Common IoT Team Gaps and Solutions: IoT Immigrants and Corporate Makers

April 23rd, 2018 | Brian Tol | Operations

At SpinDance, we get to interact with a huge variety of businesses, from international brands like Whirlpool to startups like Dogtelligent. Every week we talk with organizations making their first leap into the world of IoT.

All of these organizations have a unique heritage of products and services and thus, unique challenges to suit. But regardless of the company or product, we see a definitive pattern in the people who are being tasked with succeeding at IoT. Broadly speaking, we can categorize engineers and product managers into two groups: Those engineers who understand traditional product development without expertise in end-to-end strategy, and those who can build a physical product but lack expertise in embedded systems.

We call these two groups “IoT Immigrants” and “Corporate Makers,” respectively. As you can imagine, each group has its own specific challenges in adopting IoT. By identifying the patterns, we’re able to better predict the a project’s needs much earlier in the process, which leads to a more successful project timeline.

Let’s dig a little deeper into these two groups of people and how their wide range of expertise affects their project goals:

IoT Immigrants

IoT Immigrants are people with a background in traditional embedded systems and product development, but have little “end-to-end” IoT experience. They are engineers who know PCB design,…

Read more

Dusk over CityVu Events Building with graphic depiction of tech symposium

Join us in May for our Technology Symposium

April 6th, 2018 | Erin Bernhard Erno | News,SpinDance

There’s no denying it – the Internet of Things is here to stay. However, about 61% of executives in the United States believe that they’ve barely scratched the surface of what IoT can do for their business. For most, the question is, “How can I best integrate IoT solutions into our existing business strategy?”

If this is a question you’ve been asking, then you’re in luck. You just need to block out your calendar on May 10, 2018.

Technology Symposium: Blooming Strategies for IoT

May 10, 2018
IOT Bootcamp and Journeys in IoT
City Flats Hotel, Downtown Holland

Join us in Holland, Michigan, to learn from pioneers in the IoT industry. Participating in any part of this free event will give you the opportunity to better understand how to enhance your business goals by including the Internet of Things.

In the morning, you’ll receive key insights into the nuances of IoT from the highly-trained staff at SpinDance by participating in our IoT Bootcamp ($1500 value), which we’re making available to you free of charge. After lunch, you’ll hear from key business leaders who have prioritized IoT for their businesses. By the end of the day, you’ll have created your own IoT strategy, learned about a wide variety of IoT solutions, and networked with leaders from a variety of industries….

Read more

Booths and Attendees at the International Home and Housewares Show, March 2018

Trends Shaping the Future of the Connected Home

April 4th, 2018 | Jeff Ekdom | IoT Notes

When it comes to connected products, is the priority to save time, money, energy, or all of the above? Our fast-paced world deals brands with this question and we answer with innovative new technologies, which consumers are purchasing by the millions. In fact, some researchers are pinning the smart-home market at $40 billion by 2020, but that growth can only be accessed by focusing on the consumer’s needs rather than focusing solely on innovation. This shift in focus was the theme of last month’s International Home and Housewares Show in Chicago.

Shifting focus from technology to the consumer

“OK, Google: How do I get started?” or “Alexa, what do I do now?” – both of these questions are driving the experience of the newly connected consumer. As a consumer’s experience with connected products increases, engineers have opportunities to introduce multiple device solutions that provide crossovers between mobile, web, and in-home. But the mere introduction of these technologies doesn’t mean that consumers will automatically buy in. In fact, the act of saturating the market with products has only made consumers more skeptical and slower to buy.

During his IHHS keynote, Kevin Young from Continuum remarked that, “we are in an age now where the technology will always be there, it will now just become more naturally connected into our everyday lives.”

This mindset is critical to the direction engineers must take when innovating new products….

Read more

A Pattern for Secure Uploads and Downloads in AWS IoT

March 15th, 2018 | Greg Straw | Security

Suppose you have a large fleet of connected sensors, all gathering data and triggering events based on conditional logic within the device. It’s one thing to provide event notifications, but what about all the continuous readings and status data? This data is likely to be much larger than what is selected for triggering an event or notification. This data may be able to provide valuable insights, and is where analytics can provide incredible value.

If we want to leverage this data we first must consider how to ship it to the cloud, which forces us to think about security. Uploading data is not the only consideration when it comes to IoT. We must also consider the secure delivery of large amounts of configuration or firmware data to and from a connected device.

How to secure file transfers in AWS IoT: A Use Case

In the AWS ecosystem where we have a device connected using AWS IoT, you could download or upload a large amount of data by partitioning the data into individual MQTT messages and re-assembling after receipt. Assuming the packetization process also encrypts the data, this would certainly be secure. However, that’s not an efficient use of AWS IoT costs (paid by MQTT Message), and unnecessarily complicated since it requires partitioning and reassembling, and likely some form of acknowledgement or QoS increase to ensure all the data arrives successfully….

Read more

Principle of Least Privilege: An Introduction

March 1st, 2018 | Aaron Day | Security

Every program and every privileged user of the system should operate using the least amount of privilege necessary to complete the job. – Jerome Saltzer

In an effort to better serve our clients, SpinDance is building an internal cross project team which will focus on the security aspects of the applications. This team will review design, implementation, and deployment of customer projects and perform testing to ensure the clients applications and data are as safe and secure as possible. The team will also be providing internal training to the development teams, teaching high level concepts and application of those concepts to spread the skills throughout the engineering side of company. This article is an adaptation of some of the topics that will be covered.

What is the Principle of Least Privilege?

A main tenet of secure system design is layered security. The principle of least privilege is one of the building blocks to layered security. The idea of the principle of least privilege is that a user’s or program’s access is the minimum necessary to complete the intended task. In event of a compromise the damage is limited to elements of the system the original process is able to access. Using the principle of least privilege decreases exposure and damage thereby increasing the security of a system. This adds a layer of security to the system by protecting the remaining components of the system which the process does not have access to affect….

Read more

Blue data with cloud and lock graphic overlays

Internet of Things Security with AWS IoT Core: A Brief Use Case

February 11th, 2018 | Brian Ensink | Security

As the Internet of Things plays a more prominent role in the lives of consumers, you’re likely to use these “things” everywhere. Devices can be found  in your office, car, home, even on your wrist or clipped to your clothing – as such, they have access to your most vital and sensitive information. But how often do you consider the security implications of relying on IoT for your day-to-day life? As engineers, we think about Internet of things security so consumers don’t have to. “How do we secure it?” is one of the most important and required questions to answer for any piece of software, occurring during the design and implementation phase of a product. At SpinDance, we want our solid end-to-end security design to be reinforced by secure tools. This is where AWS IoT Core shines.

What is AWS IoT Core?

At SpinDance we have have invested time and effort into building useful components to better support future IoT projects, which has helped us build expertise in securing the communication between the device and the cloud. One of the solutions we’ve spent a significant amount of time with is AWS IoT Core. AWS IoT Core is Amazon’s foundation to build the Internet of Things. IoT Core supports connecting devices or things to a lightweight message broker to communicate with mobile, web and cloud apps,…

Read more

The Future’s Future: SpinDance Hosts High School Students for Winterim

February 9th, 2018 | Erin Bernhard Erno | SpinDance

During the second week of January 2018, SpinDance was abuzz with activity. The reason? A group of Holland Christian High School students were in the office, exploring the world of IoT to “test drive” a career in Software Engineering  during the school’s annual “Winterim” internship program. By the end of the week, they had successfully learned how to implement a smart IoT system through the cloud to light and power a small ceramic house with voice commands. Here’s what they worked on:

At the beginning of Winterim, students received an AWS IoT button and WeMo outlet for exploration. They quickly taught themselves about AWS IoT and Lambda, while creating AWS accounts and connecting their AWS IoT buttons to the cloud.  

“Setting up the AWS IoT Button is a good introduction to IoT because it introduces a person to the major concepts of IoT through configuration rather than writing code,” said SpinDance’s Director Engineering, Mike Stroud. “Concepts include the AWS Cloud, connecting a device (the button) to WiFi access point, associating the device with their AWS IoT account, and editing a Lambda function to associate an event (button press) with and action (sending an SMS).  

“It doesn’t take long to experience these concepts which builds interest and boosts confidence.”  Thanks to the support of SpinDance’s own Chris Samuelson, they were able to implement an AWS Lambda function to send a custom SMS message to their phones when the AWS IoT Button was pressed –…

Read more

Creating Community through Professional Development: The SpinDance Book Club

February 1st, 2018 | Erin Bernhard Erno | SpinDance

At SpinDance, one of our universal commitments is to seek and communicate truth within our teams as well as for our customers. We want to make sure that our teams are dynamic, energetic about being at here, and always learning new ideas to improve themselves and to create better solutions for our customers. Last November, the SpinDance Book Club was created to engage the SpinDance team in dialog around various skills and interests that range from management of teams to being better developers.

Group of professionals meeting to discuss a book

What We’re Reading

As a group of 17 SpinDance staffers, we brainstormed a number of different books and decided to kick off the inauguration of the book club with Peopleware: Productive Projects and Teams. We decided to start with this book not only because it’s relatively short and structured in a way that each chapter presents one key idea for us to discuss, but because it gives us a top-level view of organizational goals that any staffer can relate to. All project failures described in the book resulted from people issues and not technology issues. This can be seen not only in the book, but also in our own experiences.

At SpinDance, the successes of our projects with customers are measured both by our team interactions internally and customer interactions externally. As an organization that delivers custom software for our clients,…

Read more

From Demographic Profiles to Real World Data: How Insurance Companies are Leveraging IoT

January 19th, 2018 | Tom Miller | IoT Notes

Insurance companies have traditionally relied on demographic and geographic information to assess coverage rates for customers. Loss has typically been a trailing indicator, rather than a preventative event. IoT is changing this methodology and changing it quickly.

At the Insurance IoT USA Summit, held this year in Chicago, IL, the best of insurance companies were leading, listening and learning in sessions about how IoT innovations are and will transform the industry. SpinDance was there to share our IoT experience and be part of the narrative.

insurance IoTIoT is generating the data necessary to offer insurance customers the most personalized coverage — and rates — possible, while also providing the technology and information for further improvement. That data, which helps drive rates down and margins up, is available to large and small carriers alike, creating the disruptive playing field that is being experienced by many other industries: adapt or die.  An estimated 1,400 tech savvy insurance startups are demonstrating an awareness and readiness for the opportunity.

A few examples of IoT in insurance include:

  • Usage based auto coverage which collects data on mileage, speed, braking and turning will identify safe drivers regardless of age or gender.
  • Home, office, commercial and industrial facilities are equipped with sensors to detect internal and exterior environmental conditions, with two way communications able to respond instantly to smoke,

Read more

Protocol Buffers in Swift: A Use Study in Brushing Your Teeth

December 29th, 2017 | Sean Hamstra | Development

When dealing with the Internet of Things (IoT), developers are faced with many technical hurdles connecting multiple devices together over a computer network. Each of these devices is likely to speak its own language and require specific code to translate data from the other devices. More device, more languages, more work, more money.

For example, let’s say you just bought a connected toothbrush. You get it all set up and decide to take it for a spin. According to the instructions, all you as the user needs to know is how to brush your teeth. There’s obviously a lot more happening within the device, however. As you brush, sensors are working to track things like battery power, usage time, and perhaps even motion with a gyroscope and accelerometer. Embedded code in the toothbrush, written in C, is used to track all of this data and upload it to the cloud. Then a cloud app, perhaps written in Ruby, accepts and stores this data while running some analysis on the motion and timing of your usage.

You set your toothbrush down and whip open your Android phone and fire up the app, eager to see your progress and get your brushing rating. Once again, there’s much more happening than meets the eye. Triggered by you opening the app, the Java code in the Android app fetches the data from the cloud and displays it on a nice graph for you….

Read more