I am so glad that the 2014 CES is over!
I’m tired of seeing my RSS feed pile filled with articles touting the wonderful Jetson’s-like world where everything will be networked together chatting away to make my life “better”.
…and Google buying Nest and the potential in-home data leakage it may bring out in our homes. But then good points (on both sides) have already been made on the topic.
And so the GSD Curmudgeon dumps these links for those crazy kids running rough-shod all over my carefully groomed IT yard this month.
- The Internet of Crap - Robert X. Cringely at BetaNews
- Cisco Keynote Highlights from CES 2014 - YouTube
- The Internet of Things: Dr. John Barrett at TEDxCIT - YouTube (like back a lifetime ago in 2012).
- TEDxWarwick - Andy Stanford-Clark - Innovation Begins at Home - YouTube
- Google begins its home invasion - BetaNews
- Why we fear Google - iMore
- Product Management and the Internet of Things - MindTheProduct
- The Internet Of Things Has Been Hacked, And It's Turning Nasty – ReadWrite
- “The Internet Of Things” Means Your Smart Refrigerator Could Launch Cyber Attacks – Consumerist
- You bought it, you own it, right? - Boing Boing
- Is your refrigerator really part of a massive spam-sending botnet? - Ars Technica
- Your refrigerator probably hasn't joined a botnet - Boing Boing
- Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests - YouTube (again, warnings from 2012).
Almost enough to generate a paradigm shift for some folks…just not in the direction you think:
- This Is How And Why The Amish Live Off The Grid - MakeUseOf blog
As a sociology major, I’m curious to see how as technology merges and our “life-experience” becomes even more interconnected, if there won’t be a measurable trend in the number of persons and families seeking alternative shelter and community in other non-traditional technology eschewing (or limiting) religious groups.
As a sysadmin, I’m curious to see how security technology and practices will rise to meet the interconnected new product world for our protection and data leakage control.
Claus V.
No comments:
Post a Comment