It is critical that South African companies taking the first step to the Internet of Things fully explore the possibilities of the technology. This is because the decisions they make now will determine the cost and longevity of the solutions developed in the future, writes ECKART ZOLLNER, Head of Business Development the Jasco Group.
The Internet of Things (IoT) will, as it grows, automate and inform an increasing number of operations, applications and processes. With no dedicated infrastructure in place for IoT – i.e., to send, receive or transport IoT signals – it is critical that first movers in South Africa begin to more fully explore the possibilities. The decisions they make now may well impact the cost and longevity of the solutions they are developing, and help determine the robustness of the foundations the country puts in place for IoT.
In South Africa, IoT presents a huge opportunity in key sectors, but uptake and development of IoT-driven solutions is still low outside of security, vehicle and asset tracking, and point of sale applications. In addition, the capacity to implement change is lacking – simple solutions, such as tracking of dustbin collection and emptying, is slow to happen because organisations battle to put in place the skills and technology processes needed. Clearly, more knowledge and awareness is needed in sectors to keep pace with opportunity – along with a sense of urgency.
IoT is coming. Are you ready?
The slow pace of change in South Africa is likely to change quickly in the next few years as communication capabilities are built into more and more devices, the IoT cloud grows exponentially, and disruptive solutions with better value propositions begin to emerge to oust incumbents in various sectors. Quite simply, customers want better services and cost efficiencies, and IoT-driven applications and solutions offer exactly this.
First movers are already preparing for this future, but they need to focus on more than the development of the IoT solution and the integration of IoT to existing or new processes; they need to now take a careful look at the long-term implications of making use of IoT.
IoT signals vary from a field device sending tiny bits of information every few seconds or minutes, to devices that broadcast a signal every few hours or days. These are tiny bits of data, but for the IoT solution to work, the network that the data is sent along needs to be 100% reliable.
There are few dedicated IoT network solution providers in South Africa. The major telcos all offer their own solutions. But GSM is expensive for IoT, and with high congestion on most networks and limited remote coverage, it’s not nearly as reliable as it needs to be. In addition, GSM is power hungry, requiring more bandwidth to move data. IoT data is characterised by small bursts of a few bytes of data. Thus, using GSM networks, the battery technologies used in field devices, which ideally need to last two to five years or more, are quickly depleted. This will add to the cost of the solution.
Find dedicated IoT network providers
In Europe, the Unite States and elsewhere, dedicated networks with new topologies are being developed for IoT. These networks are geared to low power devices and low volumes of data, and feature a mesh of repeater stations the ensure 100% throughput.
There are some options in South Africa. The globally defined Industrial Scientific and Medical (ISM) band which is also available in South Africa is open for use upon registration but investment in developing such a network is not insignificant. As the IoT data payload is still low, this is not a very lucrative or attractive market yet and there are few players champing at the bit to offer these services.
At present, because network choices are limited, companies offering IoT solutions select their own channel partners and mandate use of these networks. Thus, when customers sign up for the service they may not have a choice of networks. Similarly, organisations developing proprietary solutions are currently making use of whatever network provider solutions they can find, without fully investigating their options or understanding the long term impacts that network choices may impose – in terms of costs and management of devices.
What South Africa needs is a set of reliable dedicated IoT network providers that guarantee data throughput and conform to global standards. With IoT standards developing in China, the US and Europe, it will be important for South Africa to make a choice in terms of standards, not default to the one most commonly used by operators.
Choosing an IoT network provider – top three considerations
Key requirements for companies making use of IoT network providers include the following:
• Be specific in terms of defining requirements and needs
o Is national or defined geographic coverage needed
o How often will data need to be sent and received
o What connect and control specifications are in play
• Ensure the network provider is flexible
o Can they adapt to your IoT application to, for example, easily connect more devices, send more data more or less frequently, improve reporting?
o Do meet and incorporate key IoT standards
• High service levels are critical
o Does the network service provider have a network reserved and dedicated to IoT that offers high stability?
In South Africa, commercial applications of IoT are limited, but the opportunity and advantage that IoT presents across sectors is seeing a number of proprietary solutions emerge. If you are gearing to make use of IoT, consider your options carefully. Be aware of the limitations and challenges and make use of solution providers that are flexible, established and experienced, and demonstrate their understanding of IoT technologies. IoT technology is an emerging field but it’s going to be one that plays a big role in our digital future.
Samsung unfolds the future
At the #Unpacked launch, Samsung delivered the world’s first foldable phone from a major brand. ARTHUR GOLDSTUCK tried it out.
Everything that could be known about the new Samsung Galaxy S10 range, launched on Wednesday in San Francisco, seems to have been known before the event.
Most predictions were spot-on, including those in Gadget (see our preview here), thanks to a series of leaks so large, they competed with the hole an iceberg made in the Titanic.
The big surprise was that there was a big surprise. While it was widely expected that Samsung would announce a foldable phone, few predicted what would emerge from that announcement. About the only thing that was guessed right was the name: Galaxy Fold.
The real surprise was the versatility of the foldable phone, and the fact that units were available at the launch. During the Johannesburg event, at which the San Francisco launch was streamed live, small groups of media took turns to enter a private Fold viewing area where photos were banned, personal phones had to be handed in, and the Fold could be tried out under close supervision.
The first impression is of a compact smartphone with a relatively small screen on the front – it measures 4.6-inches – and a second layer of phone at the back. With a click of a button, the phone folds out to reveal a 7.3-inch inside screen – the equivalent of a mini tablet.
The fold itself is based on a sophisticated hinge design that probably took more engineering than the foldable display. The result is a large screen with no visible seam.
The device introduces the concept of “app continuity”, which means an app can be opened on the front and, in mid-use, if the handset is folded open, continue on the inside from where the user left off on the front. The difference is that the app will the have far more space for viewing or other activity.
Click here to read about the app experience on the inside of the Fold.
Password managers don’t protect you from hackers
Using a password manager to protect yourself online? Research reveals serious weaknesses…
Top password manager products have fundamental flaws that expose the data they are designed to protect, rendering them no more secure than saving passwords in a text file, according to a new study by researchers at Independent Security Evaluators (ISE).
“100 percent of the products that ISE analyzed failed to provide the security to safeguard a user’s passwords as advertised,” says ISE CEO Stephen Bono. “Although password managers provide some utility for storing login/passwords and limit password reuse, these applications are a vulnerable target for the mass collection of this data through malicious hacking campaigns.”
In the new report titled “Under the Hood of Secrets Management,” ISE researchers revealed serious weaknesses with top password managers: 1Password, Dashlane, KeePass and LastPass. ISE examined the underlying functionality of these products on Windows 10 to understand how users’ secrets are stored even when the password manager is locked. More than 60 million individuals 93,000 businesses worldwide rely on password managers. Click here for a copy of the report.
Password managers are marketed as a solution to eliminate the security risks of storing passwords or secrets for applications and browsers in plain text documents. Having previously examined these and other password managers, ISE researchers expected an improved level of security standards preventing malicious credential extraction. Instead ISE found just the opposite.
Click here to read the findings from the report.