Recently I fixed my 12 year-old nephew's xbox with kinect, which is in his bedroom. My parting comment was "Now we can keep an eye on you again". He got a strange look on his face. and then half-smiled, like he wasn't quite sure whether I was kidding or not...
Yeah, I can be a jerk (trust me, he gives as good as he gets) but it is closer to the truth than I am sometimes comfortable with. Read the recent set of leaks about NSA surveillance ( http://arstechnica.com/information-technology/2013/12/inside-the-nsas-leaked-catalog-of-surveillance-magic/ ) devices if you doubt that. Devices do what they can do whether we consider them to be toys, diagnostic devices, or doorstops. I don't think that I am overly paranoid, but I do tend to think about what technology around me might know about me and who can access that information.
I agree. I like it too. I think this so-called "dipole speaker" is inteteresting. I did have a chance to listen to it on the show floor where everything was so noisy...it held up on its own, but of course, I wouldn't know how it really sounds in my quiet living room...
The Parrot drones could be turned into flying botnets based on their slack wireless security. On the other hand, since these are just "toys" it could be excused, at least until someone takes advantage of them.
Some of these "toys" defy the limits of the definition of that term. I don't know if childhood is merely implied or explicitly denoted in the usage of the term "toy," but each of these gadgets and gizmos has an appeal beyond functionality. Or it could be that once something is functional beyond being merely a source of idle pleasure, it loses its toy-ness. Kids are known for appreciating things that have no real use.
My first thought when I saw the DropCam item in this list was "what do they do to secure your video?" I looked over the company website and found no answer. I did find that the software for the system was open source, which left me feeling less secure. Hackers get a leg up when the source code is available (although white hatters also get a leg up and so could beat the black hatters to any vulnerability).
Given what happened with the FTC last year, I would think that the security of information would be something the company would want to make customers understand, but I didn't see anything on it during my look-see. Perhaps the less on will have to be repeated several times before companies offering such intimate monitoring systems learn to make data security a priority.
What are the engineering and design challenges in creating successful IoT devices? These devices are usually small, resource-constrained electronics designed to sense, collect, send, and/or interpret data. Some of the devices need to be smart enough to act upon data in real time, 24/7. Specifically the guests will discuss sensors, security, and lessons from IoT deployments.