Feeds

Privacy? Forget it. Sell your brain and desires to the highest bidder

Web $9.95

SANS - Survey on application security programs

Comment All around us the toasters are getting smarter. Sadly, we don't seem to be keeping up with the program. We remain poor schlubs.

In the good old days, a toaster was just a toaster. It warmed bread and issued the odd electrocution. Tomorrow's toaster, however, brings with it a new set of functions that travel well beyond bread.

As we hear it, the toaster of the future will contain more silicon and communications systems. It will have sensors that can detect an upcoming failure, and alert you, via e-mail perhaps, to order a new toaster. Or maybe the toaster will order a new version of itself from the internet if you've enabled the self-upgrade feature. That future toaster may also talk to other gadgets in the home. Perhaps they'll agree on when they should shut down to save energy or to avoid a fire. Maybe they'll agree on the next brand for their upgrade cycle and make sure you get matching stainless steel appliances throughout the home or that your current penchant for pastel kit is obeyed.

None of this should sound terribly new. Overzealous technology folks have predicted the age of the internet-enabled toaster and refrigerator for years. "You've been getting your weather reports from the newspaper, TV and Yahoo! for years like suckers. Once you move to utopia, the weather will be displayed on your fridge door or coffee machine. The revolution is at hand."

What's more intriguing about the toaster of the future is the communications it will have with folks other than you. Maybe Wal-Mart will notice a toaster has left its shelves thanks to a sensor network. The retail giant's data warehouse systems will then spring into action and tell a weary guy in China to wake up and make a new toaster.

In the meantime, some government machine will be tracking all of the toasters making their way from China to the US. Thanks to something called Stream Processing, the Feds will be able to recognize if an unusual amount of toasters have entered the Chicago area. The same processing technology will then grab the toaster recipients' addresses and compare them with credit card, hotel, flight and phone records. Perhaps a pattern will emerge - an awful lot of the toaster buyers seemed to visit Vancouver this year while also dialing a chap called Tom Tiburban. "We've nailed it, Jim. Osama is in the Windy City, and seems to have recruited an army of toaster buyers to make a fantastically huge shock machine. They're going to dump it in Lake Michigan and kill whatever fish remain. I won't let this happen on my watch."

And if the government isn't tracking the inner-workings of your toaster relationships, then a company like Wal-Mart, Amazon or Facebook is. Chris Meyer, the CEO of Monitor Networks, describes this Brave New World as "The Offer."

Speaking to a group of scientists, computer geeks and marketeers this month at IBM's Almaden research center in San Jose, Meyer presented The Offer as the underlying principle behind a world where there is "no product without service and no service without product."

The Offer concept is a bit vague, but you can think of it as a company forming a lifetime bond with you. No longer do you buy a toaster, throw it away and then buy another one. Instead, you buy the toaster, receive some firmware upgrade service that promises to improve future toasting (or perhaps a bagel expansion pack) and no doubt other wonderful services. "We notice that you toast a lot in the weeks leading up to a vacation. Can we offer you discounted travel from a partner after sensing heightened toaster activity? Or perhaps you'd like those photos of your children displayed on the side of the toaster. No problem. Hold down the toaster button for one minute to trigger the photo purchase and display sequence provided by our friends at TstrPic."

Behind The Offer is a process where products and services "sense, respond, learn and adapt." That process looks like this, according to Meyer.

Chart showing Meyer's offer interactions

The Offer Lives

We don't want to freak you out too much, but part of this offer adaptation mechanism would involve, say, BMW pulling driving data from your cars. It will first use that information to help with your driving. Your car might use sensors to communicate with a nearby vehicle and discover that the driver of that car often breaks at the last minute. So, your car will, er, tighten up or something along those lines to deal with the crappy driver near it. Later on, BMW might collect all of the sensor data to produce cars for different regions that reflect the driving conditions of those locales.

Apparently, all of that would result in this:

Shot of a funky car from Meyer's slides

The Offer Car

We're too scared to show you what a post-Offer toaster looks like.

Peace through potting soil

The Offer feels a tad crazy. Can a toaster vendor really form a meaningful, lifelong relationship with a human? And what about a bag of potting soil?

But people are out there trying their hardest to make sure that sweaters - if not toasters - do bond with you. That's more or less the underlying goal of things like Facebook's Beacon, the eerie Phorm project and even Comscore's mouse peeping, to a degree.

IBM's recent Almaden Institute event explored the many ways that companies and people might use data in the coming years. We learned about the examples mentioned above and also discovered roadside sensors that can alert meter maids to law breaking cars, an oncoming torrent of scientific data fueled by the rise of supercomputing and all sorts of other people-tracking techniques.

Even though the discussions centered on exploiting data for new business models, the speakers were surprisingly measured. It may have been because most of them were researchers - folks forced to pretend they've got something to sell in order to keep their well-paying jobs.

You may be pleased to learn that the two-day event did include a session on privacy . . . from a Microsoft researcher . . . who thankfully seemed to want to protect your privacy. Go figure.

But what does privacy even mean in this world of intelligent toasters?

High performance access to file storage

Next page: Tweet Me a Fortune

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.