Business Bullying – “You’re Fired”

SirAlan[1]Here in the UK bullying is a hot topic right now. It’s hit politics and press headlines with allegations of a culture of bullying in Conservative Central Office. In this case, sadly, the bullying might have been a factor in the suicide of a young political activist. And whilst this is happening in the nearly real world of politics, we see the latest series of The Apprentice, with Lord Sugar setting a dreadful example to his aspirant apprentices and TV viewers.

Lord Sugar has made (and sometimes lost) a lot of money and is presented as the stereotype of a successful businessman. We are supposed to believe that his style is tough and business-like. But in the show he bullies the contestants, ridiculing them with often arbitrary (and indeed sometimes ridiculously stupid) judgement. He is in the position of overwhelming power and wields that power in an unpleasant and macho alpha-male act. It could never happen in real life, could it?

Well, yes, it could and it does.

“My name is Cliff and I was bullied.”

Let me come out and declare an interest – not so long ago I was the victim of prolonged bullying in the workplace. I might not look like a typical victim of bullying – I’m not young, small, female, shy or insecure. I was doing a job for which I was well qualified, and had a good relationship with my fellow workers. But there was an endemic bullying culture at the very top of the company – a number of the ambitious directors felt the need to enhance their career paths, bigging themselves up by belittling the people working for them. They were intent on getting to the top by climbing on the bodies of their staff.

Bullying was random and arbitrary, mostly by my direct manager, but also by another Board member. I was undermined in meetings with other staff members, and there  was a general lack of respect in interactions.

Despite success in similar jobs for 30 years, I began to wonder if it was me. At the weekend I’d be thinking positively, and looking forward to the coming week – I enjoyed the work and the company. By the end of Monday all those positive feelings had been metaphorically beaten out of me. I was doubting my own abilities – everything I did turned out badly. It became a self-fulfilling prophesy.

What to do?

My manager was seen as a hero figure by his colleagues on the Board. There was no realistic way of rectifying the situation from within. I was not the only person to be suffering in this way. Eventually the decision was made for me. I was told to stop making arrangements for my next business trip. When I asked why, I was taken to a meeting room and told that I was to be made redundant. My feeling was of overwhelming relief. I was losing a good job and approaching my 60th birthday, but concerns over future income were as nothing compared to the emotional release of leaving.

If you’re in a job where you’re being bullied by management, remember these points:

  • It’s not your fault — you shouldn’t need to make allowances for the management
  • If the macho bullying culture is part of the management style it’s not likely you’ll be able to change things — you will probably have to move on. It’s best if you can accept the inevitable and do it on your terms
  • You only have one life — don’t let your job ruin it. You will feel a lot better when you move on
And now?

I had fantastic support from friends and colleagues and took the opportunity to start freelance work, which has allowed a whole bunch of new experiences and the recognition that the problem was not me.


Bullying in any aspect of life is distasteful. In the work environment it’s as bad as it can get. We spend most of our waking life at work, and it pays for our way of life. For many it’s also a source of intellectual satisfaction and a major component of their identity. In companies like the one I was in, Lord Sugar style bullying behaviour by senior managers is admired by their peers and actively supported by HR, and despite the good intentions of employment law, there is no solution except getting out. All things considered, being made redundant was a good outcome – a little compensation for the wholesale disruption of my career by a small number of talented but flawed individuals – all of whom have incidentally since left the company.

Read more about the Tory Party bullying story here:


Get in touch if you’d like to talk discuss how my skills and experience could benefit your company.

Windows 10 Upgrade – was it worth it?

Windows 10
Was it worth it?

When I was asked that question I was in the middle of solving consequential problems, and my thoughts were probably tainted by having to address a bunch of issues that shouldn’t happen, but always do. I wasn’t convinced it was worth it.

Now that I’m mostly recovered from upgrade trauma I thought it would be good to summarise my experience of the upgrade process so that perhaps others might benefit, and in later years I might re-read it to obliterate any thoughts I might have in the future that some similar process might just work.

The starting point

This upgrade was on my personal laptop – at work we’re going for a wait and see policy. At home I had both a laptop and a desktop machine running Windows 7, and each had the Windows 10 icon waiting tantalisingly in the task bar. I had decided to use the desktop machine as the guinea-pig. That plan was immediately blown out of the water, because it turned out that its graphics card uses a GPU chip that is not supported by Windows 10. The laptop however was eligible.

The process

In essence the process is click the button, go away for a while and come back to a Windows 10 machine – and indeed, to a first order that’s exactly how it worked (unlike the experience of a friend, whose machine hung at around the 60% point and had to be restarted). I didn’t measure it, but the elapsed time would have been measured in hours. But that reboot into the new Windows was just the start.

Now what

On entering this new world there’s a bit of configuration to be done, as might be expected. The new Windows 10 user is encouraged to open a Microsoft account, so that the system can be more helpful (and Microsoft can gather a whole bunch of data). This would be more useful if the Microsoft ecosystem were spread across all my platforms, and I’ve already sold my soul to Google, but I signed up anyway and, once the graphics automagically adjusted for my wide screen display, all was looking good, until I tried to interact with my network printer. The HP drivers have always been fragile, and they’d gone missing. A search of the HP web site was not notably helpful – I was beginning to wonder whether my printer was not supported, and all this was a ploy to sell new kit. But then I stumbled over a not very well signposted page This had links to the right drivers, and clicking them gave me my first experience of the new Edge browser, which was now set up as the default. It all sort of worked, and all I had to do was tread the well-trod path of the HP printer driver installation. A couple of hours later, all was well on that front.

What else

Windows 10 seems to install IIS as default. I sometimes run software which requires a local web-server using HTTP port 80. IIS was now sitting on that port, so we had a problem. After some investigation of whether this would be solved by shutting down IIS or in some other way, I concluded that I could make my local web server listen on port 8080. Problem solved, and indeed better than ever, since that also avoided contention with Skype which had happened in the past.

Using the laptop on my lap with touch pad rather than mouse, I realised that the side scrolling feature of the Synaptics touch pad had gone away. Looking at the web, I soon realised that I was not the only person to notice this, and that the solution is at best messy, involving the forced installation of older drivers, which will probably get overwritten again. I will learn to live with this downgrade.

Drive mapping seems to be different. With Windows 7, I used a virtual drive hosted over the network on my desktop machine as a backup destination. Windows 10 won’t let me map that destination as a virtual drive. Not a big problem – just send the backup to a rather more complicated destination path.

On a similar theme, sharing across the network is not quite right. In theory I should be able to set up a Homegroup on both machines and then set up sharing on this. It doesn’t work. It didn’t work properly before, but it now fails to work in a slightly different and more annoying way. This was solved by being more liberal with sharing than I would like.

Cortana was the new big thing – Microsoft’s version of “Siri” or “OK Google”. If you’re British it doesn’t work. Microsoft says it does, but they are American, and fail to realise that Britain and indeed the rest of the world is not part of America. It doesn’t work, and my computer tells me so. Rumour has it that if you pretend that you’re American, get Cortana set up, and then revert to being British, it might work. Frankly, if they can’t sort this simple thing, I can’t be bothered to try it.

Print to PDF in Edge doesn’t work. Ironic solution is to open the page in Internet Explorer – it does work there.

Was it worth it?

So now I have the joy of three different Windows operating systems on my home PCs – XP, 7 and 10! Windows 10 seems to mostly work. The upgrade stole an entire day of my life, and the computer now has slightly fewer features than it had before. In essence it looks like a tarted-up version of Windows 7, and offers me nothing new. But as someone working in technology who likes to keep up with the latest stuff, it was an experience worth having, with not too bad an outcome…

…and I have absolute faith that the current shortcomings will be addressed in due course.

Update 2017 – how’s it been to live with?

I still have the same laptop, I still have Windows 10 installed, and it works just fine. Of the comments above, the only significant issue has been the loss of scroll functionality for the touch pad. I did download an older driver that worked correctly for a while, but as expected, in subsequent upgrades the touch pad was downgraded. Cortana now works even for the English – with a proper English accent, but I don’t really care, because I find it a bit weird talking to a computer. And I very rarely use Edge, so I have no idea whether I can now print to PDF.

This article first appeared in

Life of Pi

Very interesting meeting of Cambridge Wireless Future Devices SIG, hosted by ARM, with the title “The Future is Already with Us – How Younger Users of Today’s Technology will Drive the Technology of Tomorrow”

[Note: I have included links to each of the presentations but after an update to the Cambridge Wireless website these are at the time of writing (23 October 2017) no longer accessible. I have left those links in the text because at some later date the content might be made available, either publicly or to CW members only]

mbed LPC1768
ARM mbed LPC1768 platform

First off was an excellent presentation by Chris Styles of ARM tracing the history of computing platforms and the evolution of the ARM mbed OS and associated prototyping platforms, allowing platform-based embedded computing.

Chris was followed by Jason Fitzpatrick of the Centre for Computing History. Another story of the evolution of technology platforms, and how they have affected our lives. Jason reflected that we have moved from all watching our TV together, through solitary computer use in our bedrooms, back to all being together, but playing individually with our tablets and mobiles. As well as providing a home for historic computing and gaming platforms, the Centre for Computing History provides inspirational experiences for children and adults.

Raspberry Pi
Raspberry Pi

The highlight of the afternoon was Jack Lang, whose first-hand account of the development of the Raspberry Pi was informative and at the same time hugely entertaining. We learned about the reasoning behind its development, the surprise of its popularity, and how the manifold applications of the Pi have gone far beyond the original aspirations.

The final presentation was from Steve Marsh of GeoSpock, who expounded on the value of data with associated geographic reference as the number of connected devices grows. This concept can be expanded to include augmentation of the real world and blurring of the real and the virtual. We are moving from the world of the “glassholes” (users of the Google Glass) to the even more exciting HoloLens from Microsoft.

Microsoft HoloLens
Microsoft HoloLens

With thanks to ARM for hosting us, Cambridge Wireless for their usual excellent event management, and to the masters of ceremonies, John Roe and Peter Whale, who both happen to be ex-colleagues.



To see an example of the sort of innovative work that is possible on a Raspberry Pi platform, see

After the Cloud – the Fog

Picture attribute miikajom, under Creative Commons Licence
Picture attribute miikajom, under Creative Commons Licence

Just when you’re getting the hang of one buzzword, then along comes another. We’re now happy to discuss storing our data in the Cloud with Google Drive, and don’t think twice about using Cloud services such as Salesforce. We are beginning to take on board the concept of the Internet of Things, where billions of devices (“Things”) in the real world use the Internet to make information available in the Cloud, and therefore to other Things, or people, or Cloud services. We can be convinced that the billions of Things in the Internet of Things will between them generate lots of information, which will become Big Data when we put it all together. And now we have…

the Fog.

Like so much jargon it’s not clear where the Fog came from, but Cisco is a name that keeps popping up in this context (see They tell us Fog computing takes the concept of Cloud computing and moves it to the edge of the network, closer to the end user. This is good for Internet of Things applications requiring rapid real-time response, or where failure of the system when a communications link fails would not be good – applications like industrial automation, or transport. There is still a connection to the Cloud, but Fog computing takes care of the low level processes in much the same way as our bodies respond instantly to an outside stimulus with a reflex action, only telling the brain some time later what has happened.

The advantages of Fog computing include:

  • Performance – potential for real-time response
  • Reliability and robustness
  • Improved quality of service
  • Superior user experience
  • Reduced data traffic over the internet

To see how this makes sense, consider a security system using multiple cameras. Using video processing techniques the system can recognise the difference between a cat and a burglar, and will automatically alert the operator for one of those and not the other.

Processing in the Cloud
Processing in the Cloud

With a simple Cloud architecture, all of the video from all of the cameras would be transmitted to an application in the Cloud – all the time. The Cloud application would process the information from all of the cameras, looking for events requiring an alarm. With multiple installations, we’re looking at a lot of data and a lot of processing. And of course, if the Internet connection were to fail at just the wrong time, bad things could happen.

Processing in the Cloud
Processing in the Fog

If we move some of the processing to the Fog, we have an autonomous sensing system which sends very little data to the Cloud, until it detects a threat, at which point it can send an alert and the associated video – all much more efficient and robust.

As with so many ideas in the Internet of Things, this is not a new concept – but it might just be handy to have a simple word to describe it.


[Update 3 November 2017] In the three years since this article was initially written, the concepts of the fog, and edge computing have come increasingly to the fore in Internet of Things (IoT) applications. Here are two recent pieces by some of the big players:

A guide to Edge IoT analytics – a blog by IBM
Enabling Management of Edge Computing – a blog by Cisco

I initially wrote this article for the Argon Design web site

Buzzword Bingo (2) – Internet of Things


Picture: Esteban Romero – Flickr

It’s the topic everyone is talking about. Cisco has said that there will be 5 billion devices connected to the Internet by 2015 and 50 billion by 2020. Some, not satisfied with mere Internet of Things (IoT), go bigger with the Internet of Everything. Various other issues are conflated in IoT discussions including Machine to Machine (M2M), Big Data and Internet Protocol Version 6 (IPv6).

A few months ago I was reading an earnest thread discussing whether or not a particular application could be regarded as IoT. I don’t think this obsession with definition is very helpful. I believe that IoT is a catch-all for the phenomenon of increased device connectivity. Devices which used to stand alone can be, and increasingly are being connected. At the moment it’s all rather ad hoc and piecemeal – what used to be standalone devices are now connected standalone devices. This isn’t a bad thing, but it is really only a small part of the journey.

Connecting the devices like this is the low-level technical enabler, the M2M element, but the magic ingredient of fully fledged IoT is the integration of data from multiple sources. As an example of might be done, parameters from multiple sensors (such as temperature sensors in multiple rooms, outside temperature sensors and motion detectors) can be combined with data from other internet sources (such as the weather forecast) and user input via a web page to control heating systems. This could be made more responsive by interpreting users’ calendars or position feedback from mobiles to predict behaviour. A generic implementation of this multi-faceted mash-up would still be challenging. Integration of devices requires standards, which may either be proprietary standards implemented by a single manufacturer or open standards allowing multi-vendor solutions. There will be false starts and failures (for instance Google PowerMeter, providing an energy dashboard for the home was retired in 2011), but the scope for product development is immense – whether or not the Cisco numbers and time-scales turn out to be realistic, we have a trend which will be unstoppable.


This link gives an interesting explanation of IoT



The RFID world is more than your Oyster….

….it can also provide cheap device connectivity.
Flexible RFID application

I like to think that I am generally well informed about the possibilities of wireless communication systems, but a while ago I was working on a project in the consumer product sector using an interesting feature of RFID technology which I had never seen before.  It made me realise that there is a whole new world of user interaction with consumer devices which is now possible with the help of NFC capable smartphones.

Most of us are familiar with the idea of RFID wristbands for identifying people at music festivals, RFID cards for door entry systems in the office and smart payment cards such as London’s Oyster cards.  What is less well known is that other exciting applications are made possible by the powerful data-measurement and data-logging functionality of the latest RFID chips, in combination with smartphones and tablets which include NFC technology that can communicate with these chips.  The huge consumer take-up of mobile devices equipped with NFC communications opens the door to the development of new consumer products which build a deeper level of user engagement and the ability for manufacturers to collect valuable product and market information.

It is not the purpose of this article to describe the technology in detail, but a basic understanding of the capabilities of NFC (Near Field Communications) and RFID (Radio Frequency Identification) is useful to recognise the possibilities.  NFC is a recent development of the more general RFID technology which has existed for many years.  Both terms describe standards for wireless data communications between devices at relatively low data rates over short range.   NFC technology is being increasingly built into smartphones and tablets (since this article was originally written Apple have released the iPhone 6 with NFC hardware, but at the moment it can’t be accessed by anything apart from ApplePay) – it operates at a range of a few centimetres, and supports two forms of communication:

  • Two-way peer-to-peer – two NFC equipped devices (phones or tablets) can exchange information when held in close proximity.  The data exchanged may be used directly, or more commonly used as a simple means of pairing, to set up another communications channel (Bluetooth or Wi-Fi Direct).  This is the basis of Android Beam on various Android devices and S Beam, from Samsung
  • One-way – an NFC equipped phone or tablet can read information from an RFID tag.  The tag is typically an inexpensive unpowered passive device, which can be mounted along with the associated antenna in a consumer device or even on a flexible surface such as paper

It is the one-way communications capability that opens exciting new possibilities for consumer-facing products.  In many cases these would not be feasible if the product had to bear the high cost of the NFC reader – but many consumers already have that on their mobile device, and are itching to find exciting things to do with it.

As a first step, a simple application is smartphone automation.  Cheap passive RFID tags can be located on your desk or in your car.  When the smartphone is placed near to the tag it runs an application which can change the phone’s behaviour – perhaps it goes into silent mode in the office, or hands-free mode in the car.  But this is just the start.

Reading temperature with RFID
Mock-up of product displaying temperature with RFID connectivity

A simple passive tag returns a fixed ID when read by the smartphone, a bit like reading a bar code – but it doesn’t have to be that simple.  An unpowered passive tag can also have data measurement and data logging capabilities, with the ability for instance to read an analogue value.  A smartphone or tablet can collect critical and variable information from the tag.  This could be a parameter such as temperature, pressure, humidity, voltage or current.  If such a chip is embedded in a consumer product, the user can read the live value of a parameter from the product by running an app provided by the product manufacturer.  The parameter’s value can be time-stamped, stored and displayed by the smartphone or tablet, and sent into the internet Cloud via the mobile device’s internet connection.  Remember, although this RFID device is reading an analogue parameter, and transmitting that value back to the smartphone, it requires no power source – it harvests all the power it needs from the signal it receives from the smartphone or tablet.

If the product is such that the tag can be provided with power (only a tiny amount is required), then the tag can operate in power assisted passive mode with a real-time clock.  This gives the system the ability to take periodic sensor readings autonomously, rather than purely on demand.  When interrogated with a smartphone or tablet via NFC, a series of time-stamped readings will be available, revealing the history of the parameter, so you could look at the temperature profile an item of food as it travels from the supermarket to your freezer, the moisture profile of the soil in your greenhouse, or changes in your blood sugar level over a period of time.

For more complex products, an NFC chip can work alongside a microcontroller, so that the NFC interface can provide a rich set of data covering many parameters.

The common factor with all of these systems is that the product end of the system is relatively cheap and simple – a passive RFID tag can cost less than $1.  A custom design for a high volume product could be much cheaper.  The customers’ own smartphones and tablets are providing the raw processing power, user interface and internet connectivity.

When customers are able to interact with a product using their familiar mobile devices, they become more engaged with that product.  With a well designed app, the product manufacturer can support that product interaction, promote a closer relationship with the customer, the development of a customer community and social networking links.  As a side-effect, the manufacturer can also gather data about their product and their customers, providing both technical and marketing opportunities.

With Internet of Things being the buzzword of the day, RFID technology could be an effective way of allowing low cost consumer devices to join more expensive products in having an internet presence.

Buzzword Bingo (1) – Big Data

data“Big data is like teenage sex: everyone talks about it, nobody really knows how to do it, everyone thinks everyone else is doing it, so everyone claims they are doing it…” (Dan Ariely)

I was working with a data product before I had ever heard the term “big data“. Nesstar had taken an EU funded development all the way to an excellent commercial product, developing the concept of the semantic web to give structure and meaning to data, enabling those data to be disseminated on the web to users with a standard web browser. Users could browse, analyse and visualise data from very large data sets.  The aim was to allow non-expert users to find data relevant to their needs and then, most importantly, to derive meaning from the data.

Ten years on, big data is now a hot topic, often in relation to the Internet of Things – the proliferation of sensors in the Internet of Things will generate lots of data. In many ways the challenge is the same as that addressed by Nesstar – how to gain meaningful insight from large amounts of data.  The difference is in the diversity of the data.  Nesstar worked on static data that had been carefully prepared and uploaded on to a server – data preparation was a major effort.  The new big data story is often about dynamic data collected from many sources, some of them real sensors, others on the internet – the data sources might be controlled by a range of organisations. The data will often be near real-time – there is likely to be little scope for manual intervention in data preparation. The process will in many cases be machine-based from end to end. The common feature is that for big data the challenge is for systems to make sense of the information, either for presentation to humans, or as input into machine controlled systems.

This all means that there’s something for everyone in big data ranging from acquisition, communication, data management and storage and perhaps most importantly the applications making sense of and making use of the data. There are questions of who owns the data (whether it’s analysis of your location or browsing habits as collected by Google, or your electricity consumption as measured by your smart meter) so even the lawyers can take part.

Fortunately for those of us involved in product development, there is still plenty to be done in pulling all these elements together.


The English tea ceremony

I once watched my father-in-law making a pot of tea, and it was a fascinating study in the futility of any efforts we make in terms of energy saving.  It went something like this:

  1. Completely fill kettle
  2. Allow kettle to boil and turn itself off
  3. Switch kettle on again to ensure that the water is truly boiling, allowing it to turn off automatically
  4. Use some of the hot water from the kettle to “warm the pot”
  5. Switch the kettle on again just to be sure, waiting until it switches off at a vigorous boil
  6. Pour the water into the teapot
  7. Refill the kettle and switch on again to provide hot water lest it be necessary to top up the pot
  8. After suitable time for brewing, and pour tea
  9. Switch on the kettle again to ensure that the refill water is truly hot, waiting until it switches off
  10. Refill teapot

By the time all of this has been done, we have used something like twice as much energy as was actually needed to make the required quantity of tea. The rest of the energy has been wasted as latent heat in boiling water, heating water that wasn’t needed and reheating water that wasn’t used as soon as it was available.

I was at a Cambridge Cleantech meeting a couple of weeks ago, and despite being associated with energy and smart meters for a few years, it provided a sudden blinding realisation on the disinformation associated with smart meters.

In order to have the joy of a smart meter we, as domestic consumers, are set to spend around £15b, which will no doubt be more than £20b when it happens.  The official analysis suggests that this will be offset by benefits – but the margin between cost and benefit is very narrow, and almost certainly less than the error in numbers inevitably distorted by the political requirement to justify the policy.  A large component of the supposed benefits is related to the energy saving effect of smart meters…

…which takes me back to the English tea ceremony.  The installation of a smart meter will not of itself significantly influence the behaviour of my father-in-law, and in truth will have very little direct effect on energy consumption overall.  The energy saving benefit is a fallacy.

I suspect that the primary effect of the smart meter will be to assist the energy supplier to bamboozle the consumer with complicated and incomprehensible tariffs, presenting attractive looking deals and stinging the customer who fails to play the game.  It’s a common model in consumer pricing, as evidenced by budget airlines, mobile phones and banks.  This all works out well for the utilities, as consumers are forced to pay for the tools which will be used to manipulate them.  Any overspend (which will undoubtedly happen in a complicated IT and communications system) will be subsidised by the Government (and therefore by the taxpayer), and the utility cartel will sit back and exploit the benefits.

Let me make it clear that I am not against smart meters and smart grid.  These are tools which should enable utilities to provide reliable energy supplies in the most cost-effective way, and are fundamentally a good thing.  What is not so good is taking consumers for a ride and pretending it’s all good for them.

So 42 isn’t the answer, and Venture Capital probably isn’t either

I had two interesting evening engagements last week – although they arguably had a common link, they provided two very different approaches to looking at the future.

Cambridge Wireless Inaugural Prestigious Lecture – Herman Hauser

I was present at this event in the glorious Møller Centre to support Blendology’s connectivity product in a trial with Cambridge Wireless. The attendees were indeed prestigious, and who could be more prestigious as a presenter for this inaugural lecture than Herman Hauser. In his talk entitled “What next in Communication?” he started by telling us his secret for foretelling the future.  He has spent years looking for the pattern, and at last he has found it.  It’s totally random.  So now we know.

We were guided through history, with a reminder that (for some of us) communication at 110 baud was not that long ago.  Let me drop in a few keywords and history will provide the final judgement:Hauser Google Glasses

  • Optical Burst Switching
  • Internet of Things
  • Envelope tracking power amplifiers
  • Femtocells
  • Game changing UIs – touch, voice, gaze
  • Machine learning
  • MOOCs

One interesting point he made was that machines have displays and we don’t – I’m not sure I’d totally agree.  Another important message I took away was that in any control system the response time of the control loop must be considerably better than that of the entity it’s controlling – this is an important one for economists to ponder.

Funding & Venture Capital for Technology Companies

It’s the first time I’ve heard professionals (except perhaps the emergency services) advising potential customers to avoid their services, but this was the message from Simon Cook, Alex van Someren and Laurence Garrett, in a session chaired by Alex McCracken of Silicon Valley Bank. It was refreshing to hear such honesty about what we all really know – these guys are in it to make money. If you go to them, you will pay with a large part of your business.  If you can find any other way of funding your activities, then do it. Customers were highlighted as the most important source of funding. Another source mentioned was crowd funding – good for market testing of an idea.

The point was made, as it is so often, that Cambridge is good at ideas, but not so good at commercialisation.

My takeaway was a reminder that we all find it difficult to give up an idea. The opportunity cost in life is high – know when to give up. That’s a good one to bear in mind.

On Cows and Sewers

Cambridge Wireless Connected Devices SIG “I Don’t Use Wireless Yet – What Can It Do For My Business?”

Life is like a sewer – what you get out of it depends on what you put into it. Tom Lehrer US humorist.

diagram courtesy of Pearson Scott Foresman / Wikimedia commons

Yesterday I spent an interesting afternoon at Cambridge Consultants learning and talking about the future of connected devices – and the likelihood of of sharing the world with 50 billion of them.  The afternoon turned out to be a bit of an old-boys (and sadly it was mostly boys) reunion.  I met ex-colleagues from my days at Origin, Symbionics and Qualcomm, some of whom I haven’t seen for around 15 years, along with putting faces to some names I knew from my Sentec days.

We had some excellent and interesting presentations:

  • a good analysis from Tim Ensor of CCL on how we might get to 50 billion connected devices, half of which are “foreseeable”, and the other half “aspirational”
  • a review of technology uptake by Steve Kay of Anglian Water, along with the gloriously named Sewernet, aiming to create smart sewerage.  It always surprises me when I’m reminded of how conservative the water industry has been in uptake of technology (but it also surprises me that it’s impossible to send an email to HMRC)
  • insight into smartphone security by Laurent Simon from the Computer Labs.  In essence the message seems to be buy iPhone if you care about security.  This rather depressing message was particularly relevant to the next presentation…
  • a very professional presentation by Craig Tillotson of Faster Payments, about the soon to be released pan-industry mobile payments system, allowing us to use our mobiles to pay anyone for whom we have a mobile phone number.  A noble goal, but to the uninitiated there seems to be a whole bunch of issues in relation to privacy and security
  • last, and certainly not least, the remarkable story of Well Cow as told by David Tagardine of TTP – wireless telemetry straight from the stomach of a cow. The physical scale of the wireless bio-sensors swallowed by cows was truly impressive

I certainly hadn’t been expecting to learn a lot of gory detail about bovine digestive anatomy and sewers. I had been expecting to hear a lot more about internet connected “things” such as thermostats and other sensors, smart grid, smart appliances (the ubiquitous internet connected fridge did get a mention), and about technology enablers for making radical reductions in device cost, so I was surprised but certainly not disappointed by the afternoon.  Thanks Cambridge Wireless for a fascinating afternoon.