A Strategic Company: The Internet of Things & How ARM Fits In

An ARM processor in a Hewlett-Packard PSC-1315 printer.

Britain’s best unknown tech business ARM Holdings is being bought by Japan’s SoftBank on the back of the promise of the Internet of Things (IoT). But what is IoT, and what has a chip designer like ARM got to do with it?

What is the Internet of Things?

The idea behind IoT is to create a home where everything is connected to the internet, creating “swarm intelligence” from individually dumb devices. Bins, toasters, washing machines and lights will be able to talk to each other for automatic, more efficient control and monitoring.

But IoT also describes the use of sensors and smart devices in the wider environment to automate processes and give information to human operators, such as roads that alert drivers to spots of black ice or recycling bins that tell the council when to pick them up.

What sort of things can can you get?

IoT is still in its infancy, but there is a small collection of consumer devices and a few commercial devices that actually link into the wider world.

The best known IoT devices are smart thermostats, such as Nest’s Learning Thermostat, and lighting systems, of which Philips Hue and Lightwave RF are the best known in the UK.

Other devices include electronic locks, home-security cameras, various sensors for temperature, humidity, water, motion and open or close states. Various smart plug sockets are also available that allows users to turn lamps and other non-smart devices on and off remotely.

The internet fridge was always the poster child of IoT, but home appliances are only starting to be available with IoT built in. Smartwashers, driers, dishwashers, bathroom scales, robot vacuum cleaners, fans and, yes, fridges, are starting to come to market that can talk to each other and to the owner.

What can you do with IoT?

Broadly speaking, IoT devices fall into two categories: true consumer devices and DIY automation systems. Smart-thermostats, cameras, scales, gadgets to help you sleep and other devices, which are easy to install and use either in isolation or together with other bits through an app or syncing service, are commonly available through traditional retailers.

But with various sensors and interconnected systems available, much more advanced setups can be built using more specialist equipment and universal protocols such as Z-wave or ZigBee, which allow disparate devices to communicate wirelessly without Wi-Fi or the internet. Almost anything from IoT security systems to automatic lighting, advanced power management and status monitoring, from bins to pantries, can be created, although some need the skills of an electrician and coders.

Who are the big players?

The biggest brands in the consumer IoT space include Samsung, with appliances and its SmartThings IoT hub, Alphabet’s Nest, Google and Amazon, whose IoT Echo speaker – which is capable of commanding other devices via voice – has proved popular in the US.

Behind many of these devices, however, are low-power chip makers and embedded operating system vendors. Google’s Brillo, for instance, is a cut-down version of Android for IoT devices, while low-power processors built using ARM designs are popular because of their electrical efficiency.

What are the challenges facing IoT?

While many connected devices are available to buy, not many of them can actually talk to devices made by other brands, and when they do their interaction is limited. Each device comes with its own smartphone app, rather than there being one to control them all. Companies such as Google, Nest, Apple and Samsung are attempting to provide a bridge between devices, but a unified system is sorely needed.

There is also the challenge of privacy and security. IoT devices that were originally conceived to be used in isolation or within the home without connecting to the internet are now being exposed to the wider world and can be ripe for criminal attack.

If appropriate security measures are not taken, a hacker who gains access to the data flowing around your home could turn the sensors and appliances into snooping devices.

What’s ARM’s link to it?

ARM Holdings is a designer of mobile and low-power chips that can be found in devices such as smartphones, smart TVs, smartwatches, tablets and various other computing devices. These chips can also be found in many of the IoT devices, the servers that connect them to the wider internet and the devices used to control them.

ARM doesn’t actually fabricate the processors, but its designs are used by companies all over the globe, including Apple, Samsung and Qualcomm, and used to drive devices all over the home and in the wider world. As the IoT expands, the demand for low-power chips is only likely to increase.

Guardian

« UK National Crime Agency: Criminals Winning 'Cyber Arms Race'
Malware Targeting Energy Companies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Irish Reporting & Information Security Service (IRISS)

Irish Reporting & Information Security Service (IRISS)

IRISS-CERT is Ireland's first CSIRT (Computer Security Incident Response Team) to provide services to all users within Ireland.

Verve Industrial

Verve Industrial

Verve specialize in providing software and services to help protect and secure critical industrial control systems.

ARC Advisory Group

ARC Advisory Group

ARC is a leading technology research and advisory firm with expertise in both information technologies (IT) and operational technologies (OT)

Recorded Future

Recorded Future

Recorded Future arms security teams with threat intelligence powered by patented machine learning to lower risk.

Belden

Belden

Belden is a global leader in signal transmission and security solutions for mission-critical applications in enterprise and industrial markets. Belden brands include Hirschmann and Tofino Security.

Macomb-OU Incubator

Macomb-OU Incubator

Macomb-Oakland University Incubator supports startup and emerging companies in the niche industries of defense, homeland security, advanced manufacturing and technology.

C5 Capital

C5 Capital

C5 Capital is a specialist investment firm that exclusively invests in the secure data ecosystem including cybersecurity, cloud infrastructure, data analytics and space.

Cryptyk

Cryptyk

CRYPTYK CLOUD is the first complete enterprise-class cloud security solution that includes cloud storage and broad protection against all external and internal threats.

Centraleyes

Centraleyes

Centraleyes (formerly CyGov) is a cutting-edge integrated cyber risk management platform that gives organizations unparalleled understanding of their cyber risk and compliance.

Communicate Technology

Communicate Technology

Communicate Technology are IT, telecoms and cyber-security specialists, keeping over 500 businesses and 50,000 users connected and secure across the UK.

Halborn

Halborn

Elite blockchain cybersecurity. Award-winning ethical blockchain hackers to secure your stack end-to-end. Far beyond smart contracts.

Com Olho

Com Olho

Com Olho provides the measurement, analytics, quality assurance, and fraud protection technologies brands need for their business and customers.

Cornami

Cornami

Cornami delivers real-time computing on encrypted data sets, which is vital for data privacy and cloud security.

Aquia

Aquia

Aquia are on a mission to enable innovation and drive transformative change to solve the world’s most pressing and complex cybersecurity challenges.

Opal Security

Opal Security

Opal is an identity and access management platform that offers a consolidated view and control of your whole ecosystem from on-prem to cloud and SaaS.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.