A Strategic Company: The Internet of Things & How ARM Fits In

An ARM processor in a Hewlett-Packard PSC-1315 printer.

Britain’s best unknown tech business ARM Holdings is being bought by Japan’s SoftBank on the back of the promise of the Internet of Things (IoT). But what is IoT, and what has a chip designer like ARM got to do with it?

What is the Internet of Things?

The idea behind IoT is to create a home where everything is connected to the internet, creating “swarm intelligence” from individually dumb devices. Bins, toasters, washing machines and lights will be able to talk to each other for automatic, more efficient control and monitoring.

But IoT also describes the use of sensors and smart devices in the wider environment to automate processes and give information to human operators, such as roads that alert drivers to spots of black ice or recycling bins that tell the council when to pick them up.

What sort of things can can you get?

IoT is still in its infancy, but there is a small collection of consumer devices and a few commercial devices that actually link into the wider world.

The best known IoT devices are smart thermostats, such as Nest’s Learning Thermostat, and lighting systems, of which Philips Hue and Lightwave RF are the best known in the UK.

Other devices include electronic locks, home-security cameras, various sensors for temperature, humidity, water, motion and open or close states. Various smart plug sockets are also available that allows users to turn lamps and other non-smart devices on and off remotely.

The internet fridge was always the poster child of IoT, but home appliances are only starting to be available with IoT built in. Smartwashers, driers, dishwashers, bathroom scales, robot vacuum cleaners, fans and, yes, fridges, are starting to come to market that can talk to each other and to the owner.

What can you do with IoT?

Broadly speaking, IoT devices fall into two categories: true consumer devices and DIY automation systems. Smart-thermostats, cameras, scales, gadgets to help you sleep and other devices, which are easy to install and use either in isolation or together with other bits through an app or syncing service, are commonly available through traditional retailers.

But with various sensors and interconnected systems available, much more advanced setups can be built using more specialist equipment and universal protocols such as Z-wave or ZigBee, which allow disparate devices to communicate wirelessly without Wi-Fi or the internet. Almost anything from IoT security systems to automatic lighting, advanced power management and status monitoring, from bins to pantries, can be created, although some need the skills of an electrician and coders.

Who are the big players?

The biggest brands in the consumer IoT space include Samsung, with appliances and its SmartThings IoT hub, Alphabet’s Nest, Google and Amazon, whose IoT Echo speaker – which is capable of commanding other devices via voice – has proved popular in the US.

Behind many of these devices, however, are low-power chip makers and embedded operating system vendors. Google’s Brillo, for instance, is a cut-down version of Android for IoT devices, while low-power processors built using ARM designs are popular because of their electrical efficiency.

What are the challenges facing IoT?

While many connected devices are available to buy, not many of them can actually talk to devices made by other brands, and when they do their interaction is limited. Each device comes with its own smartphone app, rather than there being one to control them all. Companies such as Google, Nest, Apple and Samsung are attempting to provide a bridge between devices, but a unified system is sorely needed.

There is also the challenge of privacy and security. IoT devices that were originally conceived to be used in isolation or within the home without connecting to the internet are now being exposed to the wider world and can be ripe for criminal attack.

If appropriate security measures are not taken, a hacker who gains access to the data flowing around your home could turn the sensors and appliances into snooping devices.

What’s ARM’s link to it?

ARM Holdings is a designer of mobile and low-power chips that can be found in devices such as smartphones, smart TVs, smartwatches, tablets and various other computing devices. These chips can also be found in many of the IoT devices, the servers that connect them to the wider internet and the devices used to control them.

ARM doesn’t actually fabricate the processors, but its designs are used by companies all over the globe, including Apple, Samsung and Qualcomm, and used to drive devices all over the home and in the wider world. As the IoT expands, the demand for low-power chips is only likely to increase.

Guardian

« UK National Crime Agency: Criminals Winning 'Cyber Arms Race'
Malware Targeting Energy Companies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

Eden Legal

Eden Legal

Eden Legal provides legal services on commercial and regulatory issues affecting digital businesses.

Tukan IT

Tukan IT

Tukan IT provides a data classification and protection solution.

Smarttech247

Smarttech247

Smarttech247 deliver a range of cyber security solutions, including cognitive security services using IBM Watson for Cybersecurity, SIEM, Compliance & Governance, and Penetration Testing.

Digital Innovation Hub Slovenia (DIH)

Digital Innovation Hub Slovenia (DIH)

DIH Slovenia is a central hub providing services to grow digital competencies in areas including robotics, IoT, cyberphysical systems and cybersecurity.

CopSonic

CopSonic

Copsonic provide a technology solution based on ultrasonic waves to send secure and encrypted data between two devices in order to achieve authentication.

Nextcloud

Nextcloud

Nextcloud offers offers solutions to the combined need of security and ubiquitous access to data and collaboration technology.

Cyber Security Education

Cyber Security Education

CybersecurityEducation.org is an online directory of cyber security education and careers.

Concentric

Concentric

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

Constella Intelligence

Constella Intelligence

Constella Intelligence provides digital risk protection services to quickly and efficiently disrupt cyber attacks and data breaches before they occur.

Synamic Technologies

Synamic Technologies

Synamic Technologies was founded in 2018 as a start-up to automate cyber security processes. Our CISOSCOPE product automates vulnerability management, risk management and compliance.

evolutionQ

evolutionQ

evolutionQ delivers quantum-risk management strategies and robust cybersecurity tools designed to be safe in an era with quantum computing technologies.

Apono

Apono

Apono enables DevOps and security teams to manage access to sensitive cloud assets and data repositories in a frictionless and compliant way.

Ampcus Cyber

Ampcus Cyber

Ampcus Cyber specialize in providing comprehensive security solutions and services that are tailored to safeguard our clients' networks, infrastructure, and valuable assets.

RIoT Secure

RIoT Secure

RIoT Secure AB is a technology enabler within the IoT industry - created with a vision to ensure security technology exists in the foundations of software development for IoT solutions.

Black Duck Software

Black Duck Software

Black Duck (formerly the Synopsys Software Integrity Group) is the market leader in application security testing (AST).