Facebook’s Updated iPhone App Aids Internet of Things

Buried in the details of last week’s update to Facebook’s now-native iOS app was a small bit of technology that could have potentially big impact on the future of the Internet of Things.

The technology is called Message Queuing Telemetry Transport (MQTT), an IBM-developed protocol for real-time messaging over networks with low power and bandwidth. MQTT is now under the hood within Facebook’s iOS app’s messaging features, part of Facebook’s efforts to pull in the features from its native Messenger app.

“We use MQTT to update notifications, messages, and bookmarks. At application startup, we walk the dependency graph and ensure that our MQTT service has started before we start listening for new notifications. Even as we add new features, our modular system ensures that our application setup happens in the right place, at the right time,” wrote Facebook engineer Jonathan Dann on the company’s engineering blog last week.

For Facebook app end-users, the immediate effect of using the push-driven protocol for the updated app won’t immediately be apparent, but it portends some potentially big features down the line.

In the short-term, however, MMQT is going to get a big boost in adoption cred from Facebook’s use. Messaging in the Internet of Things sector is still gelling around one standard implementation, as device manufacturers figure out how to get sensors and other micro-devices to best communicate with the Internet and from there the rest of the world. MQTT is one such protocol and tent.io is another.

Both MQTT and tent.io have very strong social media components, which may at first seem incongruous with the Internet of Things. But the messaging protocol that can handle social media messaging (as MQTT will do on the new version of Facebook’s iOS app) and messaging from hardware will be seen as a much more universal protocol. And in the world of standardization, that perception may be enough to win the gold.

Redmonk analyst James Governor sees Facebook’s commitment as a big win for MQTT.

“IBM has been seeking pervasive status for its message queue technology since I joined the industry in 1995. It looks like it just finally got there. I don’t want to confuse a protocol with an implementation but in a week when Dave Winer questioned the status of tent.io and app.net began its play for real time stream utility status I can’t help noting that IBM and MQTT.org are in the game,” Governor blogged.

Governor’s reference to Winer’s thoughts on the tent.io protocol is significant, since Winer is the inventor of the RSS newsfeed protocol.

“RSS won not because of its great design, but because there was a significant amount of valuable content flowing through it. Formats and protocols by themselves are meaningless. That’s what I say about specs. Show me content I can get at through the protocol, and I’ll say something,” Winer said on his own blog.

For Governor, Facebook’s investment in MMQT sets the content bar very high.

“Whether or not you like Facebook, there is now going to be a metric crapload of content flowing across MQTT. It just got anointed by Facebook,” Governor said.

MMQT’s anointment won’t mean much to average users - yet. But if the Internet of Things and social media development communities can rally around one protocol, it will be one big step towards the goal of getting people and objects communicating with each other more efficiently 

All thanks to Facebook.


View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Futurist's Cheat Sheet: Biometric Authentication

The problem is not new. One way or another, people have to validate their identities. I am trying to enter a building or a Web service that only Joe Smith should have access to, I need to offer evidence that I am, indeed, Joe Smith. For decades, authentication has required cards and passwords. In the near future, you might just use a part of your body. (The "Futurist's Cheatsheet" series surveys technologies on the horizon: their promise, how likely they are, and when they might become part of our daily lives. This article is Part 2.)

Use a thumb-print to unlock a door, an iris scan to unlock a smartphone. Maybe use your voice to interact with your mobile device, PC or television. Biometric data can be used for verification (say, allowing access to a personal bank account) or identification (say, identifying you to law enforcement agencies). 

Pick a body part, any body part. There is a good chance that it has a unique identifier that can be used authenticate an individual human. Of course, not all body parts have practical applications in all situations. For instance, hormone analysis would be an awkward choice of authentication for entry to a building. 

Criminal forensics provided an early proving ground: Identification based on fingerprints became a viable form of authentication in the late 1800s. DNA performs much the same function today. 

Cloud technology is giving rise to new, ubiquitous forms of biometric authentication. Physical identifiers for large groups of people can be uploaded to a server and used for purposes such as accessing data on a company computer, gaining access to secure buildings or unlocking smartphones. Storing biometric keys in the cloud makes it much easier for devices to recognize and recover the data and for users to put it to work.

The rise of a digitally connected society has led technologists to propose the notion of “one true login.”  Today, you may have one password for Facebook, another for Gmail and so on. At the same time, you may have an ID card such as a driver’s license. Depending on where you work, you may have an ID badge that you have to scan to get into your office. What if all of these functions could be replaced with one biometric identifier unique to you? 

Such an innovation could improve personal and data security an dalso improve user experiences across a variety of devices. Much of modern computing has been built around the standard user interface: keyboard and screen. That is starting to change as computers, smartphones, tablets, and televisions incorporate cameras that recognize your face, touchscreens that know your fingerprint and microphones that recognize your voice. Quick, convenient biometric authentication would tie these devices more seamlessly into daily life.

The technology for biometric authentication is already widely available. The true challenge comes in building an acceptable infrastructure where the technologies can be easily implemented. Part of the challenge is cost in replacing or augmenting legacy authentication methods such as the magnetic keycard system in a hotel or an enterprise. Another challenge is legal. Many states and countries have privacy laws on how certain types of biometric identifiers can be used, inhibiting how enterprises and commercial ventures can deploy these authentication methods. These privacy laws are important as people are extremely sensitive in how their biomedical is stored and used. 

Research firm Gartner focuses on the future business aspects of biometric authentication in its most recent Hype Cycle report, but the consumer realm poised to see practical applications. Smartphones can be unlocked through a variety of biometric keys such as voice, facial recognition or a fingerprint. Apple, Samsung and Microsoft will likely lead the way. Companies like Nuance are tuning mobile devices to the user's voice. And enterprises won't be far behind. Before long, companies will implement biometric authentication for onsite building access and smartphone security.

Book -- Anil K. Jain et al. -- Introduction to Biometrics

Michigan State University -- Partial Face Recognition: Alignment-Free Approach

Microsoft Research --  Progressive Authentication: Deciding When to Authenticate on Mobile 


View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

 
I Phone © 2012 | Designed by LogosDatabase.com, in collaboration with Credit Card Machines, Corporate Headquarters and Motivational Quotes