A Strategic Company: The Internet of Things & How ARM Fits In

An ARM processor in a Hewlett-Packard PSC-1315 printer.

Britain’s best unknown tech business ARM Holdings is being bought by Japan’s SoftBank on the back of the promise of the Internet of Things (IoT). But what is IoT, and what has a chip designer like ARM got to do with it?

What is the Internet of Things?

The idea behind IoT is to create a home where everything is connected to the internet, creating “swarm intelligence” from individually dumb devices. Bins, toasters, washing machines and lights will be able to talk to each other for automatic, more efficient control and monitoring.

But IoT also describes the use of sensors and smart devices in the wider environment to automate processes and give information to human operators, such as roads that alert drivers to spots of black ice or recycling bins that tell the council when to pick them up.

What sort of things can can you get?

IoT is still in its infancy, but there is a small collection of consumer devices and a few commercial devices that actually link into the wider world.

The best known IoT devices are smart thermostats, such as Nest’s Learning Thermostat, and lighting systems, of which Philips Hue and Lightwave RF are the best known in the UK.

Other devices include electronic locks, home-security cameras, various sensors for temperature, humidity, water, motion and open or close states. Various smart plug sockets are also available that allows users to turn lamps and other non-smart devices on and off remotely.

The internet fridge was always the poster child of IoT, but home appliances are only starting to be available with IoT built in. Smartwashers, driers, dishwashers, bathroom scales, robot vacuum cleaners, fans and, yes, fridges, are starting to come to market that can talk to each other and to the owner.

What can you do with IoT?

Broadly speaking, IoT devices fall into two categories: true consumer devices and DIY automation systems. Smart-thermostats, cameras, scales, gadgets to help you sleep and other devices, which are easy to install and use either in isolation or together with other bits through an app or syncing service, are commonly available through traditional retailers.

But with various sensors and interconnected systems available, much more advanced setups can be built using more specialist equipment and universal protocols such as Z-wave or ZigBee, which allow disparate devices to communicate wirelessly without Wi-Fi or the internet. Almost anything from IoT security systems to automatic lighting, advanced power management and status monitoring, from bins to pantries, can be created, although some need the skills of an electrician and coders.

Who are the big players?

The biggest brands in the consumer IoT space include Samsung, with appliances and its SmartThings IoT hub, Alphabet’s Nest, Google and Amazon, whose IoT Echo speaker – which is capable of commanding other devices via voice – has proved popular in the US.

Behind many of these devices, however, are low-power chip makers and embedded operating system vendors. Google’s Brillo, for instance, is a cut-down version of Android for IoT devices, while low-power processors built using ARM designs are popular because of their electrical efficiency.

What are the challenges facing IoT?

While many connected devices are available to buy, not many of them can actually talk to devices made by other brands, and when they do their interaction is limited. Each device comes with its own smartphone app, rather than there being one to control them all. Companies such as Google, Nest, Apple and Samsung are attempting to provide a bridge between devices, but a unified system is sorely needed.

There is also the challenge of privacy and security. IoT devices that were originally conceived to be used in isolation or within the home without connecting to the internet are now being exposed to the wider world and can be ripe for criminal attack.

If appropriate security measures are not taken, a hacker who gains access to the data flowing around your home could turn the sensors and appliances into snooping devices.

What’s ARM’s link to it?

ARM Holdings is a designer of mobile and low-power chips that can be found in devices such as smartphones, smart TVs, smartwatches, tablets and various other computing devices. These chips can also be found in many of the IoT devices, the servers that connect them to the wider internet and the devices used to control them.

ARM doesn’t actually fabricate the processors, but its designs are used by companies all over the globe, including Apple, Samsung and Qualcomm, and used to drive devices all over the home and in the wider world. As the IoT expands, the demand for low-power chips is only likely to increase.

Guardian

« UK National Crime Agency: Criminals Winning 'Cyber Arms Race'
Malware Targeting Energy Companies »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

RIVA Solutions

RIVA Solutions

RIVA provides innovative best practices in IT and management consulting, program support services and emerging technologies.

Secure Identity Alliance (SIA)

Secure Identity Alliance (SIA)

The Secure Identity Alliance is dedicated to supporting sustainable worldwide economic growth and prosperity through the development of trusted digital identities and the adoption of secure eServices.

Echelon

Echelon

Echelon Company is a provider of information security services specializing in certification of security software and hardware products in Russia.

Evok

Evok

EVOK is an IT Service provider specialized in installing, maintaining and supporting IT infrastructures for SMB's in Switzerland.

Trapezoid

Trapezoid

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure.

Immersive

Immersive

Immersive unifies Cyber Drills, Exercises, Sims, Ranges, and Training into one single, adaptive platform. One Platform. Total Cyber Resilience.

macmon secure

macmon secure

macmon secure develops network security software, focussing on Network Access Control.

ISMS.online

ISMS.online

ISMS.online is a cloud software solution for fast & cost-effective implementation of an information security management system and achieve compliance with ISO 27001 and other standards.

DivvyCloud

DivvyCloud

DivvyCloud protects your cloud and container environments from misconfigurations, policy violations, threats, and IAM challenges.

BI.ZONE

BI.ZONE

BI.ZONE creates high-tech products and solutions to protect IT infrastructures and applications, and provides services from cyber intelligence and proactive defence to cybercrime investigation.

SearchInform

SearchInform

SearchInform is a leading risk management product developer, protecting business and government institutions against data theft, harmful human behavior, compliance breaches and incomplete audit.

Periculus

Periculus

Periculus makes managing digital risk simple. Its integrated platform offers access to purchase cyber insurance and cyber security solutions uniquely tailored to fit the needs of every business.

Prima Cyber Solutions (PCS)

Prima Cyber Solutions (PCS)

Prima Cyber Solutions is focused on protecting your business from the massive and devastating impacts that cyber-attacks may cause.

Liminal

Liminal

Liminal is a boutique strategy advisory firm serving digital identity, fintech, and cybersecurity clients, and the private equity / venture capital community.

360 Advanced

360 Advanced

360 Advanced is a relationship-focused cybersecurity and compliance firm offering integrated compliance solutions customized to meet your business’ needs.

Redinent Innovations

Redinent Innovations

Redinent is a cutting-edge IoT Security platform that offers precise security posture analysis and delivers actionable intelligence, empowering businesses to operate with unrivaled resilience.