Feeds

WTF are... connected appliances?

I want my automated kitchen, and I want it now

Internet Security Threat Report 2014

All washed up

In short, the fridge that orders its own food might sound like a good idea, but it needs changes to product packaging, to supply chains and, perhaps most difficult of all, to the way we stagger round the kitchen half asleep making breakfast. And who’s going to do that, just to please a household appliance?

Another appliance that’s been made internet aware – and like the fridge, Korean company LG Electronics is a key player in this area – is the washing machine. A machine that’s never going to let you mix clothes with colours that run is boon to the careless, but like the fridge, it suffers from a key problem: to identify what’s being put in the drum, clothes need to be RFID tagged.

The other key feature – an ability to download updated wash programmes from the internet – is less revolutionary. Online firmware updates are common now for TVs, disc players and many other devices. And, short of a new wonder-fabric taking the world by storm, it’s hard to see much call for it. Yes, you can customise programmes online – but I can’t help feeling that for most users, buttons like ‘quick’ or ‘extra rinse’ will offer all the tweaks they want.

Jura Impressa F-90

Jura's Impressa F-90: nice coffee, poor internet security

High-end coffee machine maker Jura had a go at the IP appliance game too, with the F-90, which allows you to program your coffee requirements over the network. It unfortunately achieved more attention for a security flaw than for anything else, and the connectivity kit is now no longer available.

Read it and weep There are areas in which connectivity can be useful – but they’re not exactly new technology. Telemetry has been around for ages, and using the internet to transmit readings is just the next logical step from dedicated modems or GSM units.

Readers who have oil delivered for their heating may well already have wireless meters, which can be used to trigger an automatic order when the supply is running low.

Home energy meters, too, are increasing in popularity, allowing you to monitor usage online and, when you strip away the hype, LG’s own latest “THINQ” generation of connected appliances, unveiled at CES this past January are, ultimately, much more about telemetry than anything else, with the focus more on saving energy and money than on fridges that shop for themselves.

Intelligent flash storage arrays

Next page: Keep up at the back

More from The Register

next story
Hi-torque tank engines: EXTREME car hacking with The Register
Bentley found in a hedge gets WW2 lump insertion
What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
You fought hard and you saved and earned. But all of it's going to burn...
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.