data analytics has advanced from simple micro targeting to true predictive data science, and the track record is good. Some of the brightest minds in the field are using massive amounts of data, complex models and advanced algorithms to determine the best way to appeal to big swathes of the electorate without alienating possible converts.” A GOP strategist recently claimed that analysts have about 400 data points stored for the average American voter and noted that they are constantly querying the database for insight. Predictive Analytics is an increasingly useful and complex practice — and it is not limited to presidential elections. It can be used in almost every industry to drive intelligent and informed business decisions. First, let’s define predictive analytics in relation to this post. This definition from TechTarget highlights the role of statistical analysis and machine learning to arrive at an actionable model: “Predictive analytics is a form of advanced analytics that uses both new and historical data to forecast future activity, behavior and trends. It involves applying statistical analysis techniques, analytical queries and automated machine learning algorithms to data sets to create predictive models that place a numerical value, or score, on the likelihood of particular events happening.” Beyond the Election With the rise of the Internet of Things (IoT) we are currently seeing predictive analytics leveraged for applications across industries to help organizations make better operating decisions. Here are a few application examples recently highlighted in Forbes: Models designed to predict where crimes will be committed Predicting the price of oil Insight into how upcoming events might influence a business Predicting the probability of success for a startup Identifying trends in the academic literature Predictive Analytics and S2S Communications Today, there are technology solutions designed for intelligence-enabled decision making. Sensor-2-Server (S2S) communication solutions in particular, help meet the increasing demand for data. S2S by definition is an intelligent communication that begins at the sensor level and targets servers for specific reasons. With an intelligent communication system to enable predictive analytics, operators can leverage new technology to improve the profitability of their businesses. As an example, let’s look at the one of the predictive analytics use cases listed above– a model for predicting the price of oil.  If an oil and gas company has an intelligent system in place, it can respond in real-time to its oil production levels. The data can help operators determine if production should be increased or decreased in certain areas to maximize profitability. Predictive Analytics Recap Predictive analytics engines allow organizations to analyze more data, faster. Key decision makers gain insight into trends and patterns that may be otherwise overlooked. They can make intelligent predictions that shape business operations and strategy. With the right techniques in place, an organization will make better decisions, cut costs and increase profitability. And for those who are running for public office? They now have more insight into the opinions and trends for voters than ever before. This has changed the game in a lot of ways because campaigns can be tailored to an audience based on specific data.

IoT Emerge Recap

IoT Emerge bounced on the scenes of Chicago this week. Yes, aside from the long awaited World Series win, an IoT conference was happening in this windy, action-packed town. The conference boasted two days of keynotes, technical sessions, workshops, live demonstrations, hands-on training and plenty of opportunities for networking with industry peers. The IoT Emerge mission is to continue to educate and promote cross-industry functions with a focus in Industrial IoT, smart cities and IoT engineering. Below, we’ve highlighted the best moments from the week. IoT Emerge: What have we learned? Back in 2011, research firm Gartner said the Worlds of IT and Operational Technology Are Converging. We believe IT/OT convergence is a critical concept: it promotes a single view of an enterprise’s information and employs process management tools to help ensure that every person, machine, sensor, switch, device, etc. in an organization has accurate information in the best format and at the right time. We learned optimizing the business process is vitally important. Decisions will be made in real time with higher levels of confidence because more information will be available regarding the event or condition. For example, load shed or curtailment events will be based on energy availability (IT sources) and demand throughout the distribution network (OT sources). Event management in an IT/OT converged networkwill execute as a closed loop process by targeting a feeder or substation, issuing curtailment signals to customers under that substation or feeder. This gauges real-time response and repeats as required to achieve the target reduction time. What other insights did we gain from IoT Emerge? Myths about IoT Engineering: The Industrial Internet of Things (IIoT) is not ready to support predictive analytics With commentary from Eddie Garcia @freewavetech | Published on @ElectronicDesgn “When most people think about the IIoT, they think of machine-to-machine communications (mostly supported by RF technology) that have dominated the industrial sector for years. However, the convergence of IT and OT practices have seen intelligence moved closer to the access layer than ever before. New communication platforms have improved to the point where big data transport can come directly from the sensors at the edge (OT) all the way to the servers in the back office (IT). The industrial sector is closer than it’s ever been to supporting the future of data collection, transport, and aggregation, ultimately resulting in the huge data sets necessary to support predictive analytics at the IT/OT level.” IoT Emerge and Up-Close and Personal IoT Experience By @JKerns10 | Published on @MachineDesign “As IoT applications and case studies start piling up, some companies still wonder where the Industrial Internet of Things (IIoT) fits in their production lines. There’s lots of information on the internet about the IIoT, such as how IIoT worked in one application or how much a company could save by using a specific IIoT product. While examples and case studies offer ideas on how IIoT might fit your production line, having a chance to talk to experts directly about your applications and concerns can help ease concerns.” IoT Emerge: Looking ahead to the future By @IoTEmerge | Published on @cote_se IoT Emerge a chance to shed light on the possible digital future. Smart cities and Industrial IoT top the watch list. Along with the conference buzz, conference organizer Penton Publishing also launched the IoT Institute aimed at educating the growing IoT world. Color your IoT World By @IoTEmerge Coloring is not just for the kiddos. IoT Emerge worked with local Chicago artist Rawfa to create a wall sized coloring book. Conference goers got to take a break from the IoT information overload and color to their harts content. Industry thought leaders did an excellent job representing the broad range of emerging IoT applications this year, and as we move steadily toward the close of 2016, it’s clear that we can expect some exciting and innovative technology applications in the not-too-distant future.

Is Sensor-2-Server Technology the Next Big Wave for Oceanic Monitoring?

The National Geographic Society defines oceanography as, “an interdisciplinary science integrating the fields of geology, biology, chemistry, physics, and engineering to explore the ocean.”  A brief history of oceanography, laid out by the National Geographic  Society, begins with the first oceanographic studies completed by the H.M.S. Challenger Expedition from 1872-1876, which was the first voyage that collected data related to the oceanic environment. The more advanced forms of oceanography did not begin until World War II when the U.S. Navy studied the oceans to gain communication advantages across the Atlantic for submarine warfare. In the 1950s and 1960s, submersibles were introduced and ultimately became the technology that revolutionized oceanographic exploration. Modern technology has enabled more in depth exploration of the ocean. It offers tools to observe the environment, study the living beings living within it, and explore the unexplored. With the increasing adoption of the Internet of Things (IoT), it is safe to say that more innovation will continue to drive oceanic research and exploration as we are able to connect more sensors and devices to the equipment that helps us learn more about the vast and expansive oceans. IoT technology allows researchers to take a scientific approach to the examination of the ocean through recorded and analyzed data. Some of the technologies already in use today include, vessels and submersibles, observing systems and sensors, communication technologies, and diving technology. Sensor-2-Server Technology for Oceanic Monitoring As IoT adoption rapidly expands, and in many ways changes the way things work – researchers continue to find new and innovative ways to explore the ocean. Some technology manufacturers are offering Sensor-2-Server solutions (S2S) for monitoring and data collection. S2S is defined as intelligent communication that begins at the sensor level and targets servers for specific reasons. The concept of S2S is about creating intelligent transmission from a specific location back to the appropriate server with the appropriate intelligence to drive action for change. For oceanographic purposes, this type of technology unlocks the opportunity to incorporate more data points than ever before. Some Sensor-2-Server solutions offer platforms to host third-party applications in addition to creating the communication links for devices. This new class of wireless IoT communication solutions is starting to be adapted for oceanographic research today. Below are some real-life applications that leverage modern Sensor-2-Server technology: Communication with an ROV on the ocean over a distance of about two miles Vessel telemetry for units that operate in a variety of changing environments from quayside to middle of ocean Remote access to GPS stations in Alaska over approximately 13 miles to optimize the quality of data transfer for ocean mapping. Connecting remote coastal radar systems measuring ocean surface currents around Coral reefs during an upcoming experiment along the very remote NW Australian Coast. S2S technology will continue to lead to new and exciting ways for researchers to uncover some of the ocean’s mysteries, understand how it works, and learn the behavior of its creatures.

Hacking: A Cybersecurity Top News Edition

Hacking became a scary reality last week as we all witnessed Twitter, Airbnb, Amazon, PayPal, CNN, Spotify and Reddit simultaneously get hit with a massive Denial of Service (DoS) attack. This attack also interrupted hundreds of other sites and internet connected devices from functioning properly.  For months, we’ve been hearing about the need to protect and secure our networks and devices. As the world steps further into the digital landscape, it’s clear that new advancements around cybersecurity tactics and strategies need to be addressed. Many are calling for standardization as a means to collectively thwart attacks and identify problem areas. Due to the proliferation of IoT technology and billions of connected devices, our critical infrastructure projects are those that may deserve the most attention in the short term. Read on for this week’s top cybersecurity news highlights that shine a light on the hacking aftermath and the inherent cybersecurity risks we should all be aware of in the IoT space. Exposed to Hacking Cybersecurity Experts are calling for Internet of Things Standards in Wake of Massive Attack By @ethanbaron | Published on @mercnews “In the assault Friday that blocked access to hundreds of websites, including Twitter, Airbnb, Amazon, PayPal, CNN, Spotify and Reddit, thousands of hijacked “internet of things” devices  bombarded a New Hampshire company called Dyn with traffic.” The Lessons From the East Coast CyberAttack By @josephinecwolff | Published on @Slate “This is an important lesson of online security and often an incredibly difficult one to impress upon users: Even the accounts and computers and machines that you don’t care about being.” Why Businesses Need to Secure Connected Devices to Win Consumer Trust By @jeffjohnroberts | Published on @FortuneMagazine “The issue now is whether the government should do more to regulate the Internet of things (IoT), or if we can instead trust companies and the market to solve the problem.”   This Attack Was Different–Cyber Threat Draws Utility Warnings By @BlakeSobczak | Published on @EENewsUpdates “Department of Homeland Security officials, who say they are investigating the attack on Dyn with the FBI, have warned that some smart-grid devices could be inadvertently swept up into attacks on other websites or key internet infrastructure.” Top Five Biggest Threats to IoT Security By Hannah Williams | Published on @cbronline “Hackers have recently been able to obtain access to a wide variety of connected devices, which has prompted new concerns over the security threats of the Internet of Things.”   Cybersecurity: The Biggest Threat to Automated Trucking By @AaronHuffCCJ | Published on @CCJnow “A single point of failure, or security breach, in a supply chain has far-reaching effects for all parties. Transportation companies must therefore think beyond their own IoT network perimeter, he advises, as the march towards automation continues.” As we conclude another round of top news highlights, we hope to have opened your eyes to modern cybersecurity considerations. As technology continues to evolve, we must continue to learn how to better protect our IoT interests upon exposure to hacking.

Robotics & IoT Merging Together

The Internet of Things (IoT) has made its appearance in a substantial number of industries, most recently manifesting itself in the the realm of robotics. IoT technologies and standards open the door for new robotic capabilities that are powered by cloud computing, communication with other robotic systems and sensor input from the environment around them.  Recent research has pointed to a new opportunity for robotics to operate beyond the scope of what was possible just a few years ago. As we look at a future of data and connectivity at every end point – from our cars, to our homes, to our businesses – it’s clear that we’ve just begun to scrape the surface of what is possible with the rapid expansion of IoT throughout the world. In a recent report, ABI research coined the, “Internet of Robotic Things (IoRT),” defining the concept, “where intelligent devices can monitor events, fuse sensor data from a variety of sources, use local and distributed ‘intelligence’ to determine a best course of action, and then act to control or manipulate objects in the physical world, and in some cases while physically moving through that world.”  The research certainly backs recent claims that robotics are going to leave a significant mark on the IoT industry. Take a look at the key statistics that Forbes recently reported on Robotics: 4% of developers are building robotics apps today. 45% of developers say that Internet of Things (IoT) development is critical to their overall digital strategy. 4% of all developers are building apps in the cloud today. RF Technology in the IoRT World As the entire technology landscape changes it is more important than ever for RF technology to adapt in order to meet new industry demands. Manufacturers in the hardened, wireless communication industry have taken note and set their eyes on all things IoT by developing Sensor-to-Server (S2S) communication solutions. Some of these wireless IoT communication solutions providers are offering platforms to host third-party applications in addition to creating the communication links for devices. This is an entirely new class of wireless IoT communication solutions that has the staying power needed in the midst of technology evolution. Robotic IoT Future Some companies using wireless S2S solutions, have already begun to incorporate IoRT into their networks. Real-life use case examples of robotics for IoT networks that are in the works today include: Semi-autonomous robotic geophysical surveying platforms for detection of unexploded ordnance. With an S2S communication solution, this use case will provide real time kinematic base station GPS corrections and combined geophysical data to a mobile command and control vehicle for concurrent advanced data processing by rear support group linked by MiFi or Satellite communications. A ‘ship-to-shore’ link for an ocean going wave-powered autonomous robot. As robotics systems adapt to the new technology landscape, they will increasingly integrate with IoT networks. With these new advanced robotics capabilities, businesses will see new opportunities for automation and efficiency to further advance operations and will be able to leverage this new technology for competitive advantage.

Industrial IoT Weekly Highlights

It’s time for another edition of Industrial IoT (IIoT) weekly highlights! Robots seem to be taking over this round of updates – by air, land and sea. Don’t fret, we haven’t stepped into a Sci-Fi movie just yet. Aside from machines, we gathered the latest information about fog computing, and why this trending concept is needed in the enterprise. The possibilities for machine innovation spurs thinking that we are just scratching the surface of digital transformation. What will people think of next? Sit back, relax and get ready to enjoy another round of weekly IIoT highlights! Weekly Highlights Breakdown What Is Fog Computing? And Why It Matters In Our Big Data And IoT World By @BernardMarr | Published on @Forbes “Fog computing, also sometimes called edge computing, solves the problem by keeping data closer “to the ground,” so to speak, in local computers and devices, rather than routing everything through a central data center in the cloud.” Farm 2026: The Robots Are Coming By @hiyamckidd | Published on @FGInsight “Lettuce thinning is still done manually at lower cost, but robots are likely to reach break even with human labour within 12 years.”   Digital Technology to Transform Oil, Gas Hiring Practices By @KarenBoman | Published on @Rigzone “When oil and gas companies start hiring again, they will need to prepare for a workforce of college graduates who want to work off a cell phone or tablet.”   Manufacturers Struggle to Woo Software Developers By @AndrewTangel | Published on @WSJ “Nearly every industry is looking to hire software engineers and developers. But the manufacturing sector is having particular trouble attracting potential recruits.”   The 10 Coolest Drones at the Worlds Biggest Robot War Games By @David_Hambling | Published on @PopMech “Unmanned Warrior is the world’s biggest robot war game, currently taking place for two weeks off the coast of Scotland. It was proposed by First Sea Lord Admiral George Zambellas to give airborne, surface, and underwater drones from various suppliers a chance to show off their prowess. Unmanned Warrior is part of Joint Warrior, an exercise involving 30 warships and submarines from 18 nations. But for the newly inaugurated robot portion, the U.S. is a strong presence, with teams from the Office of Naval Research (ONR).”   As we conclude our Industrial IoT weekly highlights, we hope you were entertained and enlightened. Technology continues to change at a fast pace, let’s find common ground with our robotic pals. Tune in next time for more IoT innovation!

Industrial Communications and Security Go Way Back

Industrial communications and security have a long standing history. In 2016, industrial network operators can collect more data from geographically dispersed field assets than ever before. As we head towards fully connected systems through the Industrial Internet of Things (IIoT), communication technology manufacturers continue innovating and creating enhanced solutions that will meet the Big Data demands of today and the future.  Data has become one of the most valuable assets an organization can own.  It can help operators improve operational decisions, save manpower and improve employee safety by keeping them out of dangerous environments. Industrial Communications  Industrial communications networks have more access points than ever before and we will continue to see more IIoT devices in service as connectivity improves in challenging environments. The IP-based technology incorporated into Industrial IoT communiations make it easier to deploy and talk to sensors, but it also makes it easier for intruders to see and snoop on valuable data streams. Anytime we talk about the collection and transfer of large amounts of critical data, security becomes an important part of the conversation.  If you’re a manufacturer, you are probably nodding your head in agreement or maybe even thinking that is an obvious statement.  However, based on the major cyber-attacks that have occurred in industrial networks over the past decade it is clear that a security focus from design to deployment isn’t always the case. Take a look at this infographic, “A History of IIoT Cyber Attacks and the Future of Security,” to see just how many huge scale cyber-attacks have impacted a variety of industries. While the infographic offers insight into major IIoT security breaches we’ve seen in the past decade or so, it does not provide the entire picture of industrial communication technology history and security practices. It does not highlight the fact that industrial operations networks have been using communication devices for decades and many industrial systems have been “online” since well before 2007. In fact, wireless machine-to-machine (M2M) communication solutions have owned the command and control of field assets for decades. Looking Closer at Solutions Top-tier industrial communication solution manufacturers have been leveraging security to prevent cyber-attacks and vulnerabilities on data long before the first major breach identified in the infographic. For years, these manufacturers have used a variety of techniques beyond physically securing the devices, including frequency hopping spread spectrum (FHSS) based devices with security standards like TLS/SSL and basic AES-128 data encryption. Some communication technology providers created solutions that are trusted by the US military for secure mission critical data transmission and have been used for more than 20 years. If one thing is clear in the efforts to protect data over time, it is that a critical infrastructure project is only as reliable and secure as the technology serving it. Security will ultimately be the limiting factor on how much IIoT technology is deployed.  A modern operator striving for an IIoT network must look at SCADA security, the convergence of Operations Technology (OT) and Information Technology (IT), and make a thorough assessment of what will allow them to achieve a secure data communications network and where they want to be in this triangle.  As the industry has evolved, so have the security practices. But what hasn’t changed is that an operator looking to build an IIoT network must carefully select their technology and look for the solutions that are focused on security.

IoT Evolution Podcast Recap: Edge Computing Future

Edge computing has become a topic of hot conversation as the technology capable of supporting sensor-2-server data transport has matured. The realization of true edge computing is accompanied by a host of benefits, including real-time data transmission, maintenance needs and considerable savings for operational expenses. Is edge computing the cut-and-dry future? Ken Briodagh, editorial director with IoT Evolution, plays devil’s advocate on a recent podcast with FreeWave Technologies CMO Scott Allen. He asks, essentially, “If companies focus resources on the real-time data transport at the edge – sending small packages of data at a time in the interest of speed – are we losing the benefits of big data? Do we lose the information that big data sets can provide in terms of predictive analytics and, ultimately, machine learning if we discard bits and pieces of data at the edge that we’ve deemed irrelevant?” Listen to the podcast below for Allen’s response! Overall, edge computing has three main drivers: latency–our need to have the data in milliseconds; loss of communication–able to solve the factory problem without shutting down the entire plant; proximity–sensors in the field monitor the data back to the edge. Edge Computing Solution Depending on the industry, a mixed bag of both programmable and edge computing solutions is an answer to Briodagh’s question. In some cases, especially with the oil and gas industry, companies rely on a sensor-2-server stream of communication, where they need to have the information in real-time, and if there is a problem, be able to act locally and fix the issue before anything drastic happens. The network is a combination of radios communicating with sensors that pass the data to a gateway and up to a cloud system. The network uses only small data sets to transmit a continuous flow of intelligent, sensor-based information, optimizing bandwidth in situations where latency is crucial. Next for the Edge There will come a time when using edge technology will just become a regular line item expense needed to do business in this modern age. Some early adopters have already started using gateway systems as a cookie cutter roll-out for all future expansions. Many worry the cost of entry is still too high to integrate, even though the need for transmission is great. As our digital age grows, infrastructure complexity and the desire to implement the latest technology grow along with it. Altogether, edge computing is still in its infancy stage, so no one really knows what data  we deem irrelevant today will be vital tomorrow.

Securing Assets with Outdoor Wi-Fi

The video surveillance market is anticipated to grow to $42B by 2019. Many industries today are using video monitoring as part of their physical security efforts to protect assets.  As the Internet of Things (IoT) is increasingly adopted by more industries, careful consideration must be made when leveraging Sensor-to-Server (S2S) solutions for video-based security applications.  From a technology perspective, IoT is beneficial for video security because it enables more data collection to drive intelligent business and security decisions that will better protect assets. However, with more sensors and devices connected to an IT network comes increased exposure for cyberattacks. It was inevitable that IoT would cross over into the physical security space, but the idea of security devices connected into an IoT network is concerning to many security professionals. In 2015, HP reported that up to 70 percent of IoT devices are vulnerable to cyberattacks. Any intelligent communication that is leveraged in an IoT environment must be designed with security in mind and have the ability to protect the network against cyber-attacks. Without ample security in the environment, companies risk severe consequences such as compromised data or denial of service. Outdoor Assets Protected Some outdoor shorthaul, Wi-Fi-based S2S networks are now designed to securely monitor and transmit voice, video, data and sensor (VVDS) information for asset monitoring and control. Additionally, any industry looking for an outdoor network robust enough to provide Wi-Fi connectivity may also benefit from these outdoor Wi-Fi solutions. From emergency communications to municipalities, industrial networks to golf courses or campgrounds, and more, there are numerous use cases where Wi-Fi is beneficial for connectivity and also for high-speed shorthaul communications needed to enable VVDS data. In IoT environments there are sensors on every single asset, constantly pulling data, so they need to make sure that security features are part of the technology’s design. For the operator seeking outdoor Wi-Fi to connect physical security devices and enable video monitoring, it is important to be familiar with the technology they are selecting. The Wi-Fi networks best suited for outdoor environments will have a rugged design with proven reliability in extreme environmental conditions. When the right security measures are in place, these solutions can ensure that data is protected through a variety of means including encryption, authentication, virus and intrusion protection, and by being physically tamperproof. Although robust, outdoor Wi-Fi can provide the connectivity needed for VVDS applications, but it needs to be able to withstand and prevent cyber security attacks. When the right technology is selected and enabled, asset protection can be enhanced through video. How are you protecting your assets?

Women in Tech: Hedy Lamarr

It was back in 1941 when Hedy Lamarr, an Austria born actress, together with George Antheil co-patented a “secret communication system” which allowed radio control of torpedoes that could not be easily discovered, deciphered or jammed. Her secret: frequency hopping! Coordinated, rapid changes in radio frequencies would literally “hop” in the radio spectrum, thus evading detection and the potential of interference, in other words, being suppressed or jammed. Even though her idea was ahead of its time and not implemented in the U.S. until 1962, when it was used by U.S. military ships during a blockade of Cuba (after the patent had expired), it is now the basis for modern Frequency Hopping Spread Spectrum (FHSS) wireless communication systems. FHSS wireless systems are very resilient when it comes to impairments such as interference (deliberate or coincidental) and “jamming.” Other effects can be observed when wireless signals travel through space, such as the “multipath” phenomenon, simply because they use only very small amounts of radio spectrum at a time and don’t dwell (or remain) at that frequency long, instead “hop” to another frequency quickly. Statistically, chances are that the signal does not “land” at the interfering frequency, thereby successfully evading the jamming signal. This makes Denial of Service (DoS) attacks on FHSS systems very difficult, albeit not completely impossible. Information Pioneers – Hedy Lamarr Edition As part of BCS, The Chartered Institute for IT video series, Miranda Raison presents Hedy Lamarr for the “Information Pioneers” series and dives deeper into the history behind one of wireless communication’s leading ladies who, together with George Antheil, pioneered the beginning of a communication revolution. Hedy Lamarr would’ve been 101 years old this November.