IN CASE YOU MISSED IT!

IOT News Wednesday, February 14

IOT News TLDR / Table of Contents

  • Your smart TV is probably vulnerable to hackers
    • Millions of the smart TVs have security vulnerabilities that will allow hackers to remotely change the channels, volume level, and more.
    • smart tvs, smart TV, Consumer Reports, smart home appliances, smart TVs Consumer
  • YouTube
    • upload original content, YouTube, , ,
  • Machine Learning in Robotics – 5 Modern Applications
    • In this article we explore 5 distinct examples of machine learning’s influence on the robotics field, including Computer Vision, Imitation Learning, Mult…
    • machine learning, robotics, imitation learning, Machine Learning Applications, Machine Learning Lab
  • What is the Industrial IoT? And why the stakes are so high
    • The Industrial Internet of Things, or IIoT, connects machines and devices in industries such as transportation, power generation, and healthcare. The potential is high and so are the risks.
    • IoT, industrial iot, industrial internet, Industrial IoT Consortium, iiot
  • IIC: Industrial IoT Reference Architecture
    • IIC: Industrial IoT Reference Architecture | Connecting the SMARTS!
    • industrial internet, control systems, industrial control systems, New Industrial IoT, Industrial IoT Reference
  • How do mobile apps impact security in the Industrial IoT? | IDG Connect
    • New research from IOActive looks at the rise in vulnerabilities of mobile apps which connect to SCADA systems – we catch up with Jason Larsen to learn more
    • Industrial Control Systems, SCADA app universe, Roughly what percentage, Industrial IoT, average increase
  • 5 Exciting Machine Learning Use Cases in Business
    • 5 Exciting Machine Learning Use Cases in Business: The combination of big data and machine learning can unlock the value of data you already have.
    • ML, ML models, data, ML powers aspects, ML systems
  • Heres a bit of warning for you if you own a smart TV or plan to buy one: Millions of the devices have security vulnerabilities that will allow hackers to remotely change the channels, volume level, and more.
  • Why smart TVs are vulnerable – Among the several popular smart TVs Consumer Reports examined, televisions made by Samsung and TCL and devices that use the Roku smart TV platform were found to have security flaws.
  • Smart TVs are no different than any other generic [Internet of Things (IoT)] devices running on well-known software containing its own weakness and vulnerabilities, says Kestas Malakauskas, SVP of cybersecurity at CUJO AI, a company that provides security and network solutions.
  • Malakauskas notes, however, that while smart TVs might not look like a very interesting target for hackers, they can always work as gateways for hackers to get a foothold within your homes network and move laterally to steal information from other devices.
  • The privacy risks of smart TVs – All the smart TVs that Consumer Reports reviewed required users to forfeit their viewing data to use the devices connected features.

Tags: smart tvs, smart TV, Consumer Reports, smart home appliances, smart TVs Consumer

  • Rating is available when the video has been rented.
  • This feature is not available right now.

Tags: upload original content, YouTube, , ,

  • Before I delve into machine learning in robotics, go ahead anddefine robot.
  • An influx of big data i.e. visual information available on the web (including annotated/labeled photos and videos) has propelled advances in computer vision, which in turn has helped further machine-learning based structured prediction learning techniques at universities like Carnegie Mellon and elsewhere, leading to robot vision applications likeidentification and sorting…
  • Its beenincorporated into robots and optical devices that candetect and reject objects (dust and snow, for example);identify vegetables and obstacles in rough terrain; and in 3D-scene analysis and modeling vehicle dynamics – – Watch-Bot is a concrete example, created by researchers from Cornell and Stanford, that uses a 3D sensor…
  • Other examples of self-supervised learning methods applied in robotics include a road detection algorithm in a front-view monocular camera with a road probabilistic distribution model (RPDM) and fuzzy support vector machines (FSVMs), designed at MIT for autonomous vehicles and other mobile on-road robots.
  • A collaboration through theCal-MR: Center for Automation and Learning for Medical Robotics,between researchers at multiple universities and a network of physicians(collaborations with researchers at multiple universities and physicians led to the creation of theSmart Tissue Autonomous Robot (STAR), pilotedthrough the Childrens National Health System in DC.

Tags: machine learning, robotics, imitation learning, Machine Learning Applications, Machine Learning Lab

  • One IIoT system could be as simple as a connected rat trap that texts home to say that its been activated, while another might be as complicated as a fully automated mass production line that tracks maintenance, productivity and even ordering and shipping information across a huge, multi-layered network.
  • Whatever you call it, the IIoT is different from other IoT applications in that it focuses on connecting machines and devices in industries such as oil and gas, power utilities and healthcare.
  • Technologically, IIoT works on similar principals to any other piece of IoT tech automated instrumentation and reporting being applied to stuff that didnt have those capabilities before.
  • The Industrial IoT Consortium lists these 15 possible uses of IIoT: – – Yes, because IIoT devices can have much longer service lives than consumer gadgetry Canonical executive vice president of IoT and devices Mike Bell estimates the average at seven to 10 years so any implementation has to be…
  • Beyond the possible use of compromised IIoT devices to create massive botnets, theres also the issue that vulnerabilities can be exploited to allow theft of valuable data already on your network yet another attack vector.

Tags: IoT, industrial iot, industrial internet, Industrial IoT Consortium, iiot

  • The Industrial Internet Consortium published in 2017 a new revision to theirIndustrial IoT Reference Architecture document(the IIRA).
  • The IIRA is at home in the midst of the battle between OT and IT – – Two already warring camps those that manage sprawling enterprise-level IT architectures and services, and those that run real-world-connected industrial control systems, have long ago marked out their territories.
  • Section 6 of the IIRA document sums up the future of IIoT in a way that promises a better world for industrial control engineers: – – Riding on continued advancement of computation and communication technologies, the industrial internet can dramatically transform industrial control systems in two major themes: – -…
  • As the IIRA progresses, the Viewpoints are tied into systems and classified into five functional domains: – – Note the importance of the control domain in the below borrowed figure 6-5 Control is highly valued, and made to respond to not only physical sensing, but also operational and application data…
  • As the 58 page document progresses, it defines systems and architectures into tiers, domains, networks and data flow.

Tags: industrial internet, control systems, industrial control systems, New Industrial IoT, Industrial IoT Reference

  • In 2015 security firm, IOActive, analyzed 20 mobile applications that connected to Industrial Control Systems (ICS).
  • Last year, it reprised the research and discovered 147 issues in the 34 applications selected for analysis.
  • This represents an average increase of 1.6 vulnerabilities per application.
  • The full report SCADA and Mobile Security in the Internet of Things Era can be downloaded here.
  • Roughly what percentage of the SCADA app universe does the 34 randomly tested apps represent?

Tags: Industrial Control Systems, SCADA app universe, Roughly what percentage, Industrial IoT, average increase

  • It provides training algorithms and neural network models, two important components of a deep learning system, that developers can use to develop their own ML systems.
  • Googles ML engine is part of its cloud platform and is offered as a managed service for developers to build ML models that work on any type of data, of any size.
  • Caterpillar, a company that manufactures marine power systems, uses IoT and machine learning to uncover patterns in equipment and device data.
  • By gathering and feeding data on existing planning into an ML model, businesses can predict and recommend future processes.
  • Take a look at your unstructured and structured data, which ML models can consume to transform many of your basic processes into intelligent systems for innovation and a competitive edge.

Tags: ML, ML models, data, ML powers aspects, ML systems

Top IOT Courses

Internet of Things (IoT) Automation using Raspberry Pi 2 (1,358 students enrolled)

By Venkatesh Varadachari
  • Read the raw temperature of the multiple sensors using Linux command.
  • Program the sensors to display the updated temperature after a delay of every 10 seconds.
  • Receive an automated email alert when the temperature crosses a certain limit.
  • Connect the sensors to an open source cloud and access the temperature in a web dashboard from anywhere.
  • Retrieve the complete month statistics by visiting the web portal.

Learn more.


Start the Internet of Things (IoT) from scratch (96 students enrolled)

By Dr. Kobkiat Saraubon
  • Build your own IoT projects using NodeMCU based on Arduino platform
  • Write programs to control your hardware
  • Connect your IoTs to cloud services to store/process/share some data

Learn more.


Comments are closed, but trackbacks and pingbacks are open.