EA 874 Blog Topic 4 Technology Infrastructure Architecture

Dominic Patruno


 Internet of Things also known as IoT is a network of devices embedded with software, sensors and actuators all connected together collecting and possibly transferring data (Wikipedia, 2017).  The purpose of IoT devices is to connect the physical world with the computer based systems to track, monitor and these devices with increased efficiency, accuracy and limited human intervention.

IoT has been in use for quite some time, the airline industry has been using sensors to monitor engine performance and maintenance for years.  However with the ever increasing growth of IoT devices and the use not only in commercial but now consumer spaces, it is important that security be part of the architecture and support moving forward.

More and more devices are being connected such as phones, fitness trackers, automobiles and watches, those devices and the data they collect become a target for hackers.  Manufacturers and consumers must be vigilant in the security of their devices and ensure they are kept up to date in software updates.

As manufacturers and consumers enter the IoT space, they need to consider the following best security practices.  Data collection, understand the terms on how the data is collected and used, additionally be sure how the data is transferred and to whom.  Keep up on the how devies are secured and how the companies are looking to keep their devices secured.  Security threats are constantly evolving and so should the products to address them.  Stay informed of legislation that will govern privacy standards for consumers, be sure the products you purchase and or manufacture are adhering to these practces and governance.


Edge Computing

Edge computing is the processing of data at the edge of the network closet to where the data is being captured (Wikipedia, 2017).  This edge computing uses cloud computing technologies to process and analyze data and makes decisions before sending the data to a central repository, typically in a centralized data center or hybrid cloud.

The difference between edge computing and just having servers on premise is the purpose and the technology.  In the case of having on premise servers for computing was to delivery applications.  In this case the main goal of edge computing is to deliver data processing and analytics, while reducing network bandwidth requirements and data latency.

As more and more IoT devices become embedded in our organizations, and begin collecting more data.  It will be imperative that we start to create these edge computing environments as data collection and processing points to handle the sheer volume of data.  Additionally, these edge computing environments can act as continuous improvements hubs that analyze data and act based on the analysis.

I believe this is still a new and evolving technology and will continue to mature and adapt to the needs of the market.  Vendors such as Cisco, Microsoft and Google are watching very closely and placing bets where they feel they can make a difference.



Wearable technology is technology that can be worn on the body and is typically connected to the internet either through a smart phone or its own network connection.  Currently wearables are mostly novelty items, in that they are typically used to track health, stress and sleep monitoring.  There has been some clothing made that will light up and create designs with lighting, also some glasses that allow for embedded documents to display and the ability to take picture and stream live data.

As the technology enhances and the laws become more supportive of wearables, I think we can se greater value and effectiveness in their use.  For example, in sports, if a shirt could monitor and track the health and stamina of a player, they could then use that information to know when to rest or keep the player in the game.  Giving them a competitive advantage to their opponents.  Additionally, the same technologies can be used for patients that are being monitored for stress tests.  Instead of sending the patient home with electrode connections and a data gather box, they just need to wear a special shirt.

Glasses can have many different applications as well.  For example, in manufacturing, when a technical is building a car or even kitting a multi-part product, there could be instructions that are visible through the glasses providing real time instructions and offering better quality and speed to the assembly process.

In summary as IoT grows, I think the wearables market will grow as well.  Similar to IoT, security will need to be top of mind for manufacturers and consumers.




Retrieved October 6, 2017 from https://en.wikipedia.org/wiki/Internet_of_things

Joyce, S. (August 2017).  The Next Stage in the Evolution of the Internet of Things – Security. Retrieved October 6, 2017 from http://usblogs.pwc.com/emerging-technology/evolution-of-iot-is-security/

Retrieved October 7, 2017 from https://en.wikipedia.org/wiki/Edge_computing

Retrieved October 8, 2017 from https://en.wikipedia.org/wiki/Wearable_technology



Leave a Reply

Your email address will not be published. Required fields are marked *