Blog

Why the Internet of Life Saving Things (IoLST) is the future

Another day and another internet of everything talk or article or conversation. Yet helping save lives and cleaning up the environment and improving our communities is not only key for a better tomorrow, but any tomorrow.

What is this Internet of Life Saving Things (IoLST) anyway ?

It falls under the umbrella of the Internet of Things, also known as IOT, but geared toward solutions for the public safety and first responders sector.

IoLST is all about helping save lives and improving communities through digital transformative processes and automation. It may include emerging technologies like blockchain, AI, IOT, LoraWAN, software defined radio , quantum computing, digital twins , augmented and virtual reality, smart sensors and devices, the cloud, mesh networking, as well as 3d printing. But it’s not just about technology and normal city government and business processes.

It’s all about the people and their communities. Digital transformation doesn’t work without the people. And the Internet of Life Saving Things helps save lives and improve communities by making sure the first responders, healthcare professionals, and city and community officials can protect the people and their property. The technology aspect helps make their jobs a little less chaotic and more efficient.

It’s enabling communities to be better prepared for natural and man made disasters and normal everyday occurrences.

IoLST and smarter communities is all about living and breathing the ideals and philosophies of a better, healthier, and safer today and tomorrow. Every neighborhood can be a safer, cleaner and self-Sufficient thriving community.

IoLST products and solutions could improve police officers’ ability to gather evidence and solve crimes. IoLST solutions can help accelerate the response of EMS personnel to motor vehicle collisions.

The digital transformation aspect helps protect firefighters from harm, or even alert healthcare professionals to dangerous changes to the vital signs of their patients recovering from an emergency while at home. 

IoLST products and solutions expand upon normal tech , IOT tech and everyday city wide daily processes. Smarter connected street lamps and traffic lights. CCTV, tiny cameras , wearables like fitbits and Apple watches, and drones all help transform a community.

Going even further, the Deep Edge IoLST products, solutions and applications may use mesh networking, 5G, as well as small, processing- and power-constrained edge devices that are deeply embedded in assets that will monitor a police officer’s heartbeat, cities automobile and foot traffic , and help paramedics measure vital signs.

Sensors and actuators that can detect a vehicle collision at a busy intersection, and automatically propose detours.

The Internet of Life Saving Things is here. It’s coming. It’s Tomorrow already today.

Read More
Skills gap for blockchain, AI, & IOT

“Most of the …

IOT | AI | blockchain |

Digital transformation

projects fail

Years ago when I was doing data warehousing and business intelligence you heard this failure story. You heard about excel spread-marts. You heard about most master data management projects failing. Then it became big data , Hadoop and data lakes that didn’t work out . Now you hear it for blockchain and IOT and AI and RPA and digital transformation projects.

It comes down to people, processes and technology. And understanding what works and what doesn’t work. And having executive sponsors buy in to these transformations. But we also need to have a real honest assessment of your organizations strengths , weaknesses , challenges , plans and goals.

People hated IT and IT operations for years cause nobody understood what they did and everything took so long. AWS and the cloud made things simple by point and click and ignore IT. Ignore security or how most of these thing work or what they really cost too.

And hey , Here comes agile and scrum and Kanban and be gone with legacy waterfall minders. But many companies introduced some faux agile methodology or never bought into it at all. It just sounded better to have developers do 2 week sprints.

Blockchain, AI, IoT and digital transformation projects have many other challenges on top of the normal IT and emerging tech challenges. A global study found the majority (56%) of unsuccessful digital transformation and IOT projects were considered a failure within a few months. That’s a few months.

Can you determine real success rates in a month or two ?

Especially when trying to transform a business or introduce edge IOT smart computing that helps change a way a business does things ? Probably not.

But pilots and POCs need to disrupt something in a couple of two week sprints or it’s deemed useless. Oh and business requirements, who really cares about them. Just disrupt something. Or stop us from being disrupted.

Why the rush and how to fix it ?

Well, a major challenge has always been Finding the right people with the right skills and right costs to implement some emerging tech. That’s no different for these digital transformation projects.

Good people Cost too much. Offshore the work to people and firms who are cheaper, but they claim they have all the experts in everything, yet somehow try and implement AI using Java enterprise edition. And then deliver a rules engine with no artificial intelligence. So you hire another cheap offshore firm. They use python and AWS. But they don’t care about your business or data and the AI results stink. And it’s useless. Try again. That process is not going to be successful.

Security and data privacy are huge concerns now. Especially with vulnerable IOT devices. Costs are always a factor. But hiring the right employees or contractors to implement a successful digital transformation project is a huge challenge.

Train up people ? Outsource more ? Get the right business leaders to participate and buy in. These days you can’t just throw it all to “IT” and then blame them when half these processes don’t work while business leaders just punt.

At Pagarba we know many government organizations, hospitals, manufacturers and businesses are serious about digital transformation with blockchain, AI, IoT and the cloud.

We get things done. And done right.

Read More
What do you need security APIs for ?

This, That and the other thing what are Security APIs really good for ?

For one, Detecting and cleaning malware and viruses. Many malware API services are useful for detecting types of malicious files and code injections in web applications.

Get notifications and alerts quickly when a new application is infected with some 3rd party illegal code.

The Second useful thing of security APis are Being able to explore surface attack areas.

Certain Security APIs allow you to explore and audit DNS records, IP addresses and domain names.

This In turn, enables you to find abnormal changes to your DNS infrastructure and possibly prevent harmful activities such as domain hijacking. Other possibilities may include finding stale DNS records, reviewing SSL certificate information, etc.

Third on our list is being able to Explore the reputation of a website.

This type of security API is useful for detecting phishing domains or discovering pages that are related to uncommon downloads, infected networks, etc.

Fourth on our list is related to information fraud Investigations.

If you work for a public or private security agency, using security APIs will enable you to research for various fraudulent activities and help track down the culprits behind it. Integrate some text analytics, NLP and machine learning functions to help find and discover outliers.

Fifth is monitoring your brand and reputation.

Plenty of big time and smaller Influencers care about this. Small, medium and large Commercial enterprises worry about Brand reputation in various ways. Especially with social media outbursts by employees , founders and executives. Fake news and deep fake videos. So monitoring and keeping an inventory of your brands reputation is paramount.

In an era where everyone wants to be a thought leader and life coach or instagram influencer Is someone using your name illegally? Better to Find and report illegal usage of any brand name or trademark registered by you or your company within seconds. Vs a

Week later.

Sixth can be something like finding and researching Copyright violations.

Quick search and analysis from 3rd party websites that are using your copyrighted materials is helpful. Maybe locating the IP addresses, Internet archives, domain names and historical web hosting checking features to find the real people behind these illegal operations.

We all know the seventh use case , bug and bounty programs and rewards ,

has been a popular thing in crypto and blockchain. Developers and hackers participate in these bug and bounty programs to show their skills and possibly earn money or a job with their knowledge and skills. Security APIs are the perfect tool for these white hat hackers seeking valuable reconnaissance information about their targets. Even capture the flag like events can be fun and interesting.

So there you go , security APIs and what they can be used for. Pagarba does IOT and hospital security audits , medical device and IOT penetration testing as well as facility security risk assessments.

Read More
Why Lora and LoraWAN ?

What is Lora ?

Means long range.

It refers to the spread spectrum modulation technique derived from

chirp spread spectrum (CSS) technology.

Semtech’s LoRa devices and wireless radio frequency technology (LoRa Technology) is a long range, low power wireless platform that has become the de facto technology for Internet of Things (IoT) networks worldwide.

What is LoraWan ?

LoRaWAN is a media access control (MAC) protocol for wide area networks.

It can be mapped to the second and third layer of the OSI model. LoraWAN is implemented on top of LoRa or FSK modulation in industrial, scientific and medical (ISM) radio bands.

Difference between Lora and LoraWAN ?

LoRa, is the physical layer or the (wireless) modulization which creates the long range communication link. 

LoRaWAN is about the communication protocol and system architecture for the network as the LoRaAlliance puts it.

LoRaWAN is the network and also responsible for managing the communication frequencies, data rate, and power for all kinds of IOT devices.

(WAN = Wide Area Network)

What is Lora Mesh ?

LoRa MESH Radio Module is a high performance, low power, long-range micro-power RF module, using a distributed ad-hoc network communication mode, embedded wireless Mesh Manet protocols, users do not need to do anything modified to present devices, protocols, nor need for secondary development to module, but can easily programmable.

What are some use cases and reasons to use LORa and LoraWAN ?

  • The LoRaWAN standard is one of the leading open standards for low power wide area network technology
  • Cost effective for pilots, POCs and productionized systems
  • LoRa Technology’s inherent qualities enable resilient and reliable radio capabilities in urban and rural environments
  • It’s Battery or solar operated sensors remove the requirement for fixed power and enable multiple years of battery life depending on the use case
  • Longer shelf life is quite useful to many of use cases such as tracking hospitals equipment, disaster recovery and emergency management systems, smart agriculture and farming , smart cities, smart manufacturing plants, etc.
  • LoRa-based sensors and networks can fit easily into many software ecosystems
  • The LoRaWAN standard has security fundamentally built into the specification
  • Design and build a long-range, low powered digital wireless communications IOT network where sensors can be used to categorize certain Audio frequencies and noises like gun shots, trains, construction and road noises to help with traffic and noise ordinances

Read More
AT&T Firstnet and selling you out …

Crazy stuff going on sometimes at Telcos and AT&T.

The bribery scheme lasted from at least April 2012 until September 2017. Initially, the two Pakistani men bribed AT&T employees to unlock expensive iPhones so they could be used outside AT&T’s network.

The two recruited AT&T employees by approaching them in private via telephone or Facebook messages. Employees who agreed, received lists of IMEI phone codes which they had to unlock for sums of money.

Employees would then receive bribes in their bank accounts, in shell companies they created, or as cash, from the two Pakistani men.

Pagarba’s HopeBox wouldn’t be like that. Just saying.

Read More
Lot of fluff in blockchain articles

I was reading an article about a startup today doing some cool things in the telco space. There are over 2000 telecommunications operators, carriers , and companies in the world. And a decentralized like blockchain telco sounds interesting and promising. But the article and the startup reek of clueless writers and founders.

Telecom industry to create an  “); background-size: 1px 1px; caret-color: rgba(0, 0, 0, 0.843137); font-family: medium-content-serif-font, Georgia, Cambria, “Times New Roman”, Times, serif; font-size: 18px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: -0.07199999690055847px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-position: 0px calc(1em + 1px); background-repeat: repeat no-repeat”>ecosystem where consumers are in full control, and there is trust, security and transparency in the participating ecosystem. 

In theory this sounds good. In reality we’ve seen how few people actually care about any of that stuff. Especially people paying for things. Or companies looking to make money and paying for things. How many telcos who are revenue generating really wish their customers have full control ? The trust and security is just nonsense because we’ve seen how the crypto and blockchain space is filled with just as many con artists and scam artists as any other space. Maybe even more when my was at an all time high.

A much more reliable and efficient solution would be to do this using a private blockchain, accessed by the CSPs.

The article then dives into private blockchains. Being 5G requires closer proximity and more gateways and base stations, etc and not so much larger cell towers sprung up every mile , I think people forget someone pays to have these gateways installed and maintained. And many times they pay to lease the property it’s on. Oh the telco companies make billions , especially the AT&Ts and Verizon’s and such , but they still have costs associated with new towers , new gateways and new data centers. If they are building some telco private blockchain, how exactly is that any different than what exists now ? Oh it’s a blockchain and not a database. That’s someone who doesn’t seem to know how blockchains work or is purposely making things up to serve their own agenda.

Telstra extends the security provided by blockchain technology and combines it with biometric features, such as voice and facial recognition. These are stored encrypted on a blockchain, making it immutable, verifiable and traceable. 

This sounds like a bunch of nonsense. They store all that on a “blockchain” or a “blockchain” that is really Kafka and MongoDB with some hyperledger thrown in.

Gotta be careful of all the blockchain articles out there. Most aren’t talking about blockchain. More like a hybrid big data and cloud system with some blockchain sprinkled in.

Read More