Showing posts with label Internet of Things. Show all posts
Showing posts with label Internet of Things. Show all posts
Monday, September 19, 2016
Sunday, September 18, 2016
Recommended Readings on Internet of Schools
The Trends and Challenges Shaping Technology Adoption In Schools
https://ww2.kqed.org/mindshift/2016/09/16/the-trends-and-challenges-shaping-technology-adoption-in-schools/
The Connections Between Computer Use and Learning Outcomes in Students
Saturday, September 17, 2016
Readings on sensors, smart cars and smart homes...
6 Affordable Vehicles with Collision Warning Systems
The Game Has Been Escalated': Pentagon Eyes Space Sensors for Missile Defense Read more: https://sputniknews.com/military/20160902/1044871551/pentagon-space-sensors.html
8 vehicles earn top rating for collision warning
Even the bad guys will stare
The Game Has Been Escalated': Pentagon Eyes Space Sensors for Missile Defense Read more: https://sputniknews.com/military/20160902/1044871551/pentagon-space-sensors.html
8 vehicles earn top rating for collision warning
Even the bad guys will stare
Of Smart Cars under IoT

Car Think!
Under the
Internet of Things, cars could think and react and prompt. They could be paired to
an owner’s smartphone, home, lighting, heating and control systems. They would be
connected to various house appliances. All settings could be adjusted
from behind the wheel.
Linkages to smartphones enables a duplication of the car dashboard so as to allow remote monitoring of things such as fuel and oil levels. Smartphones and smart cars would sync with home ecosystem and mobile devices.
Linkages to smartphones enables a duplication of the car dashboard so as to allow remote monitoring of things such as fuel and oil levels. Smartphones and smart cars would sync with home ecosystem and mobile devices.
The car’s geo-location software would work in tandem with the home cameras and innumerable other sensors, so that the owner and his assets are well connected and the owner well
informed of the position.
Car owners could have reassuring car-to-home connectivity. (Car as a home away from home?) Owners would wire-less control connected devices at home from a remote point. Linked smoke detectors could convey any smoke alarm to the car. A minor mishap like a garden pipe leak at home would be conveyed to the owner even as he is in the car. May be, if connected, the plumber would have an order to execute.
Car owners could have reassuring car-to-home connectivity. (Car as a home away from home?) Owners would wire-less control connected devices at home from a remote point. Linked smoke detectors could convey any smoke alarm to the car. A minor mishap like a garden pipe leak at home would be conveyed to the owner even as he is in the car. May be, if connected, the plumber would have an order to execute.
Cars would communicate with parking lots in its search for parking spaces.
Apps are already available to reserve parking slots against due payment. Problems
of finding cars in huge sized parking lots are facilitated on the smart phone. Town restraints on parking could be detected and the owner informed of risks. (Parking prohibited in Troy on Wednesdays, for example)
Alerts on status of car machines would be available. Any problem in the car could
be detected; if there is need to fill in fuel, air oil etc. the car would notify. Efficiency levels and maintenance costs are minimized owing to early
warning suggestions. The smart car would have diagnostic systems which analyse generated data points to predict latent vehicle issues before they really result in a problem.
Security features that keep the car connected in an emergency. eCall-equipped chip by 2018 that will automatically contact the nearest emergency centre in case of a collision. Plain breakdown could be reported real-time to breakdown services.
Cars could capture conversations and respond (e.g: How far is the ATM?)
Cars could capture conversations and respond (e.g: How far is the ATM?)
Sensors would also monitor driver behaviour and warn them of sleepy
eyes or over limit alcohol intake. Thus IoT enters the arena of behaviourial oversight for safety's sake. Family / Chauffeur trackers that would send reports if the driver has
violated agreed upon boundaries
Sensors of the Smart type would advise on:
- Road topography and conditions
- Fuel Stations and rest rooms
- Proximate vehicle distance
- Obstacles in rear, sides and front
- Blind spot manoeuvring
- Air pressures
- Vehicle engine and engineering
- Seatbelts
- Weather ahead
- All electronic controls
- All crucial elements like gears, brakes etc
- Traffic management
- Food to suit tastes!
We may need drivers no more!!!
Some References
Thursday, September 15, 2016
Securing the Internet of Things from terrorism
Terrorists use the internet on a 4 R frame - to
relate to, recruit, retain, and refer
their clandestine network. They use the net to build bonds and networks, and to
maintain dangerous relationships. Given a common mission (to disrupt if not
destroy the State), they meet and tie together in virtual space platform.
How do the terrorists use the
internet?
- Selling a radical ideology - the web as a medium to propagate.
- Eavesdrop to enable recruiting followers with an extreme bend of mind.
- Virtually communicate in forms which are accessible to password restricted followers but inaccessible to authorities.
- Deepening relationships through instilling fear within and without and creating the obsession of goal achievement.
- Building protected cyber-forums.
- Instilling hatred for the system.
- Provoking the mind of the potential recruit (may be through a photo, a story, a harping on a series of stories. call to action).
- Exaltation of terrorism to obsessive levels in the psyche of the potential terrorist.
- ‘Fundamentalizing’ thought from a level of acceptance of the neighbour to a level of abhorrence.
- Arranging stealth finance. Payment systems are used: funds are moved through electronic wire transfers, credit card or alternate payment facilities.
- Using avenues like crowd funding, e-commerce to solicit funds for the illegal activities.
Criminal activity in finance would include
- identity theft,
- access to account database,
- credit card theft,
- wire fraud,
- stock fraud,
- intellectual property crimes,
- auction fraud,
- e-gold online payment accounts
- using commodity markets
Case 1: Younis Tsouli (2005) built websites and ran web forums for terrorists. He was a distributor of video
material for terrorists. He hijacked web sites; ran password-protected forums
with large number of members which were used for military instructions. Laundered
money was used to fund the registration of nearly 180 websites as also to equip
terrorists across several countries. Approximately 1,400 credit cards generated
approximately £1.6 million of crime driven money.
Case 2: Tariq Al-Daour (2006) had 37,000 credit card details on his
computer drives. These were obtained through phishing attacks or purchased in
on-line forums where stolen information circulates. Gullible people
were led to believe that they were verifying their accounts were unwittingly
helping the group fund their terrorist activities.
As terrorists connect through cyberspace, IoT raises security issues as never before. Given that the devices are all inter-connected, theft at any one
point could have a contagion effect with the criminal having recourse to a huge set of data. Ranging
from electronic key to mobiles to identity theft, there are multiple avenues but also immense potential for harm. IoT would enable availability of movements and preferences of consumers,Criminal hackers could track these through a host of inter-connected
devices. The security threat implicit in multiple connected devices has to be
instilled in the consumer mind-set. In
the absence of any IoT regulator, self regulatory standards by independent vendor
are essential.
References:-
http://techonomy.com/2016/08/27253/
(Excerpts from a forthcoming book by the author)
Operational Risks of IoT - Cyber-attacks
A cyber-attack is a deliberate, planned criminal
use of computer networks to launch an attack against the intended victim, entity,
organization or country. The machine led virtual attacks aim to disrupt or at least weaken the optimal functioning of
target entities. This disruption would result in a slowing of or 'freeze state' in regard to the computer infrastructure.
The modus operandi could be hacking, social media interventions, computer viruses, malware, ransomware, phlooding
(“Phlooding” refers to the aiming at freezing the central organizational servers
through intended, deliberate overloading of the servers, which consequentially
slows systems or stalls the systems) etc. Inevitably, there is a service delay or denial to customers.
Cyberattacks
will instil fear of a different variety. The withdrawal of balances through ATM
in remote places (as recently happened in India) is sufficient to cause panic
in general public. Imagine then, a
series of crippling attacks as was seen in Israel in January 2012, involving
the targeting of multiple representational Israeli websites.
Case 1 : In
January 2012, hackers stuck at financial muscle of Tel Aviv - the Stock
Exchange, and the First International Bank. There was a DOS attack. – denial of
service. The disclosure of the credit card and account details of thousands of
Israeli nationals - Banking Supervision Department of Bank of Israel said
15000 accounts were broken into - unnerved
public at large. The
e-attacker, OxOmar and sometime earlier, the Gaza Hackers Team which had usurped Israeli
fire services website, had indicated the operational risks in using internet.
The
cyber-attackers are obsessed with religious, political or social objectives. They will continue to orchestrate run on the systems without any fear of the future. Any country can be attacked any time, anywhere.
As IoT evolves and seeks to put in place an elaborate pattern of connected
systems, contagion risk is very high. We need to erect moats to safeguard the fort of Internet of Things.
References:
http://edition.cnn.com/2012/11/19/tech/web/cyber-attack-israel-anonymous/
http://www.bbc.com/news/world-16577184
http://www.timesofisrael.com/israelis-in--hack-case-to-be-extradited-to-us/
(Excerpts from a forthcoming book by the author)
Wednesday, September 14, 2016
The Internet of Insecurity- Fear as the Key.
![]() |
Watch Your Wearable |
- As IoT knits together automobiles, electricity, air-conditioners, dishwashers, refrigerators, alarm systems etc., their security features could be broken into by a determined impostor or a group of criminal 'infiltrators'.
- Hackers could access networks through pilfered user authorisations. Stealing identification, tracking down locations of a community of individuals etc. would be possible.
- Hackers could intercept / read/ analyse signals emanating from the newly networked devices, Hardware could be easily penetrated and web connected machines stand exposed.
- Political strategy to accentuate the division of sects has technological repercussions. The fragmented groups may have opened a new war zones with web warfare. As they become fragmented, it becomes difficult to track.
Evolving threats identified by establishment agencies all around are:
- Individual criminals;
- Extremist Groups like the Islamic State using online hacking as a weapon ;
- Clandestine, detached groups using them;
- Online hacking - breakdown threats to www;
- Using social media to eavesdrop/ influence;
- Money laundering using internet fund transfer;
- Financing of disruptive terrorist activities using systems;
- Potentially ne'er-do-well states using them in frustration ;
- Power seeker nations seeking to destroy competitor's systems T
These 'infiltrators' could indulge in:
- spying,
- deliberate placement of disinformation,
- theft of identity and data,
- open and subtle propaganda of their belief systems
- stealth attacks on data in singular or multiple patterns.
Together, these negative approaches have immense destruction capabilities. The future of online security lies in the ability to proactively stall potential criminals through offensive and defensive mechanisms. With authorities in the US suggesting that Russia and China may have more sophisticated cyber programmes, an on line warfare seems to be in the offing to substitute the cold war era.
These 'infiltrators' could easily listen into or tap the millions of signals which would follow the internet
of things.
The Age of Insecurity is here.
Excerpts from a forthcoming book by the author
Wednesday, September 7, 2016
Internet of Things For a Beginner -Readings
Forbes - Author - Jacob Morgan
A Simple Explanation Of 'The Internet Of Things'
The Guardian
What is the internet of things?
McKinsey & Company
The Internet of Things By Michael Chui, Markus Löffler, and Roger Roberts
Tuesday, September 6, 2016
Friday, September 2, 2016
Case Study of a Smart Campus project (The Indian Institute of Science- IISc)
The Indian
Institute of Science is developing an open, integrated and extensible Internet
of Things (IoT) technology stack for Smart Management of campus utilities.
The IoT stack brings
together:
hybrid sensing
with physical and crowd-sourced sensors,
diverse
networking technologies,
Big Data
Analytics platforms,
Sensor driven utility
management.
The project is a "laboratory" to test and validate
IoT research and technologies for India.
About 30
buildings on campus fitted with IoT networking and water sensors.Intelligent
water management to take over for a sustainable campus environment.This will document water arrangements, patterns in buildings and
labsReduce wastage due to leakages (“drips”)Ensure quality & maintenance of waterMonitor quality of water on tanks and outletsAlert users on potential quality issuesCrowdsource to report maintenance issues
IoT connects large numbers of sensors through the Internet
Allows sensing and data collection in real-time
Creates a feed-back loop,
IoT stack contains:
Sensors: Physical and Crowd-sourced sensors using Android
App
Wireless Network: On the field to connect sensors with
IISc LAN
Big Data Platform: Collect, store & analyse large
data in real-time
Analytics: Algorithms for smart management decisions
IoT applications are data intensive.
Big Data platforms
support such applications
Data arrives at high velocity from sensors
Applications obtain large volumes over time
Apache Storm ensures fast data processing
Hadoop/HBase for large data storage & query
Intelligent use of Edge Devices & Clouds
Reduce B/W, Improve privacy.
Source
http://smartx.cds.iisc.ac.in/
(Stack refers to the layers (TCP, IP, and sometimes
others) through which all data passes at both client and server ends of a data
exchange. TCP/IP (Transmission Control Protocol/Internet Protocol) is
the basic communication language or protocol of the Internet.)
(Apache Storm is a free and open source distributed
realtime computation system. Storm makes it easy to reliably process unbounded
streams of data, doing for realtime processing )
(Data ingestion is bringing data into your system,
so the system can start acting upon it.)
Thursday, September 1, 2016
Smart Campus within a Smart City
“A Smart Campus” could
be envisaged as a community of technologically interconnected academics and
students within a Smart City. To launch a Smart Campus, one would need to
identify specialized technical and non-technical skills available on a real
time basis.
How
would Smart Campus help?
- Higher education researchers, educators, and students are in a vantage position to lead in inventing, innovating, discovering and developing IoT devices, applications, systems, and services.
- It (Smart Campus) would lay the foundation for adding thrust to connectivity within the Smart City linking unconnected/non- networked points.
- It should give an impetus to innovation – be the intellectual innovation lab of the Smart City.
- It could evolve digitalized trading platforms (electronic bourses) so that trading at cheaper prices is feasible.
- It could experiment in security intended monitoring and surveillance.
- It could help erect/ commission smart buildings (energy efficient, ecologically sustainable, cost affordable).
- It could use analytics to predictively mine Big data. The use of predictive analytics in learning would help dynamic behavioural pattern identification and help appreciate how students learn and respond to different types and levels of interventions. This could be extended to all city residents eventually.
- Could be into operations' research on operational cost reduction and enhanced productivity. Potential cost savings include the areas of smart lighting, smart waste management, smart traffic signalling, smart parking, smart building optimisation.
- Technology’s capacity to drive a better experience and outcome for students. The transmission of information flow would be dynamic, with real time assimilation of data flows with contacts between mobile and stationary elements and mobile to mobile elements. Elements.
- The new Smart Campuses should fructify private-public partnerships.
Examples
- At Virginia Tech, the VT Alerts system notifies students, staff, and faculty of a campus emergency situation. Smart campuses could use smartphones and wearables like students' smartwatches etc. as a connectable communications mechanism.
- The University of Washington, a student-developed app— OneBusAway—provides real-time information for metro-area bus systems.
- University of Wisconsin: Students create IoT apps end-to-end systems from devices speaking with other local devices such as in a smart home, communicating over a network to centralized management systems and to applications in the cloud. The UW-Madison IoT lab helps evolve new business models innovations, using IoT-enabled systems. This creates new services and integrate and analyses data from systems to increase add value to businesses and consumers. The University has a multidisciplinary approach.
References:
1 SmartCampus:
A user-centric testbed for Internet of Things experimentation Michele Nati,
Alexander Gluhak, Hamidreza Abangar and William Headley Centre for
Communication Systems Research University of Surrey
2 Internet
of Everything – Powering the Smart Campus & the Smart City Geelong’s
Transformation to a Smart City, Report by Brad Davies, dandolo partners
3 The
Internet of Things is Here by Florence D Hudson
Tuesday, August 23, 2016
Visualizing Internet of Things in Education:Autumn for Extant Teachers ?
- Student Centric Learning Management Systems will rule the realm of Internet of Things. Students will learn with greater autonomy and will be on their own rather than be spoon fed.
- Learning process would be driven by dashboard reflexes. Students would have access through a dashboard to all data that affect them.
- Teachers will have a dashboard too. Manuals for teachers will set limits for dashboard usage; the role of on campus teacher will shrink.
- Data from all connected IoT devices, including EI sensors, and student wearables will facilitate student technology solutions.
- Skilled technological staff will extract, develop and provide solutions. Data analytics department will emerge as most important support service.
- The solutions will be useful to management of students even when they are off campus. There will be enhanced use of mobile technologies. Academic management, study process management and support services will be digitized and integrated.
- Students will be reassured with 24/7 sensor driven personal attention.
- Applications will be developed to meet student needs ranging from knowledge doubts to mood swings to anxiety attacks. Apps might make learning game oriented. They will offer personalized strategies to combat absorption apprehensions in students’ minds.
- Skill shortage of technology support providers will hit hard. There will be an influx of technology professionals in to the education industry.
- Departments like language will 'wither away' to computer based learning. Extant language teachers may have to re-skill or exit. Skills gap will impact edu-thinking. As the industry transforms, EIs will realize they do not really have all the data and analytics skills that are required.
- Information would have a micro and a micro dimension. At the micro level it is each student and teacher; at macro level it will be aggregated data watched keenly for trends.
- Armed with sets of voluminous data and analytics, research will emerge as more important than teaching.
Monday, August 22, 2016
Internet of Things and Students
Sharing an informative article for school stakeholders from Tamara Chuang of the denverpost.com
Back to school with gadgets and other handy Internet of Things
http://www.denverpost.com/
The Internet of Things: A teacher as a Displaced Person
A teacher could be a 'displaced person' (DP) under the internet of
things as he / she is incompatible with the new connected system.
- Customization
incompatibility:
Students need no face to face contact hours as students can tap online
resources at their convenience. Computers do not ridicule, defer, or hurt.
- Time incompatibility: In IoT, the sensors
will alert systems on any deviation from parameter. The system will have predictive
abilities to suggest solutions in real time. Teachers cannot match such
reflexes.
- Cost incompatibility: Costs are saved by IoT
platforms. Brick and mortar and human elements are relegated to robotic
response systems as they have high marginal costs. In IoT, fixed investments are already made and capacity
utilization brings down costs- with every additional learner costs are spread.
- Memory incompatibility: A teacher cannot remember
all the things that a robotic system can. In volume and content, the
teacher is no match.
- Analytical Incompatibility: Systems will analyse
student records and initiate prompt corrective action. The
machines will be granular even as it is analytical using the Big Data it
has at its command.
- Perspective Incompatibility: The teacher cannot compete with the macro approach that
is feasible.Subjectivity is reduced. They are subjective and oft carried away. Machines are impersonally efficient.
- Approach Incompatibility: Teachers use a
broad brush approach which will be seen as a non – specialism, non- student centric. In the IoT approach, machines take over monitoring. approach. Continuous learning is possible.
- Record Keeping
incompatibility.
Electronic Student Records (ESR) will make it possible to react to data in
rapid response system rendered feasible.
- Privacy incompatibility: Anonymity of internet
should help the backward student raise queries and seek responses from the system and participants.
- Technology Skill
incompatibility.
Teachers cannot acquire the technological skills needed to be in world of
IoT in a short period. Students are more tech savvy than the average teacher.
Saturday, August 20, 2016
How Internet of Things ought to Change Education
- A strong connectivity infrastructure and security system to be in place.
- System must connect and track all devices within the school premises.
- Inter-operability of devices within the school to be assured.
- Upkeep of school computer hardware must be for predictive purposes.
- Wearables on students to be monitored for academic improvement (wearables are to be with mutual agreement).
- To use sensory devices on students for effective oversight over studies; teachers can respond to anxiety attacks in students immediately.
- Access sensory information to be on real time basis.
- Big Data to be used to predict, improve student needs.
- To monitor security of academic records.
- Follow up of on line / mobile education.
- Set up a reliable local area network (LAN) connection.
- (A virtual private network (VPN) may be an option)
- Transitions between different networks must be carefully crafted to avoid data loss if and when device connections fail.
- Sensitive student data to be transmitted securely between devices.
- Ensure that data is properly encrypted.
- Multi-tiered authentication strategy to access data.
- Have safe controls on access.
- Assign zones of safety significance for security purposes.
- Secure texting.
- A centralized log-in procedure for network-connected devices.
Friday, August 19, 2016
The internet angst of the teacher
As technology evolves to the internet of things, human intervention might take a back seat. Depersonalized, customized, quality standardized, education of a higher order would be the norm. Class rooms may turn obsolete or would be used occasionally just to assure a minimum number of face to face contact hours.
Big data and connectivity and sensors will drive the world.
The role of the teacher will shrink.
Students may welcome reduced lecturer roles as mobile applications or computer screens will not express displeasure of an annoying kind. Students can time and choose interventions of a studying kind at their will and pleasure.
Lecturers in all fields have to be computer engineers to some degree. Teachers who are not technologically proficient will be displaced persons. They have to be tech savvy to survive.
Quality manuals in education have to be technology based. The system must respond efficiently and promptly and without emotions.
Less of teachers, more of infrastructure.
Big data and connectivity and sensors will drive the world.
The role of the teacher will shrink.
Students may welcome reduced lecturer roles as mobile applications or computer screens will not express displeasure of an annoying kind. Students can time and choose interventions of a studying kind at their will and pleasure.
Lecturers in all fields have to be computer engineers to some degree. Teachers who are not technologically proficient will be displaced persons. They have to be tech savvy to survive.
Quality manuals in education have to be technology based. The system must respond efficiently and promptly and without emotions.
Less of teachers, more of infrastructure.
Monday, August 15, 2016
Building Teacher Skills in Emerging Economies-1
There is a worrisome perception among parents and other stakeholders about the
declining quality of school education in emerging economies. This is attributable to numerous factors but the more serious among
faculty is a lack of adequate and contemporary post-entry training or continuous professional updating for teachers.
Poor quality of teachers means children are provided with weak inputs. Student learning is sub-optimal. Teachers may have the basic skills, but not much more. The cost of this failure to meet student needs on monetary and development and psychological angles could be substantial. Thus investing in teachers'human resource development is the single most important challenge.
There is a
learning crisis at hand unless the teachers are adequately trained. There is need for focused attention on
updating professional competences through technological intervention among teachers so that quality delivery of
education is possible.
Steps may include:
- Establish an IT based information system to inventory skills of teachers.
- Estimate demand and supply of skilled workforce in relation to education needs at a macro level and at the granular level.
- Match supply with demand at granular level. Identify deficits and work towards rebuilding teacher competences.
- Leverage modern technology to ensure reaching out to teachers, particularly those needing scaling up in course content.
- Technology to be leveraged for designing and developing tech driven pedagogical techniques.
- An open platform for e-content on skill development of teachers to be aimed at.
- Crowd source content for this platform from among the practitioners and experienced to keep costs low. Affordability has to be ensured.
- High quality content aggregation by an expert team essential prior to release of content.
- Teachers must utilize the contents of this platform through Massive Open Online Courses (MOOC) and virtual classrooms .
- Have teacher innovation hubs at regional and administrative unit levels. Learning has to be simultaneously decentralized.
- The Internet of Things (IoT)—the networked connection of people, process, data, and things—must be exploited to become the Internet of Learning Things.
- The target should be improvements in infrastructure / device availability which make 24/7 connectivity possible for teachers to benefit and for the teachers to use techniques ranging from Cloud Computing to Big Data integration with the IoT
- Ease of delivering content to be ensured.
Note: This is the first of a series on Teacher Skill Building in Emerging Economies by the author.
How will Big Data help educational institutions?
- Students’ voluminous data are easily captured in all its volumes on an ongoing basis.
- Data can be studied for the shortest time frame. Even intra-day analysis is possible. This shortens time to action. Prompt, proactive action is possible.
- Study patterns of students can be documented and examined on a historic basis.
- Predicting Student Performance. Rating them - Which students are slow in tasks assigned? Who are low performers and least performers?
- Drawing up a Risk Matrix for Cohorts.
- LP (Low Performing) student needing help some online help or offsite.
- A student in classroom session or on online learning: Is there disinterestedness, boredom visible? Is there frustration creeping in?
- How often and in what manner do students use educational software? (Blackboard, EBSCO, Turn-it-in, any internal intranet?) When do they really submit; the pattern of submissions.
- What is the inventory of faculty skills?
- Predicting student progression.
- What courses and pedagogical modes attract students?
- Which courses and pedagogical modes deter students?
- Patterns in enrollment.
- Deciphering patterns in student progression.
- Analysis of student dropout ratios and causative factors.
- Student retention trends.
- Predictive models using this type of unconventional data to assess teaching risk.
- Knowing and monitoring the opinion and attitude of the students and stakeholders as opinions, feelings and attitudes about the EI, as discussed on the world wide web.
- Developing a sentiment analysis tool to monitor student reflections.
- Monitoring social platforms and social media websites. Reconnaissance of the social sphere, including social networks, blogs, Facebook and twitter and other relevant sites.
- Leveraging on valuable feedback and insights to improve offerings and services.
- Student profiling to suit personalization.
- Data would reveal the student interests.
- Using student data for cluster analysis
- Student’s propensity towards a certain subject can be measured.
- Data from online usage- from cookies, URL and software metrics – could to identify which online channels the students are using and what they are using them for.
Tuesday, July 21, 2015
Pangs of restructuring in the IT industry?
"Microsoft : $3.2 billion quarterly net loss. "
IBM "revenues dropped for
the 13th consecutive quarter and fell short of analyst expectations."
United Technologies: "cutting its full-year profit
outlook for the third time this year."
(From Various Reuters Reports)
Is it that the tech companies are
experiencing a slow down as an aftermath of global slowdown?
Are technology companies undergoing
the throes of disruptive power?
Are we seeing a withering away of
technological centricity- of tech concentric power?
Are the old 'too big to fail
companies'(TBTF) companies (IBM, Microsoft) set for struggle or lost in the woods of Internet of Things?
Is the IoT driving towards a
restructuring of the internet industry?
What is worrying for the real
world industry is that technology, which is what drives productivity is lagging
behind. If tech companies are under spells of non performance, real companies
taht depend on technology for their throughput cannot be far behind.
Technological innovation must be most focused on the Internet of Industrial Things to keep the growth momentum.
A worrying day for growth
optimists.
Note: This blog offers no investment advice. The views
expressed here are without any risk or responsibility.
Subscribe to:
Posts (Atom)