Old IT Networks Stop New IoT Innovation

IoT isn’t all brand-new, cutting-edge technology. In fact, some of it’s already suffering through painful upgrade cycles.

A case in point is the system that tells transit passengers in the tech hub of San Francisco when the next train or bus will arrive. The NextMuni system, based on the third-party platform NextBus, recently began sending out wildly inaccurate forecasts on many lines.

Why? Because most trains and buses had been communicating with NextMuni over AT&T’s 2G network, which was decommissioned on Jan. 1.

The San Francisco Municipal Transportation Agency (SFMTA) said that about 70% of its vehicles haven’t yet been upgraded with newer 3G technology. It was awkward timing, as that same day, the agency was playing up its innovation credentials as it announced a federal grant to fund six transit pilot projects.

AT&T warned as early as 2012 that it would shut down the 2G network in 2017, but apparently, that wasn’t enough time.

“Simply put, the deactivation work that affects our vehicles started sooner than expected and outpaced our ongoing upgrade of all Muni vehicles to a new communications and monitoring system,” SFMTA said in a blog post. Muni was the first transit agency to adopt the system, back in 2002, which made it fittingly high-tech at the time but now saddles the city with orphaned technology.

Network shutdowns are nothing new. Once every decade or so, carriers phase out an older technology so they can reuse the frequencies for other systems that will carry more traffic on the same amount of spectrum.

AT&T moved faster than some of its rivals in this case. T-Mobile, which uses the same 2G technology as AT&T, has said it plans to keep its network available until 2020. Verizon plans to keep running its previous-generation system, CDMA, at least through the end of the decade. Sprint expects to keep CDMA into the early 2020s.

It’s not often that consumers have to rely on these old networks to make calls and get information. But IoT devices, like sensors, street lamps, and in-vehicle systems, haven’t required the higher data rates of newer technologies, so enterprises and cities have hung on to the old.

Upgrading IoT to a new network is also more complicated than buying a new phone. Doing system audits, setting priorities, and budgeting all play into it.

The work itself may take six to nine months, counting things like testing systems on the new network, IoT analyst Steve Hilton of MachNation said.

Any Business facing the end of a network that connects their devices needs to carefully tactically and strategically plan before going forward.

“Get started early in planning, get hardware and software testing started, then do the upgrade,” Hilton said.

Systems like NextMuni that were designed in a different technological age don't usually allow for swapping in new cellular modules, said Peter Jarich of Current Analysis. “No one back then had any idea,” he said.

San Francisco’s high-tech transit plans for its nearly $12 million grant will bring some of the region’s tech stars together with government, a relationship that hasn’t always been cozy.

Among other things, SFMTA wants to set aside more carpool lanes and tap into services like Uber and Lyft to get more commuters sharing cars. It also plans to test wireless DSRC (Dedicated Short Range Communication) to coordinate traffic lights with transit and emergency vehicles. On Treasure Island in San Francisco Bay, the city will set up an electronic toll-collection system that can be adjusted for traffic levels, and it plans to test autonomous electric shuttles to carry people around the island.

Computerworld:     

Internet of Things will drive the Digital Revolution of Industry:

 
« Browser Autofill Can Be Used To Steal Data
Georgia - A State Of Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Identiv

Identiv

Identiv is a global security technology company that establishes trust in the connected world, including premises, information and everyday items.

RSA Conference

RSA Conference

RSA Conference conducts information security events around the globe that connect you to industry leaders and highly relevant information.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

National Security Agency (NSA)

National Security Agency (NSA)

NSA is a US intel agency responsible for the protection of government communications and information systems against penetration and network warfare.

Deductive Labs

Deductive Labs

Deductive Labs consulting services help customers with their technology, security and automation challenges.

Referentia

Referentia

Referentia leads the development of critical infrastructure solutions that benefit society, including cyber security and network performance management.

Compass Security

Compass Security

Compass Security is a specialist IT Security consultancy firm based in Switzerland. Services include pentesting, security assessments, digital forensics and security training.

Cyberbit

Cyberbit

Cyberbit empowers cybersecurity teams to be fully prepared with a product portfolio ready to detect and respond effectively across both IT and OT networks.

Inky Technology Corp

Inky Technology Corp

Inky® Phish Fence is an email protection gateway that uses sophisticated AI, machine learning and computer vision algorithms to block deep sea phishing attacks that get through every other system.

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

OGCIO supports the development of community-wide information technology infrastructure and setting of technical and professional standards to strengthen Hong Kong’s position as a world digital city.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

Omnipotech

Omnipotech

Omnipotech is a complete managed service provider. From desktop to datacenter, all the technology support you need, under one umbrella.

Qascom

Qascom

Qascom is an engineering company offering security solutions in satellite navigation and space cybersecurity. We are one of the European key players in GNSS authentication and security.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.

Fivecast

Fivecast

Fivecast is enabling a safer world. We help organizations around the world explore masses of data to uncover actionable insights.