They have sensors equipped on them so they can detect vibrations. Using vibration detection, you figure out when a bridge is likely to fail and intervene before that happens. This has huge implications. We saw in minnesota the collapse of the bridge there. Recently i10 outside of los angeles. This is a huge problem in the United States. Using connected devices to get realtime information about which bridges, highway structures should be replaced sooner. I pressed the button everyone told me not to press. I press it again. Hows that . The other thing transforming homes. This is really interesting way. People are familiar with the net thermostat. Now net has whole line of devices. They have along with that, my favorite is a, they have a smoke alarm and Smoke Detector and Carbon Monoxide detector. This is not just a Smoke Detector connected to to the internet. Why does that even matter right . Working together with the rest of your home system, if there is fire detected in your home for e
Thank you for being here and listening to the presentation that we have. For those that may not come and this is a u. S. Federal agency. So one of the institutions and federal government that are specializing in science and engineering. [inaudible] and so how do we know what has occurred with the cyberfiscal system. Weve done a good job promoting the title. Will offer you guys learn from this presentation today. And so im going to talk about this as well with the cyberfiscal system a little bit. And that is more than system control. And we have more robustness and resilience. So theres a basic critical system and at the same time. [inaudible] and this is kind of like a variety. By the way i know that you guys all know what it is. Its really something that we look for later. Can kind of touch it. Everything that can connect. There are more layers that are more important than there probably were. And essentially what he does is collect data and it doesnt always have a lot of value. You h
What are we doing to protect god and from a planned protection, are you on schedule. So that is a big thing that came out in cyberspring activity that basically cios i was on the boat for reporting literally on a daily basis. Taking a look at who has a day of an tiny qquebec and why. What assets today have been why do they have it . Making sure folks that dont need it dont have it. So by telling scott and others if we need to address this in a timely fashion. Again, the third area dealt with the factor of authentication and accelerating now. Another one dealt with making sure if he does have a cbm in place as well as accelerating einstein. So the metrics that were put in place were in support of not only the program, but also the areas of priority identified as critical cybersecurity areas to address part of closing the loop. The third area is communication. Communications from a machine perspective making sure it is made available to departments and agencies through price breaks as we
Sorry. Go back. So, when we think about the internet of things, we in industry, in government, we think in history and government, we think about industrial control. We think about lighting, parking. Those are all very good and things that can save us money and increase our efficiency and do those things, but our users are thinking other things. Users are thinking about their smartphone, their smart thermostat, toaster, if you will, and all of the many devices they want to bring. To our users, this has become very important. Especially when you talk about the new workforce that is entering our businesses and our government, the younger generations are coming in with this preconceived notion all of these things are going to work. And in fact, bitcom did a study where they surveyed 14 to 29yearolds and they asked them, i cannot imagine life without . The answer was mobile phone was 97 . Internet was 84 . And a car, which was very becoming less important and most telling of this survey is
Are more places that the bad guys can attack. Theres more devices out there and not only are there more devices, but theyre in more places. You have to worry about all those places. Additionally with all those different device, there are a lot of different ways that you can find a weakness and sneak in to the device. Now, when you add that to the fact that the end points being created in the Consumer World are not really being designed with security built in. So theyre oftentimes designed to get to market very quickly. They want to beat their competition with this next new, greatest device. They want to keep it low cost so it can be adopted by more people. Theres a sensor out there thats about the size of my thumbnail. That is about 2 and it includes internet and can sense the moisture of maybe, the amount of moisture in a field. And so, theyre very inexpensive and theyre designed that way without security built in. Oftentimes using code that is either purchased or comes from open sour