A Strategic Company: The Internet of Things & How ARM Fits In

An ARM processor in a Hewlett-Packard PSC-1315 printer.

Britain’s best unknown tech business ARM Holdings is being bought by Japan’s SoftBank on the back of the promise of the Internet of Things (IoT). But what is IoT, and what has a chip designer like ARM got to do with it?

What is the Internet of Things?

The idea behind IoT is to create a home where everything is connected to the internet, creating “swarm intelligence” from individually dumb devices. Bins, toasters, washing machines and lights will be able to talk to each other for automatic, more efficient control and monitoring.

But IoT also describes the use of sensors and smart devices in the wider environment to automate processes and give information to human operators, such as roads that alert drivers to spots of black ice or recycling bins that tell the council when to pick them up.

What sort of things can can you get?

IoT is still in its infancy, but there is a small collection of consumer devices and a few commercial devices that actually link into the wider world.

The best known IoT devices are smart thermostats, such as Nest’s Learning Thermostat, and lighting systems, of which Philips Hue and Lightwave RF are the best known in the UK.

Other devices include electronic locks, home-security cameras, various sensors for temperature, humidity, water, motion and open or close states. Various smart plug sockets are also available that allows users to turn lamps and other non-smart devices on and off remotely.

The internet fridge was always the poster child of IoT, but home appliances are only starting to be available with IoT built in. Smartwashers, driers, dishwashers, bathroom scales, robot vacuum cleaners, fans and, yes, fridges, are starting to come to market that can talk to each other and to the owner.

What can you do with IoT?

Broadly speaking, IoT devices fall into two categories: true consumer devices and DIY automation systems. Smart-thermostats, cameras, scales, gadgets to help you sleep and other devices, which are easy to install and use either in isolation or together with other bits through an app or syncing service, are commonly available through traditional retailers.

But with various sensors and interconnected systems available, much more advanced setups can be built using more specialist equipment and universal protocols such as Z-wave or ZigBee, which allow disparate devices to communicate wirelessly without Wi-Fi or the internet. Almost anything from IoT security systems to automatic lighting, advanced power management and status monitoring, from bins to pantries, can be created, although some need the skills of an electrician and coders.

Who are the big players?

The biggest brands in the consumer IoT space include Samsung, with appliances and its SmartThings IoT hub, Alphabet’s Nest, Google and Amazon, whose IoT Echo speaker – which is capable of commanding other devices via voice – has proved popular in the US.

Behind many of these devices, however, are low-power chip makers and embedded operating system vendors. Google’s Brillo, for instance, is a cut-down version of Android for IoT devices, while low-power processors built using ARM designs are popular because of their electrical efficiency.

What are the challenges facing IoT?

While many connected devices are available to buy, not many of them can actually talk to devices made by other brands, and when they do their interaction is limited. Each device comes with its own smartphone app, rather than there being one to control them all. Companies such as Google, Nest, Apple and Samsung are attempting to provide a bridge between devices, but a unified system is sorely needed.

There is also the challenge of privacy and security. IoT devices that were originally conceived to be used in isolation or within the home without connecting to the internet are now being exposed to the wider world and can be ripe for criminal attack.

If appropriate security measures are not taken, a hacker who gains access to the data flowing around your home could turn the sensors and appliances into snooping devices.

What’s ARM’s link to it?

ARM Holdings is a designer of mobile and low-power chips that can be found in devices such as smartphones, smart TVs, smartwatches, tablets and various other computing devices. These chips can also be found in many of the IoT devices, the servers that connect them to the wider internet and the devices used to control them.

ARM doesn’t actually fabricate the processors, but its designs are used by companies all over the globe, including Apple, Samsung and Qualcomm, and used to drive devices all over the home and in the wider world. As the IoT expands, the demand for low-power chips is only likely to increase.

Guardian

« UK National Crime Agency: Criminals Winning 'Cyber Arms Race'
Malware Targeting Energy Companies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cybraics

Cybraics

Cybraics nLighten platform implements a unique and sophisticated artificial intelligence engine that rapidly learns your environment and alerts security teams to threats and vulnerabilities.

QA

QA

QA is a leading IT training provider in the UK with over 1,500 courses covering all areas of IT including Cyber Security.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

Tata Consultancy Services

Tata Consultancy Services

Tata Consultancy Services is a global leader in IT services, consulting & business solutions including cyber security.

Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute focuses on understanding, empowering and taking action across four critical areas driving continual improvement toward a safer, more secure cyber world.

Take Five

Take Five

Take Five is a national campaign offering straight-forward, impartial advice that helps prevent email, phone-based and online fraud – particularly where criminals impersonate trusted organisations.

Stone Forest IT (SFIT)

Stone Forest IT (SFIT)

Stone Forest IT specialises in providing advisory, implementation and managed services for IT infrastructure, IT security solutions, business applications (ERP and CRM) and business analytical tools.

CACI International

CACI International

CACI is at the forefront of developing and delivering technological breakthroughs that transform and optimize government operations.

WhizHack Technologies

WhizHack Technologies

WhizHack's mission is to not only create a pipeline of cyber security products but also to empower people to sustainable innovation in securing digital assets of tomorrow.

Lupovis

Lupovis

Lupovis is an AI-based deception solution that deploys active decoys turning your network from a flock of sheep to a pack of wolves where the hunter becomes the hunted.

DartPoints

DartPoints

DartPoints helps bridge the digital divide by delivering cloud, colocation, managed services + edge infrastructure.

Identity Digital

Identity Digital

Identity Digital simplifies and connects a fragmented online world with domain names and related technologies that allow people and businesses to build, market and own their digital identities.

KATIM

KATIM

KATIM is a leader in the development of innovative secure communication products and solutions for governments and businesses.

Three Wire Systems

Three Wire Systems

Three Wire is a leader in innovative and efficient technology solutions for government agencies and large enterprise corporations.

Nuke From Orbit

Nuke From Orbit

Nuke's mission is to put you back in control of your digital identity when your smartphone gets stolen.

ArmorX AI

ArmorX AI

ArmorX AI (formerly Kapalya) operates an encryption management platform designed to encrypt all data in transit and at rest on mobile end-points, corporate servers, and cloud servers.