Outside the (Shoe) Box Internet of Things Thinking!

Posted on 30th March 2015 in design, Internet of Things, retail, strategy, wearables

Could someone please forward this to Carrie Bradshaw? I don’t think she reads this blog, but she’d definitely be interested!

I’ve got to confess that I’m usually oblivious to the world of fashion — or appalled by it (there’s a current ad by Gucci in one of my wife’s magazines that frankly scares me: not sure which looks more weird: the emaciated, heavily-made-up model or the dress!), but this one caught my eye as a way women can have a more versatile wardrobe that takes up less space and saves them money!  Neat, huh?

Equally important, it may be the precursor of a wide range of mass-customized Internet of Things devices of all types that are more personal, create new revenue streams, and provide valuable feedback to the manufacturer on customer tastes.

Ishuu, a Lithuanian startup, is creating a new line of très stylish women’s shoes, Volvorii, that include a strip of e-ink material (similar to a Kindle screen) that can be customized by the owner simply by opening an app on her phone! The requisite electronics are housed in the heels.

As of this writing, the Volvorii Indegogo campaign has raised $34,000 of its $50,000 target, with 14 days to go. If I didn’t send every spare dollar to Loyola University – Maryland for my son’s tuition, I think I’d drop a few on this one: it really intrigues me!

If Ishuu is smart, I’d suggest that they throw open the API for the shoes, and allow bright young fashion design students to submit new designs for the insert.

As for those IoT-based products that are more personal, create new revenue streams, and provide valuable feedback to the manufacturer on customer tastes, here are a few more exciting examples to get you noodling about how you might redesign your own products to capitalize on this potential:

What I love about this as a consumer is that we will no longer have to make difficult binary choices between products: instead of either/or, it will be this/and this (in the case of the Watch and these shoes, I love that there will be so many choices that you’ll be able to change your choice on the fly depending on your mood or other factors.  I’m going to choose toe-tapping Mickey when I’m with my grandchildren, the Utility to keep track of biz during the day, and the Simple for more dignified evening wear.

These fall into my What Can You Do Now That You Couldn’t Do Before category. It’s going to take us a while to ditch our old, more limited mindsets, but the rest will be better for everyone.

comments: Comments Off on Outside the (Shoe) Box Internet of Things Thinking! tags: , , , , , , , ,

Smart Aging: Kanega watch for seniors Kickstarter campaign ends today

“Independence with Dignity” is the motto for Jean Anne Booth’s Kanega Watch, which is in the last day of its Kickstarter campaign.

I’m not crazy about it, but in general I like what you see, and hope you get on board.  It addresses three major concerns for the elderly:

Kanega watchlike what I see, and hope you’ll get on board!  It’s designed to deal with three critical aging concerns:

  • falls
  • medication reminders
  • wandering.

I met the woman behind it at a conference in Boston last Summer, and even though the prototype at that point looked very unappealing, this looks more promising.

I’m in the process of creating a list of 10 objective criteria for evaluating devices and apps that fit with my “Smart Aging” paradigm shift, which combines Quantified Self devices to encourage healthy habits and change your relationship with your doctor into a partnership, and smart home devices, which make it easier to manage your home when elderly, so you can “age in place.”  Here’s how it stacks up against my criteria (which, BTW, are still in development — comments welcomed). Bear in mind that I haven’t seen current prototype, and the site doesn’t answer all of my questions. :

Is it easy to use?

  1. Does it give you a choice of ways to interact, such as voice, text or email?
  2. Does it give you reminders?
  3. Is it easy for you to program, or allow someone else to do it remotely?
  4. Does it have a large display and controls?
  5. Is it intuitive?
  6. Does it require professional installation?
  7. Is it flexible: can it be adjusted? Is it single purpose, or does it allow other devices to plug in and create synergies?

YES: voice-activated, rather than requiring buttons. No programming.


Does it protect privacy & security?

  1. Is storage local vs. cloud or company’s servers? Is data encrypted? Anomized?
  2. Do you feel creepy using it?
  3. Does it protect against exploitation by scam artists (such as identifying callers)?
  4. Is it password-protected?
  5. Is security “baked in” or an afterthought?

NO CLUE.


Does it complicate your life, or simplify it?

YES: doesn’t require a smartphone to function, and is voice-activated rather than using buttons.

Does it protect privacy and security?

NO CLUE.

 

Is it affordable?

  1. Are there monthly fees? If so, low or high?
  2. Is there major upfront cost?
  3. Does full functioning require accessories?

IFFY: You can get one by contributing $279 to the Kickstarter campaign. If that’s the retail price, it’s a little pricey, but lower than the Apple Watch base, $349, and probably a good price considering the value added services . Didn’t see anything about a monthly fee for the fall reporting & response service.

Does it stigmatize and/or condescend?

  1. Is it stylish, or does the design” shout” that it’s for seniors?
  2. Is the operation or design babyish?
  3. Would younger people use it?

NO: it doesn’t have a stigmatizing button, & uses a familiar form factor (watch).

Does it use open or proprietary standards?

NO CLUE.

 

Is the information shareable if you choose to do so?

NO CLUE.

 

Can you learn something from it to improve your life and empower yourself?

  1. For example, does health data encourage you to exercise more, or eat better?

NO: doesn’t give you feedback, measure your activity, etc.

Does it help you do something you couldn’t do before?

  1. Does it create a new range of services that were simply impossible with past technologies?

YES: The wandering alert (offers directions home) is new. Otherwise, just does some things such as medication alerts and calling for help that other devices have done.

Is it sturdy?

YES.

 

Does it have “loveability” (i.e., connect with the user emotionally)?

(This term was coined by David Rose in Enchanted Objects, and refers to products that are adorable or otherwise bond with the user)

YES: it has a Siri-like voice, which you can name, which gives reminders about taking meds and gives you directions home if you wander.
I’d give it about a 5 out of 10: I wouldn’t call this a must have — I’d like a little more of a multi-purpose tool that combines smart home and Quantified Self functions — like the Apple Watch (again, disclaimer that I work part time at Apple Store — but don’t have any proprietary info.) The watch is a little too clunky looking for me (prefer the Jony Ive-aesthetics of the Apple Watch), but it looks promising — and doesn’t require coupling to a smartphone, which is befuddling to a lot of seniors.

Kickstarter backers will begin receiving their Kanega watches in February 2016, with general market availability in summer 2016. The site doesn’t say anything about price.

Only a few hours left to join the Kickstarter campaign!


Yeah, I couldn’t figure out the names either. Turns out it’s from Cherokee: “Unalii” is “friend”, and “Kanega” is “speak.”  You learn something every day….

comments: Comments Off on Smart Aging: Kanega watch for seniors Kickstarter campaign ends today tags: , , , , ,

et. al.: Meerkat crucial tool for terrorism & disaster response

Posted on 22nd March 2015 in et. al.

This is outside the normal scope of this blog, but so important I thought I needed to mention it.

Those with a long memory may remember that, in a prior incarnation, I pioneered using a combination of social media and mobile devices for terrorism and disaster response: releasing the Terrorism Survival Kit 12 years ago this week (!) (for “Palm OS and Microsoft PocketPC 2002 — LOL!) and in July 2006 I was user #265 for a new app called “Twitter” (see my very dated 2007 YouTube video about this app, which I said was “primarily used by kids!”).

I recognized instantly that the combination of 1) real-time and 2) location-based information could make Twitter an absolutely go-to a

Meerkat real-time video app

pp for spreading information about a terrorism attack or natural disaster. Countless disasters and terror attacks later, my prediction is now accepted fact.

I later rhapsodized about Twitvid and other apps that allowed you to also share video clips, for the same reason. However, the drawback with them was that you could only share  videos you’d prerecorded.

So, I was blown away to learn about this year’s SXSW phenom, Meerkat, which now allows you to stream live videos over Twitter.

When I talk about the role of individuals and social media in disasters I always like to talk about how actor James Woods might have prevented 9/11 if there’d only been 21st century reporting technologies (he flew with several of the bad guys in an apparent rehearsal, thought something was up because of their strange behavior, and reported them to the flight crew, but officials didn’t follow up). Think what might happen if you or I happened to be the person who saw something suspicious and used our camera to record and report it — as it happened?

A video of a disaster with the #SMEM (Social Media in Emergency Management) hashtag could be a critical tool in alerting both the public and officials.  I’ll always remember the District of Columbia’s assistant fire chief, at a Monterey conference where I spoke on this issue saying that, despite the incredible sophistication of the DC region’s emergency communications network, he’d first heard about the Holocaust Museum shootings from his daughter, who saw a Tweet about it. That incident made him a believer!

There is a major problem: taking a page from Snapchat, “the video is ephemeral, meaning it cannot be watched back and disappears once recording stops. A copy is stored on the recording phone which in theory could be uploaded elsewhere, but it won’t be seen on Meerkat again.”

Of course there’s also the critical question of whether the video was fabricated, and whether crowdsourcing might also run amok in this case, as they did in the improper identification of the Marathon bombers.  I’m definitely not saying that Meerkat videos should be THE way to document breaking news, but I do think that it bears consideration as one of many tools we need to have available in fast-paced and volatile situations.

What do you think?

comments: Comments Off on et. al.: Meerkat crucial tool for terrorism & disaster response tags: , , , , ,

The Internet of Things’ Essential Truths

I’ve been writing about what I call the Internet of Things’ “Essential Truths” for three years now, and decided the time was long overview to codify them and present them in a single post to make them easy to refer to.

As I’ve said, the IoT really will bring about a total paradigm shift, because, for the the first time, it will be possible for everyone who needs it to share real-time information instantly. That really does change everything, obliterating the “Collective Blindness” that has hampered both daily operations and long-term strategy in the past. As a result, we must rethink a wide range of management shibboleths (OK, OK, that was gratuitous, but I’ve always wanted to use the word, and it seemed relevant here, LOL):

  1. First, we must share data. Tesla leads the way with its patent sharing. In the past, proprietary knowledge led to wealth: your win was my loss. Now, we must automatically ask “who else can use this information?” and, even in the case of competitors, “can we mutually profit from sharing this information?” Closed systems and proprietary standards are the biggest obstacle to the IoT.
  2. Second, we must use the Internet of Things to empower workers. With the IoT, it is technically possible for everyone who could do their job better because of access to real-time information to share it instantly, so management must begin with a new premise: information should be shared with the entire workforce. Limiting access must be justified.
  3. Third, we must close the loop. We must redesign our data management processes to capitalize on new information, creating continuous feedback loops.
  4. Fourth, we must rethink products’ roles. Rolls-Royce jet engines feed back a constant stream of real-time data on their operations. Real-time field data lets companies have a sustained dialogue with products and their customers, increasingly allowing them to market products as services, with benefits including new revenue streams.
  5. Fifth, we must develop new skills to listen to products and understand their signals. IBM scientists and medical experts jointly analyzed data from sick preemies’ bassinettes & realized they could diagnose infections a day before there was any visible sign. It’s not enough to have vast data streams: we need to understand them.
  6. Sixth, we must democratize innovation. The wildly-popular IFTTT web site allows anyone to create new “recipes” to exploit unforeseen aspects of IoT products – and doesn’t require any tech skills to use. By sharing IoT data, we empower everyone who has access to develop new ways to capitalize on that data, speading the IoT’s development.
  7. Seventh, and perhaps most important, we must take privacy and security seriously. What responsible parent would put an IoT baby monitor in their baby’s room after the highly-publicized incident when a hacker exploited the manufacturer’s disregard for privacy and spewed a string of obscenities at the baby? Unless everyone in the field takes privacy and security seriously, the public may lose faith in the IoT.

There you have ’em: my best analysis of how the Internet of Things will require a revolution not just in technology, but also management strategy and practices. What do you think?

Remember: The IoT Is Primarily About Small Data, Not Big

Posted on 16th March 2015 in data, Internet of Things, M2M, management, manufacturing, open data

In one of my fav examples of how the IoT can actually save lives, sensors on only eight preemies’ incubators at Toronto’s Hospital for Sick Children yield an eye-popping 90 million data points a day!  If all 90 million data points get relayed on to the “data pool,” the docs would be drowning in data, not saving sick preemies.

Enter “small data.”

Writing in Forbes, Mike Kavis has a worthwhile reminder that the essence of much of the Internet of Things isn’t big data, but small. By that, he means:

a dataset that contains very specific attributes. Small data is used to determine current states and conditions  or may be generated by analyzing larger data sets.

“When we talk about smart devices being deployed on wind turbines, small packages, on valves and pipes, or attached to drones, we are talking about collecting small datasets. Small data tell us about location, temperature, wetness, pressure, vibration, or even whether an item has been opened or not. Sensors give us small datasets in real time that we ingest into big data sets which provide a historical view.”

Usually, instead of aggregating  ALL of the data from all of the sensors (think about what that would mean for GE’s Durathon battery plant, where 10,000 sensors dot the assembly line!), the data is originally analyzed at “the edge,” i.e., at or near the point where the data is collected. Then only the data that deviates from the norm (i.e., is significant)  is passed on to to the centralized data bases and processing.  That’s why I’m so excited about Egburt, and its “fog computing” sensors.

As with sooo many aspects of the IoT, it’s the real-time aspect of small data that makes it so valuable, and so different from past practices, where much of the potential was never collected at all, or, if it was, was only collected, analyzed and acted upon historically. Hence, the “Collective Blindness” that I’ve written about before, which limited our decision-making abilities in the past. Again, Kavis:

“Small data can trigger events based on what is happening now. Those events can be merged with behavioral or trending information derived from machine learning algorithms run against big data datasets.”

As examples of the interplay of small and large data, he cites:

  • real-time data from wind turbines that is used immediately to adjust the blades for maximum efficiency. The relevant data is then passed along to the data lake, “..where machine-learning algorithms begin to understand patterns. These patterns can reveal performance of certain mechanisms based on their historical maintenance record, like how wind and weather conditions effect wear and tear on various components, and what the life expectancy is of a particular part.”
  • medicine containers with smart labels. “Small data can be used to determine where the medicine is located, its remaining shelf life, if the seal of the bottle has been broken, and the current temperature conditions in an effort to prevent spoilage. Big data can be used to look at this information over time to examine root cause analysis of why drugs are expiring or spoiling. Is it due to a certain shipping company or a certain retailer? Are there re-occurring patterns that can point to problems in the supply chain that can help determine how to minimize these events?”

Big data is often irrelevant in IoT systems’ functioning: all that’s needed is the real-time small data to trigger an action:

“In many instances, knowing the current state of a handful of attributes is all that is required to trigger a desired event. Are the patient’s blood sugar levels too high? Are the containers in the refrigerated truck at the optimal temperature? Does the soil have the right mixture of nutrients? Is the valve leaking?”

In a future post, I’ll address the growing role of data scientists in the IoT — and the need to educate workers on all levels on how to deal effectively with data. For now, just remember that E.F. Schumacher was right: “small is beautiful.”

 

comments: Comments Off on Remember: The IoT Is Primarily About Small Data, Not Big tags: , , , , , , , , ,

Apple ResearchKit will launch medical research paradigm shift to crowd-sourcing

Amidst the hoopla about the new MacBook and much-anticipated Apple Watch, Apple snuck something into Monday’s event that blew me away (obligatory disclaimer: I work part-time at The Apple Store, but the opinions expressed here are mine).

My Heart Counts app

Four years after I proselytized about the virtues of democratizing data in my Data Dynamite: how liberating data will transform our world book (BTW: pardon the hubris, but I still think it’s the best thing out there about the attitudinal shift needed to capitalize on sharing data), I was so excited to learn about the new ResearchKit.

Tag line? “Now everybody can do their part to advance medical research.”

The other new announcements might improve your quality of life. This one might save it!

As Senior VP of Operations Jeff Williams said in announcing the kit,  the process of medical research ” ..hasn’t changed in decades.” That’s not really true: as I wrote in my book, the Quantified Self movement has been sharing data for several years, as well as groups such as CureTogether and PatientsLikeMe. However, what is definitely true is that no one has harnessed the incredible power of the smartphone for this common goal until now, and that’s really incredible. It’s a great example of my IoT Essential Truth of asking “who else could use this data?

A range of factors cast a pall over traditional medical research.

Researchers have had to cast a broad net even to get 50-100 volunteers for a clinical trial (and may have to pay them, to boot, placing the results validity when applied to the general population in doubt).  The data has often been subjective (in the example Williams mentioned, Parkinson’s patients are classified by a doctor simply on the basis of walking a few feet). Also, communication about the project has been almost exclusively one way, from the researcher to the patient, and limited, at best.

What if, instead, you just had to turn on your phone and open a simple app to participate? As the website says, “Each one [smartphone] is equipped with powerful processors and advanced sensors that can track movement, take measurements, and record information — functions that are perfect for medical studies.” Suddenly research can be worldwide, and involve millions of diverse participants, increasing the data’s amount and validity (There’s a crowdsourcing research precedent: lot of us have been participating in scientific crowdsourcing for almost 20 years, by installing the SETI@Home software that runs in the background on our computers, analyzing data from deep space to see if ET is trying to check in)!

Polymath/medical data guru John Halamka, MD wrote me that:

“Enabling patients to donate data for clinical research will accelerate the ‘learning healthcare system’ envisioned by the Institute of Medicine.   I look forward to testing out Research Kit myself!”

The new apps developed using ResearchKit harvest information from the Health app that Apple introduced as part of iOS8. According to Apple:

“When granted permission by the user, apps can access data from the Health app such as weight, blood pressure, glucose levels and asthma inhaler use, which are measured by third-party devices and apps…. ResearchKit can also request from a user, access to the accelerometer, microphone, gyroscope and GPS sensors in iPhone to gain insight into a patient’s gait, motor impairment, fitness, speech and memory.

Apple announced that it has already collaborated with some of the world’s most prestigious medical institutions, including Mass General, Dana-Farber, Stanford Medical, Cornell and many others, to develop apps using ResearchKit. The first five apps target asthma, breast cancer, cardiovascular disease, diabetes and Parkinson’s disease.  My favorite, because it affects the largest number of people, is the My Heart Counts one. It uses the iPhone’s built-in motion sensors to track participants’ activity, collecting data during a 6-minute walk test from those who are able to walk that long. If participants also have a wearable activity device connecting with the Health app (aside: still don’t know why my Jawbone UP data doesn’t flow to the Health app, even though I made the link) , they are encouraged to use that as well. Participants will also enter data about their heart disease risk factors and their lab tests readings to get feedback on their chances of developing heart disease and their “heart age.” Imagine the treasure trove of cardiac data it will yield!

 A critical aspect of why I think ResearchKit will be have a significant impact is that Apple decided t0 make it open source, so that anyone can tinker with the code and improve it (aside: has Apple EVER made ANYTHING open source? Doubt it! That alone is noteworthy).  Also, it’s important to note, in light of the extreme sensitivity of any personal health data, that Apple guarantees that it will not have access to any of the personal data.

Because of my preoccupation with “Smart Aging,” I’m really interested in whether any researchers will specifically target seniors with ResearchKit apps. I’ll be watching carefully when the Apple Watch comes out April 24th to see if seniors buy them (not terribly optimistic, I must admit, because of both the cost and the large number of seniors I help at The Apple Store who are befuddled by even Apple’s user-friendly technology) because the watch is a familiar form factor for them (I haven’t worn a watch since I got my first cell phone, and most young people I know have never had one) and might be willing to use them to participate in these projects.

N0w, if you’ll excuse me, I just downloaded the My Heart Counts app, and must find out my “heart age!”


 

Doh!  Just after I posted this, I saw a really important post on Ars Technica pointing out that this brave new world of medical research won’t go anywhere unless the FDA approves:

“As much as Silicon Valley likes to think of itself as a force for good, disrupting this and pivoting that, it sometimes forgets that there’s a wider world out there. And when it comes to using devices in the practice of medicine, that world contains three very important letters: FDA. That’s right, the US Food and Drug Administration, which Congress has empowered to regulate the marketing and research uses of medical devices.

“Oddly, not once in any of the announcement of ResearchKit did we see mention of premarket approval, 510k submission, or even investigational device exemptions. Which is odd, because several of the uses touted in the announcement aren’t going to be possible without getting the FDA to say yes.”

I remember reading that Apple had reached out to the FDA during development of the Apple Watch, so I’m sure none of this comes as a surprise to them, and any medical researcher worth his or her salt is also aware of that factor. However, the FDA is definitely going to have a role in this issue going forward, and that’s as it should be — as I’ve said before, with any aspect of the IoT, privacy and security is Job One.

 

 

FTC report provides good checklist to design in IoT security and privacy

FTC report on IoT

FTC report on IoT

SEC Chair Edith Ramirez has been pretty clear that the FTC plans to look closely at the IoT and takes IoT security and privacy seriously: most famously by fining IoT marketer TrendNet for non-existent security with its nanny cam.

Companies that want to avoid such actions — and avoid undermining fragile public trust in their products and the IoT as a whole — would do well to clip and refer to this checklist that I’ve prepared based on the recent FTC Report, Privacy and Security in a Connected World, compiled based on a workshop they held in 2013, and highlighting best practices that were shared at the workshop.

  1. Most important, “companies should build security into their devices at the outset, rather than as an afterthought.” I’ve referred before to the bright young things at the Wearables + Things conference who used their startup status as an excuse for deferring security and privacy until a later date. WRONG: both must be a priority from Day One.

  2. Conduct a privacy or security risk assessment during design phase.

  3. Minimize the data you collect and retain.  This is a tough one, because there’s always that chance that some retained data may be mashed up with some other data in future, yielding a dazzling insight that could help company and customer alike, BUT the more data just floating out there in “data lake” the more chance it will be misused.

  4. Test your security measures before launching your products. … then test them again…

  5. “..train all employees about good security, and ensure that security issues are addressed at the appropriate level of responsibility within the organization.” This one is sooo important and so often overlooked: how many times have we found that someone far down the corporate ladder has been at fault in a data breach because s/he wasn’t adequately trained and/or empowered?  Privacy and security are everyone’s job.

  6. “.. retain service providers that are capable of maintaining reasonable security and provide reasonable oversight for these service providers.”

  7. ‘… when companies identify significant risks within their systems, they should implement a defense-in -depth approach, in which they consider implementing security measures at several levels.”

  8. “… consider implementing reasonable access control measures to limit the ability of an unauthorized person to access a consumer’s device, data, or even the consumer’s network.” Don’t forget: with the Target data breach, the bad guys got access to the corporate data through a local HVAC dealer. Everything’s linked — for better or worse!

  9. “.. companies should continue to monitor products throughout the life cycle and, to the extent feasible, patch known vulnerabilities.”  Privacy and security are moving targets, and require constant vigilance.

  10. Avoid enabling unauthorized access and misuse of personal information.

  11. Don’t facilitate attacks on other systems. The very strength of the IoT in creating linkages and synergies between various data sources can also allow backdoor attacks if one source has poor security.

  12. Don’t create risks to personal safety. If you doubt that’s an issue, look at Ed Markey’s recent report on connected car safety.

  13. Avoid creating a situation where companies might use this data to make credit, insurance, and employment decisions.  That’s the downside of cool tools like Progressive’s “Snapshot,” which can save us safe drivers on premiums: the same data on your actual driving behavior might some day be used become compulsory, and might be used to deny you coverage or increase your premium).

  14. Realize that FTC Fair Information Practice Principles will be extended to IoT. These “FIPPs, ” including “notice, choice, access, accuracy, data minimization, security, and accountability,” have been around for a long time, so it’s understandable the FTC will apply them to the IoT.  Most important ones?  Security, data minimization, notice, and choice.

Not all of these issues will apply to all companies, but it’s better to keep all of them in mind, because your situation may change. I hope you’ll share these guidelines with your entire workforce: they’re all part of the solution — or the problem.

comments: Comments Off on FTC report provides good checklist to design in IoT security and privacy tags: , , , ,
http://www.stephensonstrategies.com/">Stephenson blogs on Internet of Things Internet of Things strategy, breakthroughs and management