Feeds

Google's Nest gobble: Soon ALL your HOME are BELONG to US

3.2 billion reasons why the Chocolate Factory will own the Internet of Things

SANS - Survey on application security programs

Analysis Google’s proposed $3.2bn purchase of Nest Labs, a maker of internet-connected round-the-home devices, shows that the online advertising giant considers the Internet of Things a serious proposition. A very serious proposition.

It’s easy to be dismissive of the move. Nest is best known for an internet-enabled thermostat and a likewise cloud-connected smoke detector, both snazzy looking but ultimately prosaic devices. Why the heck, you might wonder, is Google willing to spend $3.2bn on a thermostat firm, especially when it values that company at more than 10 times its sales, derived from shipment figures?

Because Google doesn’t really care about the thermostat or the smoke detector, useful though they may be as devices and as products to sell. What it’s after is the platform Nest has created and upon which these products are based - where many, many more can also be built.

Nest has core hardware at the heart of its devices. Its founders are too smart to re-invent the wheel every time they develop a new product. It also has the server technology which bridges all the Nest devices out there in people’s homes - a fair few of them Google homes, according to Google’s Larry Page - and ties them to the apps on users’ smartphones. That server technology can undoubtedly scale far beyond the traffic Nest currently handles.

Together these elements form a platform that Nest, or Google, can sell as the foundation for other firms’ Internet of Things offerings. Imagine Google allowing anyone access to Nest’s core hardware and the software that runs on it, as it already does with the Android operating system, but retaining the server smarts, forcing anyone using a product based on Nest technology to adopt Google as a service provider (again as Android users must).

Nest founder and VP of Engineering Matt Rogers insists the Google grab won’t see users’ domestic data being mined on Google’s servers, which will undoubtedly be a key concern among many owners of Nest kit - as it should be for anyone embracing Internet of Things devices.

“Our privacy policy clearly limits the use of customer information to providing and improving Nest’s products and services,” says Rogers. “We’ve always taken privacy seriously and this will not change.”

The question of data ownership is going to be of increasing importance in the Internet of Things world, especially as the technology evolves beyond basic hardware-talks-to-phone into broader hardware-talks-to-commercial-servers setups. And this is an approach - whatever Nest says about privacy - which has now been given 3.2 billion endorsements by a company that is all about drawing business intelligence from ordinary folks’ data (albeit willingly given).

Internet of Things coverage tends to centre on the essential novelty of linking "non-technology" products, like thermostats, to the cloud to give them extended remote control. But these devices can also host sensors which feed back environmental data about the location in which they are situated. Google’s servers can crunch those numbers to analyse usage patterns and thus extract information to, say, allow homeowners to use their heating more efficiently, reducing their energy costs.

If that seems incompatible with Nest’s existing privacy policy, Google simply has to do what it always: provide an opt-in to its energy efficiency or other service in which punters get the benefit for free in exchange for voluntarily surrendering their data. Especially now that we live in a world where every now product or service we buy requires we establish yet another online account. Give us your data, Google will say, and we’ll give you a single sign-in for all of that.

Whether Nest continues with its current approach - making cloud-connected devices that it sells under its own name - or it attempts to become a foundation technology upon which other companies construct their devices or Internet-enable existing devices remains to be seen.

This is what some rival Internet of Things players, most notably Electric Imp, are trying to do: to become not a branded device-maker along the lines of Apple or Samsung, but a technology provider styled on Intel, with their own "inside" sticker placed alongside the manufacturer logo on the connected fridge, car, oven, thermostat, bike lock, burglar alarm, electricity meter et cetera.

Nest may very well try to have both cake and a full belly, and adopt both approaches, especially if Google wants to give the device-side technology away in order to buy itself a massive market share, just as it has done in the smartphone market with Android.

Google’s ownership of the Internet of Things starts here. ®

3 Big data security analytics techniques

More from The Register

next story
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
OpenBSD founder wants to bin buggy OpenSSL library, launches fork
One Heartbleed vuln was too many for Theo de Raadt
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Got Windows 8.1 Update yet? Get ready for YET ANOTHER ONE – rumor
Leaker claims big release due this fall as Microsoft herds us into the CLOUD
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
Patch iOS, OS X now: PDFs, JPEGs, URLs, web pages can pwn your kit
Plus: iThings and desktops at risk of NEW SSL attack flaw
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Apple inaugurates free OS X beta program for world+dog
Prerelease software now open to anyone, not just developers – as long as you keep quiet
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.