Old IT Networks Stop New IoT Innovation

IoT isn’t all brand-new, cutting-edge technology. In fact, some of it’s already suffering through painful upgrade cycles.

A case in point is the system that tells transit passengers in the tech hub of San Francisco when the next train or bus will arrive. The NextMuni system, based on the third-party platform NextBus, recently began sending out wildly inaccurate forecasts on many lines.

Why? Because most trains and buses had been communicating with NextMuni over AT&T’s 2G network, which was decommissioned on Jan. 1.

The San Francisco Municipal Transportation Agency (SFMTA) said that about 70% of its vehicles haven’t yet been upgraded with newer 3G technology. It was awkward timing, as that same day, the agency was playing up its innovation credentials as it announced a federal grant to fund six transit pilot projects.

AT&T warned as early as 2012 that it would shut down the 2G network in 2017, but apparently, that wasn’t enough time.

“Simply put, the deactivation work that affects our vehicles started sooner than expected and outpaced our ongoing upgrade of all Muni vehicles to a new communications and monitoring system,” SFMTA said in a blog post. Muni was the first transit agency to adopt the system, back in 2002, which made it fittingly high-tech at the time but now saddles the city with orphaned technology.

Network shutdowns are nothing new. Once every decade or so, carriers phase out an older technology so they can reuse the frequencies for other systems that will carry more traffic on the same amount of spectrum.

AT&T moved faster than some of its rivals in this case. T-Mobile, which uses the same 2G technology as AT&T, has said it plans to keep its network available until 2020. Verizon plans to keep running its previous-generation system, CDMA, at least through the end of the decade. Sprint expects to keep CDMA into the early 2020s.

It’s not often that consumers have to rely on these old networks to make calls and get information. But IoT devices, like sensors, street lamps, and in-vehicle systems, haven’t required the higher data rates of newer technologies, so enterprises and cities have hung on to the old.

Upgrading IoT to a new network is also more complicated than buying a new phone. Doing system audits, setting priorities, and budgeting all play into it.

The work itself may take six to nine months, counting things like testing systems on the new network, IoT analyst Steve Hilton of MachNation said.

Any Business facing the end of a network that connects their devices needs to carefully tactically and strategically plan before going forward.

“Get started early in planning, get hardware and software testing started, then do the upgrade,” Hilton said.

Systems like NextMuni that were designed in a different technological age don't usually allow for swapping in new cellular modules, said Peter Jarich of Current Analysis. “No one back then had any idea,” he said.

San Francisco’s high-tech transit plans for its nearly $12 million grant will bring some of the region’s tech stars together with government, a relationship that hasn’t always been cozy.

Among other things, SFMTA wants to set aside more carpool lanes and tap into services like Uber and Lyft to get more commuters sharing cars. It also plans to test wireless DSRC (Dedicated Short Range Communication) to coordinate traffic lights with transit and emergency vehicles. On Treasure Island in San Francisco Bay, the city will set up an electronic toll-collection system that can be adjusted for traffic levels, and it plans to test autonomous electric shuttles to carry people around the island.

Computerworld:     

Internet of Things will drive the Digital Revolution of Industry:

 
« Browser Autofill Can Be Used To Steal Data
Georgia - A State Of Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Fortify Experts

Fortify Experts

Fortify Experts is a search and recruitment firm specializing in Cyber Security.

International Telecommunication Union (ITU)

International Telecommunication Union (ITU)

ITU is the United Nations specialized agency for information and communication technologies – ICTs. Areas of activity include cybersecurity.

Norton

Norton

NortonLifeLock is dedicated to helping secure the devices, identities, online privacy, and home and family needs of approximately 50 million consumers.

Netresec

Netresec

Netresec is an independent software vendor with focus on the network security field. We specialize in software for network forensics and analysis of network traffic.

Regulus Cyber

Regulus Cyber

Regulus enables drones, robots and autonomous vehicles to operate safely, without malicious or accidental interference to the operation of their mission.

Romanian Association for Information Security Assurance (RAISA)

Romanian Association for Information Security Assurance (RAISA)

RAISA promotes and supports information security activities and creates a community for the exchange of knowledge between specialists, academic and corporate environment in Romania.

Forensic Pathways

Forensic Pathways

Forensic Pathways focus on the provision of digital forensic technologies, offering clients unique technologies in the management of mobile phone data, image analysis and ballistics analysis.

Cyber Risk Institute (CRI)

Cyber Risk Institute (CRI)

CRI is a not-for-profit coalition of financial institutions and trade associations working to protect the global economy by enhancing cybersecurity and resiliency through standardization.

Nu Quantum

Nu Quantum

Nu Quantum is developing quantum photonics hardware to power the quantum revolution in communications, sensing and computing.

Infinite Ranges

Infinite Ranges

Infinite Ranges delivers secure, comprehensive digital solutions by connecting experts with the best products and services for the digital age.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

ABCsolutions

ABCsolutions

ABCsolutions is dedicated to assisting businesses and professionals achieve compliance with federal anti-money laundering regulations in an intelligent and pragmatic way.

Lucidum

Lucidum

The Lucidum platform helps you assess risk and mitigate vulnerabilities by finding and correlating data from your security tech stack.

Vercara

Vercara

Vercara offers a purpose-built, global cloud security platform that provides layers of protection to safeguard businesses’ online presence, no matter where an attack comes from or where it is aimed.

Umbrella Cyber

Umbrella Cyber

Umbrella Cyber specialises in Cyber Essentials and Cyber Essentials Plus Certification and penetration testing.

GrayHats

GrayHats

GrayHats is a platform-based cybersecurity company devoted to delivering comprehensive, scalable, and proactive protection for businesses in an ever-evolving threat landscape.