The KIT ─ Knowledge & Information Technology
No. 216 - 16 May 2018
Was this forwarded to you?
In This Issue
IoT Security Maturity Model
The Role of Fog Computing in Industrial IoT
A Vast Database of U.S. License Plates
Bill Curtis on Structural Software Quality
In the Next KIT
Seen Recently
Claude Baudoin

Consulting Services
  • IT Strategy
  • Enterprise Architecture Roadmap
  • Business Process Modeling & Analysis
  • Enterprise Software Selection
  • IT Innovation Briefings
  • IT Due Diligence
  • Executive IT Seminars
  • Cloud Computing
  • Security Maturity
  • Software Process
  • Knowledge Strategy
  • Technical Communities
  • Knowledge Capture
  • Taxonomy development
  • Enterprise Social Media
Contact Us:
cébé IT and Knowledge Management
+1 415 870 ITKM
Twitter: @cbaudoin
Previous KIT Issues
Forward this issue to colleagues and friends: use the "forward email" link below at left, rather than "Forward" in your email software, to preserve your privacy, give the recipient more options (their own unsubscribe link, etc.) and to give us better click-through data. Thanks!
An IoT Security Maturity Model
Security is, quite justifiably, one of the highest concerns when deploying an Internet of Things system. The Industrial Internet Consortium (IIC) has developed an IoT Security Maturity Model (SMM) and published a first white paper, IoT Security Maturity Model: Description and Intended Use. A more detailed "Practitioners Guide" will be released in the coming months.

The model proposes a continuous improvement cycle (assessment, gap analysis, planning, enhancement... and repeat). Security maturity is divided into three dimensions (governance, enablement, hardening), nine domains, and 18 practices -- these play the same role as the "key process areas" in the original software engineering capability maturity model (CMM) from which all other maturity models derive their name and inspiration.
The Role of Fog Computing in Industrial IoT
In this Embedded Computing Design article, Brett Murphy of RTI wrote a very clear description of the role of computing at the edge of the IIoT network, especially when the goal is to automate operations in real time. Brett sees IoT as evolving through three stages: monitoring, optimization, autonomy. As you move across this spectrum, the application of artificial intelligence becomes a core capability, but the need for low latency and high availability increases and makes it impractical to perform all the necessary analytics and prediction in the cloud. Sensor data needs to be processed near the devices. The author illustrates this concretely with the example of a wind turbine farm.
Building a Vast U.S. License Plate Database
The U.S. Immigration and Customs Enforcement agency is apparently amassing a vast database of vehicle license plates, collected through various means and provided by a private company, Vigilant Solutions. This is of course raising concerns about privacy, and the fact that this data is meant to help identify people and activities the agency deems suspect, including the home locations of suspected undocumented foreigners, without requiring a court warrant. More information here (article from The Verge, included in a recent issue of Vince Polley's Miscellaneous IT-Related Legal News).
Structural Software Quality
This is short notice, but the 2018 QUEST (QUality Engineered Software and Testing) Conference and Expo, taking place in San Antonio, Texas on May 21-25, will include a keynote by Dr. Bill Curtis, who runs the Consortium for IT Software Quality (CISQ). His talk on May 23 is entitled "Software Intelligence: Structural Quality Analysis and Machine Learning." See the abstract here.
In the Next KIT...
Expect to see a couple of sections devoted to takeaways from two events taking place this month in Europe.

The first one is the International Workshop on Cloud Computing Project and Initiatives (CCPI-2018), held in conjunction with the IEEE's 32nd International Conference on Advanced Information Networking and Applications (AINA-2018) in Cracow, Poland, on May 16-18. Claude Baudoin will present a paper on "The impact of Data Residency on Cloud Computing."

The second one is VIVA Technology, an innovation conference and exhibit held in Paris on May 24-26, with a stellar roster of keynote speakers including Satya Nadella of Microsoft, Ginni Rometty of IBM, Eric Schmidt of Alphabet, Dara Khosrowshahi of Uber, and more!
Seen Recently...
"We cannot, I believe, understand the current gender disparity in computing without understanding the history of women in computing."
-- Moshe Vardi, Professor of Computational Engineering at Rice University,
in an insightful article in the May 2018 issue of Communications of the ACM
entitled " How We Lost the Women in Computing."

"Through 2019, every dollar enterprises invest in innovation will require an additional $7 in core execution."
--Gartner analyst Claudio da Roid, quoted in