Keeping A Lid On Your Data

Data Discretion

As discussed on CloudTweaks not too long ago, invisibility is the one thing that’s very important when bringing the Internet of Things to the kitchen. That is, the process of working a home appliance has to be convenient to the point of invisibility, just like it’s with tap water–it’s simply there when we need it, even if we don’t quite know how.

Then again, in this day and age we take ease of use for granted, because most non-techies wait until a new product has become convenient before going to the store. Furthermore, kitchen appliances are high-involvement purchases, and no one wants anything cumbersome or slow in their kitchen. It just has to work.

That’s why it can be argued that the most important thing for the way people will perceive IoT devices, both in their kitchens and in general, is this: what’ll happen to the data these devices generate? Let’s elaborate a bit. In a few years there will be millions of grown ups that have most of their lives documented on social networks. Millions of them will have been embarrassed by something they shared online, or perhaps something–like overly personal, intrusive ads or personalized spam–will have taught them the value of keeping touchy data to themselves. People are bound only to become more and more data-reticent in time.

This becomes crucially important for the long-term success of the IoT, because the data that will be recorded will become much more important once it’s recorded in our homes, not to mention when it’ll come right off our bodies as it is with wearables. It’s great if the fridge can remind us to get milk, a vending machine can help us stick to our diet, or a prep pad can suggest us something healthy to eat, but privacy issues are bound to spring up once a data-hungry app layer is added upon the digital ecosystem of our homes.

This was the case when people raised privacy concerns with the Nest acquisition by Google. The reason is quite evident: it’s just too close to home. And that’s the case with all of the household IoT devices. Even though benign and beneficial, there’s increased tension to know what exactly happens with the data pulled from the sensors. We wouldn’t want to have to scratch our heads if we find a weight watchers ad in our mailbox a month after we’ve started using our smart fridge.

The solution is simple: more user control over data. Not only should users control what data to share, but with whom to share it. Companies should be very conscientious about this, but in return they might find that their user base is much more cooperative. If inchoate policies like the “New Data Deal” come to fruition, perhaps we’ll see a future that’s clearer in terms of what we’re giving away and what, exactly, we’re getting in return.

By Lauris Veips

Bi Tools
BI Tools For Data Scientists Many data scientists prefer to use open-source framework to code scripts; after all, it’s something they already trust to work. Business intelligence tools like Qlik Sense, Power BI, or Tableau, ...
Matrix
When sci-fi films like Tom Cruise’s Oblivion depict humans living in the clouds, we imagine that humanity might one day leave our primitive dwellings attached to the ground and ascend to floating castles in the ...
Mitigation Security
Data scraping solutions When people hear the term data scraping, their first thought is often about how companies use this technology for competitive reasons – specifically to pull publicly-available data from millions of websites in ...
Alex Tkatch
Best Practices for Designing and Executing a Product Launch Nothing in entrepreneurial life is more exciting, frustrating, time-consuming and uncertain than launching a new product. Creating something new and different can be exhilarating, assuming everything ...
Rajesh Khanna
Implement Hyperautomation to Scale Automation Programs by 3X Most Digital Service Providers (DSPs) struggle to accelerate their path to Hyperautomation due to the complex processes with legacy systems and applications. Although Robotic Process Automation (RPA) plays a ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.