The futuristic gadgets of science fiction novels and feature films are no longer the wares of, well, fiction --...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
they're coming to a corner store near us.
To clarify: Flying cars and spaceships won't necessarily be a consumer commodity by 2025, but new findings from the Pew Research Center Internet Project suggest the Internet of things (IoT) and wearable tech will heavily influence the IT realm in the next 11 years. Of course, your toddler could likely have told you that without interviewing a single techie.
The Pew survey results, released Wednesday, were collected from 1,606 technology innovators, entrepreneurs, analysts and others in the IT realm over the course of two months. Among the questions posed to respondents online? "As billions of devices, artifacts and accessories are networked; will the Internet of Things have widespread and beneficial effects on the everyday lives of the public by 2025?" Most answered in the affirmative, according to the report.
Survey participants expect wearable tech and IoT to infiltrate all kinds of objects, including the human body, homes and communities, plus the goods and services industries. A small chip under your skin could replace the FitBit you wear on your wrist -- any time now. The technology is here; and so is yet another challenge for CIOs. The potential security risks of wearable tech were on full display in a recent SearchCIO wearables-themed tweet jam during which participants vigorously debated -- in 140 characters or less -- how these new sensorized technologies might create big data challenges, impact customer interactions and produce an analytics overload.
Pew defines IoT as, "A global, immersive, invisible, ambient networked computing environment built through the continued proliferation of smart sensors, cameras, software, databases and massive data centers in a world-spanning information fabric."
Previously on Searchlight
Protests before FCC net neutrality ruling
New Target CIO rebounds from breach
Translation: Get ready for another business disruptor in what's been a crazy few years of disruptive technologies. For some IT executives, the writing is already on the wall. James Madden, associate vice president of IT and enterprise architecture for American Family Insurance (AFI), acknowledges that the IoT connected car is disrupting his industry, putting the future of insurance -- and AFI's current business model -- in question. You can read all about it in our latest CIO Innovator profile. In other news this week:
- Speculation about the net neutrality proposal drafted by FCC chairman Tom Wheeler ended Thursday, when the FCC approved rules that allow for paid priority on Internet. Cue the public protest.
- Out goes Jill Abramson and in comes Dean Baquet as executive editor at The New York Times. Arthur O. Sulzberger Jr., publisher and chairman the paper, made this announcement Wednesday to a dumbfounded newsroom -- suggesting that "an issue with management in the newsroom" motivated the change. But we're not here to point you to newsroom politics or personalities. One of Baquet's biggest challenges, according to an internal study at the Times, will be making sure the paper does a better job at implementing a digital strategy. "The pace of change in our industry demands that we move faster," the report said.
- Way back in December 2012, the FCC announced that AT&T, Verizon, Sprint and T-Mobile had signed off on a "text 911" plan. The program started rolling out in 2013, but a US-wide launch wasn't expected until May 15, 2014. Ok, so the program isn't available everywhere yet, but the FCC has proposed rules that would require all covered text providers to support text-to-911 by December 31, 2014. Nevertheless, even where text-to-911 is available, the FCC stressed that emergency callers, "continue to contact 911 by making a voice call if they can and use text only if voice is not a feasible or safe option."
- Enough about the FCC. In security and hacktivism news, point-and-click steganography has made its way into 140-character tweets. Since the B.C. era, human society has used steganography to hide secret text, images, or messages inside another text, image, or message. Fast forward to the 21st century! This generator created by New Zealand-based developer Matthew Holloway brings steganography to the Twitter-sphere.
Let us know what you think about the story; email Emily McLaughlin, associate site editor.
Dig Deeper on Enterprise business intelligence software
Emily McLaughlin asks:
What is your biggest concern when it comes to the future of the Internet of Things?
5 ResponsesJoin the Discussion