Old IT Networks Stop New IoT Innovation

IoT isn’t all brand-new, cutting-edge technology. In fact, some of it’s already suffering through painful upgrade cycles.

A case in point is the system that tells transit passengers in the tech hub of San Francisco when the next train or bus will arrive. The NextMuni system, based on the third-party platform NextBus, recently began sending out wildly inaccurate forecasts on many lines.

Why? Because most trains and buses had been communicating with NextMuni over AT&T’s 2G network, which was decommissioned on Jan. 1.

The San Francisco Municipal Transportation Agency (SFMTA) said that about 70% of its vehicles haven’t yet been upgraded with newer 3G technology. It was awkward timing, as that same day, the agency was playing up its innovation credentials as it announced a federal grant to fund six transit pilot projects.

AT&T warned as early as 2012 that it would shut down the 2G network in 2017, but apparently, that wasn’t enough time.

“Simply put, the deactivation work that affects our vehicles started sooner than expected and outpaced our ongoing upgrade of all Muni vehicles to a new communications and monitoring system,” SFMTA said in a blog post. Muni was the first transit agency to adopt the system, back in 2002, which made it fittingly high-tech at the time but now saddles the city with orphaned technology.

Network shutdowns are nothing new. Once every decade or so, carriers phase out an older technology so they can reuse the frequencies for other systems that will carry more traffic on the same amount of spectrum.

AT&T moved faster than some of its rivals in this case. T-Mobile, which uses the same 2G technology as AT&T, has said it plans to keep its network available until 2020. Verizon plans to keep running its previous-generation system, CDMA, at least through the end of the decade. Sprint expects to keep CDMA into the early 2020s.

It’s not often that consumers have to rely on these old networks to make calls and get information. But IoT devices, like sensors, street lamps, and in-vehicle systems, haven’t required the higher data rates of newer technologies, so enterprises and cities have hung on to the old.

Upgrading IoT to a new network is also more complicated than buying a new phone. Doing system audits, setting priorities, and budgeting all play into it.

The work itself may take six to nine months, counting things like testing systems on the new network, IoT analyst Steve Hilton of MachNation said.

Any Business facing the end of a network that connects their devices needs to carefully tactically and strategically plan before going forward.

“Get started early in planning, get hardware and software testing started, then do the upgrade,” Hilton said.

Systems like NextMuni that were designed in a different technological age don't usually allow for swapping in new cellular modules, said Peter Jarich of Current Analysis. “No one back then had any idea,” he said.

San Francisco’s high-tech transit plans for its nearly $12 million grant will bring some of the region’s tech stars together with government, a relationship that hasn’t always been cozy.

Among other things, SFMTA wants to set aside more carpool lanes and tap into services like Uber and Lyft to get more commuters sharing cars. It also plans to test wireless DSRC (Dedicated Short Range Communication) to coordinate traffic lights with transit and emergency vehicles. On Treasure Island in San Francisco Bay, the city will set up an electronic toll-collection system that can be adjusted for traffic levels, and it plans to test autonomous electric shuttles to carry people around the island.

Computerworld:     

Internet of Things will drive the Digital Revolution of Industry:

 
« Browser Autofill Can Be Used To Steal Data
Georgia - A State Of Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Netskope

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

AcceptLocal

AcceptLocal

AcceptLocal is a payments industry consultancy with expertise in payment processing, payment security, anti-money laundering and fraud prevention.

Assertion

Assertion

Assertion secures your collaboration (UC/CC) systems from cyber risks. Enforcing the right set of controls and monitoring them continually brings down risk to acceptable levels.

Netsecurity AS

Netsecurity AS

Netsecurity is a Norwegian owned company focused and specialised within IT security and cybersecurity-as-a service.

RUSCADASEC

RUSCADASEC

RUSCADASEC is an independent non-profit initiative on developing the open Russian-speaking international community of industrial cyber security/ICS/SCADA cyber security professionals.

OwnZap Infosec

OwnZap Infosec

OwnZap Infosec aims to digitally shield the cyberspace by offering services like Penetration Testing and Red Teaming, Infrastructure Security Testing, and Vulnerability Assessments.

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group, Ltd. (STIGroup) is an innovative firm that provides CyberSecurity consulting, secure IT engineering, managed security services, and human capital solutions.

Sylint

Sylint

Sylint is an internationally recognized cyber security and digital data forensics firm with extensive experience discretely addressing some of today’s biggest cyber breaches.

United Network Technologies

United Network Technologies

United Network Technologies is a leading Managed Services Provider, distributor and developer of specialised cyber security components and technologies.

YorCyberSec

YorCyberSec

YorCyberSec act as a trusted Cyber and Information Security broker and procurement specialist. We help companies to Reduce Risk, Increase Assurance and Improve Performance.

National Cryptologic Foundation (NCF)

National Cryptologic Foundation (NCF)

The National Cryptologic Foundation strives to influence the cryptologic future by sharing our educational resources, stimulating new knowledge, and commemorating our heritage.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

Cognilytica

Cognilytica

Cognilytica’s Cognitive Project Management for AI (CPMAI) training and certification is recognized around the world as the best practices methodology for implementing successful AI & ML projects.

Technology Innovation Institute (TII)

Technology Innovation Institute (TII)

TII is a UAE-based research center that aims to lead global advances in AI, robotics, quantum computing, cryptography and secure communications and more.

Cysurance

Cysurance

Cysurance is a next-generation risk mitigation company that insures, warranties and certifies security solutions.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.