unit 5

Download as pdf or txt
Download as pdf or txt
You are on page 1of 49

INTERNET OF THINGS

TYBSC IT- SEM V


UNIT V
CHAPTER 10:
MOVING TO
MANUFACTURE
• WHAT ARE YOU PRODUCING? • MASS-PRODUCING THE CASE AND OTHER
FIXTURES
• DESIGNING KITS
• DESIGNING PRINTED CIRCUIT • CERTIFICATION
BOARDS • COSTS
• SOFTWARE CHOICES • SCALE UP SOFTWARE
• THE DESIGN PROCESS
• DEPLOYMENT
• MANUFACTURING PRINTED CIRCUIT
BOARDS • CORRECTNESS AND
MAINTAINABILITY
• ETCHING BOARDS
• SECURITY
• MILLING BOARDS
DIFFERENT POSSIBILITIES THAT WE
SHOULD CONSIDER BEFORE
PRODUCING A PRODUCT
• Depending on your motives and desires for the product, and the amount of time
and money that you have available to devote to it, a full spectrum of possibilities is
open to you.

• If your ambition is just to enable others to build a version of it for themselves, you
only need to document the build process and share it, along with any source code
and design files you used, on the Internet—either on your own blog or website, or
on a site like Instructables.
• When you decide that you want to get your invention into the hands of many
more people way), you can generally split your choices into three categories:
1. A kit that your customers can assemble themselves
2. A ready-made electronics board which users can use as a sub-assembly in their own
projects
DESIGNING
KITS
• Many of those people would jump at the chance to buy a kit in which someone else has done the hard
(to them) part of selecting and sourcing the right components and putting them together with a step-by-
step guide.

• Most kits tend to provide only the electronics and software for a particular application rather than any
physical housing.

• Kits tend to piggyback on existing microcontrollers and often take the form of a standard format plug-
on board.

• You’ve worked out which components you need, where to source them, and how to wire them up to
create a functioning circuit.

• The parts you might not have done include designing a PCB, documenting the build process, and
working out the costs.
DESIGNING PRINTED CIRCUIT
BOARDS
• Soldering things up is a good step towards making your prototype more robust.
• After you’ve done this, you should have something that will survive being given to an
end user.
• You will soon get fed up with soldering each item by hand.
• Moving beyond stripboard, designing and etching your own custom PCBs gives you
more options on how to lay out the circuit and makes it easier to solder up as the
only holes in the board will be those for components.
• Homemade boards will still lack that fully professional finish.
• That’s because they won’t have the green solder mask or silkscreen layers that
a PCB manufacturer will give you.
• Moving to professionally manufactured boards further simplifies the assembly
SOFTWARE
CHOICES
• If you are working with a contract electronics design house, the staff may well use something like Altium Designer.

• But you’re more likely to use one of the following lower-end (and cheaper) options.
• Fritzing (http://fritzing.org) is a free, open source design package aimed particularly at beginners in PCB design.
• It deliberately starts with a design screen resembling a breadboard and lets you map out your circuit by copying
whatever you have prototyped in real life.
• It then converts that design to a schematic circuit diagram and lets you arrange components and route the traces on
the PCB view.

• When you are happy with your design, you can export it for manufacture as a PCB.
• Fritzing even offers a fabrication service to make it simple to make your design a reality.
• KiCad (www.kicad-pcb.org) is another open source offering but with a more traditional workflow.
• It has a more comprehensive library of predefined parts and can be used to design boards with up to 16 layers of
copper, compared to the double-sided boards that Fritzing produces.

• In addition to letting you see what the finished board will look like, it also enables you to export the 3D model. Doing
WHAT MAKES UP A
PCB?
• The PCB is made up of a number of layers of fibreglass and copper, sandwiched together into the board.

• The fibreglass provides the main basis for the board but also acts as an insulator between the different layers of
copper, and the copper forms the “wires” to connect the components in the circuit together.

• Given that you won’t want to connect all the components to each other at the same time, which would happen if you
had a solid plate of copper across the whole board, sections of the copper are etched away—usually chemically,

• But it is possible to use a CNC mill for simple boards.


• These remaining copper routes are called tracks or traces and make the required connections between the
components.

• The points on the tracks where they join the leg of a component are known as pads.
• Single-sided boards have only one layer of copper, usually on the bottom of the board; because they’re often for
home-made circuits with through-hole components, the components go on the top with their legs poking through the
board and soldered on the underside.
DESIGN PROCESS OF PRINTED
CIRCUIT BOARDS
• STEP 1: Take a printout of circuit board layout
• STEP 2: Cut the Copper Plate for the Circuit Board
• STEP 3: Transfer the PCB Print onto the Copper Plate
• STEP 4: Iron the Circuit from the Paper onto the PCB Plate
• STEP 5: Etch the Plate
• STEP 6: Cleaning, Disposal, and the Final Touches for the Circuit
Board
MANUFACTURING PCB: ETCHING
BOARDS
• The most common PCB-making technique for home use is to etch the board.
• Some readily available kits provide all you need.
• The first step is to get the PCB design onto the board to be etched.
• This process generally involves printing out the design from your PCB design software onto a
stencil.

• If you’re using photo-resist board, it will be onto a stencil which masks off the relevant areas when
you expose it to UV light.

• Your stencil then needs to be transferred to the board.


• For photo-resist board, you will expose it under a bright lamp for a few minutes.
• With the board suitably prepared, you can immerse it into the etching solution, where its acidic
make-up eats away the exposed copper, leaving the tracks behind.
MANUFACTURING PCB: ETCHING
BOARDS
MANUFACTURING PCB: MILLING
BOARDS
• In addition to using a CNC mill to drill the holes in your PCB, you can also use it to route out the
copper from around the tracks themselves.

• To do this, you need to export the copper layers from your PCB software as Gerber files.
• These were first defined by Gerber Systems Corp., hence the name, and are now the industry
standard format used to describe PCBs in manufacture.

• To translate your Gerber file into the G-code that your mill needs requires another piece of
software.
• Some CNC mills come with that software already provided, or you can use a thirdparty program
such as Line Grinder.

• The mill effectively cuts a path round the perimeter of each track to isolate it from the rest of the
THIRD-PARTY
MANUFACTURING
• If your design has more than two layers, if you want a more professional finish, or
if you just don’t want to go to the trouble of making the PCBs yourself, many
companies can manufacture the boards for you.

• The price for getting the boards made varies based on the complexity and the
size of the design but also varies quite a bit from company to company.

• If you need the boards quickly, a local firm is best.


• If you have more time you can give it outside country such as china, it might reduce
cost.

• Either way, the Gerber files are what you need to provide to the manufacturer.
• Make sure you export all the relevant layers from your design, meaning each of the
PCB
ASSEMBLY
• After your PCBs have been manufactured, you still need to get the components soldered onto them.
• If you’re selling them as kits, the customers will solder things up, so you just need to pack everything into bags and let them
get on with it.

• Otherwise, you have to take responsibility for making that happen.


• For small runs, you can solder them by hand.
• For through-hole boards, break out your soldering iron.
• For assembling surface-mount boards, you need one more item from your PCB design Gerber collection: the solder paste
layer.

• You use it to generate a stencil that allows you to apply the solder.
• You can laser-cut one from a thin sheet of Mylar plastic or have one made for you out of thin steel.
• When you have all the components on the board, you need to melt the solder to fix everything in place.
• You can do this with a soldering iron, but doing it by hand is easier if you use a hot-air rework station.
PCB
TESTING
• Now your boards are all ready and assembled, but how do you know that they all work as they’re meant
to? This is where testing comes in.

• A better approach is to build a specific test rig to exercise the different parts of the circuit and measure
the voltages at set points on the board.

• These measurements can then be compared against known-good values and a decision made
automatically as to whether or not the device under test (DUT) has passed.

• Because you don’t want to spend time making individual connections for each test, the normal practice
for the test rig is to use the mounting holes for the PCB for alignment and then have it held by some clips
against a number of carefully prepositioned, spring-loaded pins.

• These pins are known as pogo pins, and the spring means they can make a good connection to the
board without any extra work, such as soldering, when the board is placed into the test rig.

• The test program can then run through its tests and measure voltages at different pogo pins at the
relevant time in the test to see how the board being tested performs.

• If the DUT includes a microcontroller chip, the test rig could flash it with a test program to help with the
MASS-PRODUCING THE CASE AND
OTHER FIXTURES
• A good rule of thumb for keeping down the costs of production is to minimise the amount of time a
person has to work on each item.

• Machines tend to be cheaper than people, and the smaller the proportion of labour is in your costs,
the more you’ll be able to afford to pay a decent wage to the people who are involved in
assembling your devices.

• Production rates are also important.


• Though they’re fairly labour free, 3D printers and laser cutters aren’t the fastest of production
techniques.

• Waiting a couple of hours for a print is fine if you just want one, but a production run of a thousand
is either going to take a very long time or require a lot of 3D printers.

• We look at what must be the most common method of mass production: injection moulding of
plastic.

• As the name suggests, the process involves injecting molten plastic into a mould to form the
CERTIFICATION
ISSUES WITH IOT
PRODUCTS
• These regulations are there for good reason.
• They make the products you use day in, day out, safer for you to use; make sure
that they work properly with complementary products from other suppliers; and
ensure that one product doesn’t emit lots of unwanted electromagnetic radiation
and interfere with the correct operation of other devices nearby.
• The regulations that your device needs to pass vary depending on its exact
functionality, target market (consumer, industrial, and so on), and the countries
in which you expect to sell it.
• The best approach is to work with a local testing facility.
• They not only are able to perform the tests for you but also are able to advise on
which sets of regulations your device falls under and how they vary from country
to country.
CERTIFICATION ISSUES WITH IOT
PRODUCTS
• The problem arises when a circuit emits a sufficiently strong signal unintentionally which disrupts
the desired radio frequencies.

• In addition to the test report, you need to gather together PCB layouts, assembly certificates, the
certificates for any precertified modules that you have used, and datasheets for critical
components.

• This information is all held in a safe place by the manufacturer (that is, you) in case the authorities
need to inspect it.

• The location of the technical file is mentioned on the declaration of conformity, which is where you
publicly declare to which directives in the regulations your device conforms.

• In Europe, you must also register for the Waste Electrical and Electronic Equipment Directive
(WEEE Directive).

• It doesn’t cover any of the technical aspects of products but is aimed instead at reducing the
amount of electronic waste that goes to landfill.
WHICH THINGS AFFECT THE COST
OF PCB?
• You have many things to consider as you move to higher volume manufacturing. Unfortunately, lots of them involve
sizeable up-front costs.

• If you don’t have much experience with managing delivery of inter-related tasks and deadlines, it is worth seeking out a
trusted advisor or partner to help.

• Someone on the team needs to keep an eye on how things are progressing; which things must be done before other
tasks can proceed; and, peering further into the project timeline, spot (and deal with) problems before they become a
roadblock for the rest of the team.

• Many of the online PCB services include a quoting tool, so even before the design is finished, you can get a feel for the
likely price.

• You should be able to make a reasonable guess on the size of PCB you need and the number of layers it’s likely to
require; those are the main factors that the quoting tools use to work out the cost, plus extras if you want something out
of the ordinary such as a different colored solder mask.

• Pricing the plastics or other physical components depends far too much on the design for us to be able to give
meaningful numbers here, but getting a hardened steel tool made\Naturally, as the project progresses, you will get
more accurate quotes (and eventually completely accurate invoices…) as you talk to suppliers and get ready to place
orders with them.
HOW TO SCALE UP
SOFTWARE?
• Software is intangible and malleable.
• There are no parts to order, no Bill of Materials to pay for.
• The bits of information that make up the programs which run in the device or on the Internet are invisible.
• The software you wrote during project development and what ends up in production will be indistinguishable
to the naked eye.

• Software has to be polished before it can be exposed to the real world.


• The various factors that require this polish software are:
• correctness,
• maintainability,
• security,
DEPLOYME
NT
• Copying software from a development machine to where it will be run from in production
is typically known as deployment, or sometimes, by analogy to physical products,
shipping.
• In the case of the firmware running on the microcontroller, this will (hopefully) be done
once only, during the manufacture of the device.
• For a simple device like the Arduino which usually only runs a single program, the
process will be identical to that in development.
• The software for an online service will tend to run in a single location.
• However, it will generally be visible to the whole of the Internet, which means that it will
potentially be subject to greater load and to a greater range of accidental or malicious
inputs that might cause it to stop working.
• It is necessary, to update the online software components more regularly than those on
CORRECTNESS AND
MAINTAINABILITY
• So, you’ve sold a thousand Internet-connected coffee machines.
Congratulations!
• Now it’s time to cross your fingers and hope that you don’t get a thousand
complaints that it doesn’t actually work. Perhaps it makes cappuccinos when
the customer asked it for a latte.
• Clearly, as a publicly available product, your software has to do what you
claimed it would, and do it efficiently and safely.
• Testing your code before it is deployed is an important step in helping to
avoid such a situation.
• If your device can update its own code, the channels for delivering and
authenticating any updates must be rock solid, lest they be compromised
SECURITY
• These concerns lead us back to the important issue of security.
• Following are some of the more important guidelines:
• 1.Make sure that your servers are kept up-to-date with the latest security patches, are hardened with
the appropriate firewalls, and detect and mitigate against password hacking attempts and rootkit
attacks.
• 2. User passwords should never be stored in plain text. If your database were ever compromised,
an attacker could easily log in as any user.
• 3. Never simply trust user input.
• 4. Be aware of cross-site request forgery (CSRF) attacks from other malicious or compromised
websites.
• Check that anything that is entered into a web application fits the type of data you
expect, and refuse or clean anything which doesn’t.
PERFORMAN
CE
• The first thing many people think of when considering scaling up software is whether it
will be fast enough and handle a large number of users.
• If your web service is running on a modern framework, it should be easy to scale up by
deploying the code onto a more powerful machine, or by running multiple servers, with a
front-end server or proxy managing the load.
• You should concentrate on running your web application with appropriate standard
infrastructure which is good enough for most problems.
• If you’re lucky enough to have so much traffic that you need to scale, you should always
optimise using this algorithm:
• Identify that you actually have a problem.
• Measure and profile the tasks which are slow and identify the problem.
• Fix that problem. The web community does a good job in sharing best practice in how to address
such problems, so you often find that others have trodden the path before and documented their
USER
COMMUNITY
• Whether you are launching a mass-market commercial product or an open-source
community effort, your project will be successful only if people actually use it.
• At a minimum, you need a support email or a bug-reporting tool (ideally a public one,
so that users can easily find related issues), but you will probably have a presence
on various social media forums (Twitter, Facebook, and the like).
• As well as responding to queries, however, you should think about the user
experience before launching: does your website have documentation, introductory
videos, and tutorials?
• Blogging regularly about product development and related topics helps build a
readership of users, both current and potential.
• Finally, some form of forum, mailing list, or chat room lets users support each
other, which reduces your workload, but more importantly helps to build up a
CHAPTER 11:
ETHICS
• CHARECTERISING OF INTERNET OF THINGS
• PRIVACY
• CONTROL
• DISRUPTING CONTROL
• CROWD SOURCING
• ENVIRONMENT
• PHYSICAL THING
• ELECTRONICS
• INTERNET SERVICE
• SOLUTIONS
• THE INTERNET OF THINGS AS PART OF THE SOLUTION
WHAT THE INTERNET OF THINGS
IS?
• The world has arrived at an age of cheap complex devices of great
reliability; and something is bound to come of it.
• The availabilities of technology brings certain abilities within the reach
of not just the powerful but the ordinary citizen.
• The “form follows function” applies primarily to the physical usage of
the “Thing”, its affordances, sensors, and actuators, and only
minimally to its digital communications.
• This leads to objects that can look innocuous (harmless) but have
arbitrary and potentially unexpected capabilities.
• Connecting the Internet to the real world allows both your physical
actions to be made public and, in the opposite direction, for events on
the Internet to affect your environment.
WHAT THE INTERNET OF THINGS
IS?
• Applying this bidirectional communication to Things can lead to features that interact
with the concept of privacy. When you switch on your Good Night Lamp, the “little
lamp” at your mother’s bedside will also turn on, letting her know you are home.

• When you leave the office, the WhereDial at home turns to let your partner
know you’re travelling.

• We have repeatedly noted that the Internet of Things is made up of


• Physical object + controllers, sensors, and actuators + Internet service
• Each of these aspects has a part to play in the ethical issues specific to the
Internet of Things.

• The advances in the Internet of Things are also primarily related to communication,
but now allow the publication and transmission of vast streams of data, from the
ISSUES ON
PRIVACY
• The Internet, as a massive open publishing platform, has been a disruptive force as regards the concept of privacy.
• Everything you write might be visible to anyone online.
• There is a value in making such data public: the story told on the Internet becomes your persona and defines you in
respect of your friends, family, peers, and potential employers.

• A common argument is “if you’ve got nothing to hide, then you’ve got nothing to fear.”
• You change and your persona changes.
• Yet your past mistakes (drunken photos, political statements) may be used against you in the future.
• As the Internet of Things is about Things, which are rooted in different contexts than computers, it makes uploading data
more ubiquitous.

• Even innocuous photos can leak data. With GPS coordinates (produced by many cameras and most smartphones)
embedded into the picture’s EXIF metadata, an analysis of your Flickr/Twitpic/Instagram feed can easily let an attacker
infer where your house, your work, or even your children’s school is.

• Similar issues exist with sports-tracking data, whether produced by an actual Thing, such as Nike+ or a GPS watch.
HOW INTERNET AFFECTS
•PRIVACY
IOT data is incredibly useful to keep track of your progress, and sharing your running maps, speed and
heartbeat.

• It may be trivial for an attacker to infer where your house is (probably near where you start and finish your
run) and get information about the times of day that you are likely to be out of the house.

• To the extent that you allow your location to be shared with people you’ve chosen to share it with, there is no
violation of privacy.

• It is very important to note that even aggregate data can “leak” information.
• If you can see data collected for a street, for example, then comparing a week when a household is away on
holiday with a normal week when they are at home might tell you about their usage.

• Some very interesting questions can be raised about this: should companies be prevented from trading data
with each other?

• Should there be legal limits to what data can be kept or what analyses performed on it?
DATA
SUBJECT
• As sensors such as CCTV cameras, temperature meters and
Bluetooth trackers are installed in public and private spaces, from
parks to shops, data about you is collected all the time.

• The term “data subject” has been coined for this purpose. Although
you may not own the data collected, you are the subject of it and
should have some kind of rights regarding it:
Transparency over what is collected and what will be done with it, the access to
retrieve the data at the same granularity that it was stored, and so on.
WHO CONTROLS DATA
COLLECTED BY DEVICES
(SENSORS)?
• Some of the privacy concerns manifest only if the “data subject” is not the one in control
of the data.
• For example if the drunken photo was posted by someone else, without your permission.
• This is a form of cyberbullying, which is increasingly prevalent in schools and elsewhere.
• If you are gifted a WhereDial or a Good Night Lamp, is there an expectation that you use
it, even if you don’t really want to?
• While the technology itself doesn’t cause any controlling behaviour, it could easily be
applied by a spouse/parent/employer in ways that manifest themselves as abusive,
interfering, or restrictive
• Already, companies and organizations are looking at mashing up data sources
and apps and may start to offer financial incentives to use Internet of Things
devices: for example, reductions in health insurance if you use an Internet-
WHO CONTROLS DATA
COLLECTED BY
DEVICES?
• From a state perspective, there may be reasons for collective action, and
information required to defend against threats, such as that of terrorism.
• The threat of one’s country becoming a police state is not merely a
technological matter: institutions such as democracy, the right to protest,
free press, and international reputation should balance this.
• Now that surveillance equipment is cheap, and the processing power
required to analyse the mountain of data produced by this equipment gets
ever more accessible.
• Of course, it may not be “the State” that profits from the control but
corporations.
• Companies have the expertise and the technology to interact with the
DISRUPTING
CONTROL
• The other major possibility that Eaves suggests is that “The Internet Destroys the State”.
• When we refer to a technology as “disruptive”, we mean that it affects the balance of
power.
• If one of the fears about the Internet of Things is that it will transfer power away from the
citizens, the subjects of technology, to the elite, then perhaps it can also be used to
redress that balance.
• One extreme example of this would be how surveillance and fears of the Big Brother
state (CCTV cameras, remote-controlled helicopter-drones) might be mitigated by
“surveillance”.
• Here, activists might have compromised public cameras, or perhaps installed additional
spy cameras, routed through self-healing networks in people’s homes, hidden in public
spaces, flying in the airspace, or even crawling the sewers.
CROWDSOURCI
NG
• The original intent wasn’t simply “making data public” but also letting “the public
making data”.

• Governments and companies simply do not and cannot have a monopoly on all
recording of data: there are infinite combinations of data sources.
• Choosing which data to record is a creative and engaged act, as well as, perhaps,
a political one.

• As he points out, “The air quality data collected by the government is likely sampled
from far, far away and then applied to you on a regional level, almost completely
useless from the standpoint of trying to understand or change the local dynamics of
pollution that affect you”.

• Crowdsourcing this data is an entirely innocent scientific activity yet is profoundly


FISHER’S ORIGINAL DEFINITION OBSERVED FIVE
CRITICAL REQUIREMENTS FOR A SENSOR
COMMONS PROJECT
• It must:
•Gain trust
•Become dispersible
•Be highly visible
•Be entirely open
•Be upgradable
GAIN
TRUST
• Trust is largely about the way that an activist project handles itself
beyond the seemingly neutral measurements;

• understanding local issues, being sensitive about the ways that the
sensor network itself affects the environment, engaging the public with
accessible and readable information about the project, and dealing
with the local authorities to get access to the systems the project
wants to measure.
BECOME
DISPERSIBLE
• Becoming dispersible means spreading the sensors throughout the
community.

• Getting mass adoption will be easier if the proposed sensors are


inexpensive and if the community already trusts the project.

• If the sensors are complicated to set up or require massive lengths of


cabling, they will get much less take-up!

• The Xively air-quality project led to the creation of the “air-quality egg”,
a simple, inexpensive sensor with precisely these features.
BE HIGHLY
VISIBLE
• Being visible involves explaining why the project’s sensors are
occupying a public space.

• Being honest and visible about the sensor will help to engender trust
in the project and also advertise and explain the project further.

• Advertising not just the sensors but the data (both online and in real
life) and the ways that data has helped shape behavior will also
generate a positive feedback loop.
BE ENTIRELY
OPEN
• Being open is perhaps what distinguishes the sensor commons from a government
project the most.
• Government data sets are often entirely closed, but the data that is released
from them will be given a lot of attention because of the rigour and precision that
their sensor projects will have.
• A community sensor network may have uncalibrated devices—that is, the readings
for a device may be consistently out from the “correct” value and may have
additional noise at the extremes of the scale.
• The openness makes up for this because all the facts about the devices and
the possible errors are admitted upfront and can be improved by anyone in the
community.
BE
UPGRADABLE
• Finally, the project should be designed to be upgradable, to enable the
network to remain useful as the needs change or hardware gets to the
end of its working life.

• This requirement interplays with the dispensability and openness of


the project, and the up-front thought to managing the project long term
will feed back into the trust in the project.
ENVIRONMENTAL CONCERNS
ABOUT THE PRODUCTION: PHYSICAL
THING
• Creating the object has a carbon cost, which may come from the raw materials
used, the processes used to shape them into the shell, the packing materials,
and the energy required to ship them from the manufacturing plant to the
customer

• It’s easier than ever to add up the cost of these emissions: for example, using the
ameeConnect API (www.amee.com/ pages/api), you can find emissions data and
carbon costs for the life-cycle use of different plastics you might use for 3D
printing or injection moulding.

• You may need to consider other environmental factors, such as emissions produced
during normal operation or during disposal of the object.

• For example, thermal printer paper may contain Bisphenol-A, which has health and
ENVIRONMENTAL CONCERNS
ABOUT THE PRODUCTION:
ELECTRONICS
• The electronics contained in a Thing have their own environmental cost.
• Buying PCBs locally or from a foreign manufacturer affects the carbon cost
of shipping the completed units.
• If your product needs to conform to RoHS legislation, then every single component
that could be extracted from it must be RoHS compliant.
• More worryingly, many electronic components rely on “rare earth minerals” (REMs)
which have been extracted in China or from other locations worldwide.
• The mining process must be managed properly; otherwise, slurries formed of mildly
radioactive waste minerals will be left behind long after the mines cease production.
Refining them involves the use of toxic acids.
• Shipping the raw material from mine to refinery to manufacturer has its own carbon
ENVIRONMENTAL CONCERNS
ABOUT THE PRODUCTION: PHYSICAL
THING
• In the digital world, moving data rather than physical objects is
faster, is safer, and has a lower environmental cost.
• Of course, “data” doesn’t exist in the abstract.
• The stone tablets, and libraries of paper books that have historically
been used to store analogue data always had their own
environmental cost.
• Now, running the Internet has a cost: the electricity to run the routers
and the DNS lookups, plus establishing the infrastructure—laying
cabling across the sea, setting up microwave or satellite links, and so
on.
• As well as the cost of transferring the data across the Internet,
running your own web server uses power.
USE OF THE INTERNET OF THINGS
AS PART OF THE SOLUTION
• Distributed sensor networks as a social and political act: the potential for global environmental
action is also massive.

• If community-led sensor networks can help supplement government and international science
measurements, then we should be doing everything we can to help.

• Incrementing production lines, home energy usage, transport costs, building energy efficiency, and
all other sources of efficiency might seem extreme, but it may be a vital, imperative task.

• Other technologies which aren’t principally linked with the Internet of Things will also be important.
• Incrementing the supply chains, measuring to be certain that new methods really are more
efficient, and reducing inefficiencies by automation could well use Internet of Things solutions to
help measure and implement the solutions.

• The Internet of Things could become a core part of the solution to our potentially massive
environmental problems.

• The Internet of Things will also, if we let it, become a platform for whatever people want it to be.
WHAT IS CAUTIOUS
OPTIMISM?
• Technology did change the world that they knew, for the worse, in many senses.
• But without the changes that disrupted and spoilt one world, we wouldn’t have arrived at a
world, our world, where magical objects can speak to us, to each other, and to vastly
powerful machine intelligences over the Internet.
• As a massively interdisciplinary field, practitioners of Internet of Things may have an
opportunity (or perhaps responsibility) to contribute to providing moral leadership in many
of the upcoming ethical challenges.
• we should remember an important lesson on humility from Laura James’s keynote at the
OpenIoT assembly:
• Don’t assume you know it all.
• The Internet of Things is interdisciplinary and it stretches most of the individual disciplines too.

• You will need help from others.


CAUTIOUS
OPTIMISM
• When designing the Internet of Things, or perhaps when designing
anything, you have to remember two contrasting points:
• Everyone is not you.
• Though you might not personally care about privacy or flood levels caused by
global warming, they may be critical concerns for other people in different
situations.

• You are not special.


• If something matters to you, then perhaps it matters to other people too.
THE OPEN INTERNET OF THINGS
DEFINITION
• The Open IoT Assembly 2012 culminated in the drafting of the “Open
Internet of Things Definition”

• We can summarize the main goals of the definition as follows:


• Accessibility of data:
• All open data feeds should have an API which is free to use, both monetarily and
unrestricted by proprietary technologies with no alternative open source implementation

• Preservation of privacy:
• The Data Subjects should know what data will be collected about them and be able to
decide to consent or not to that data collection.

• Transparency of process:
• Data Subjects should be made aware of their rights—for example, the fact that the data
ETHIC
S
THANK
YOU!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy