Language Selection

English French German Italian Portuguese Spanish

Smart home dream could be for all

Filed under
Sci/Tech

Smart homes in which a single button controls lighting, heating, security, music, film - everything digital - has long been promised, but has never quite delivered.

This is partly down to technology that cannot talk to each other. It has also traditionally been a dream that only the uber-rich can make reality.

But with rising broadband speeds and connections, the rise of wireless networks, and cheaper more powerful machines in homes, it is getting easier to realise the smart home dream.

A lot more now can be controlled from one central machine, with one central and easy interface, which is what convergence is supposed to be about.

Hooking devices together, either wirelessly or with cables, is another matter.

Technical know-how is just one of the stumbling blocks many face when trying to work out why one gadget will not talk to another.

Homes that are smart are not just about being able to send pictures and video to different rooms either.

It is also about the more mundane technologies in life, such as heating and lighting, and security technologies.

Central locking for homes, for example, could be all controlled through fobs in the near future, for instance, or even through biometrics.

Will Levy, founder of Touch of a Button, imagines one day soon being able to pick up the phone directory and easily find the equivalent of a registered "digital plumber".

For a reasonable fee, they could come and install your fresh bit of kit, advise on security, and be on hand at the end of an e-mail or phone for aftercare services.

Mr Levy's vision of "digital plumbing" is squarely aimed at ordinary people who want their homes smart and more connected.

Full Story.

More in Tux Machines

35 Open Source Tools for the Internet of Things

In a nutshell, IoT is about using smart devices to collect data that is transmitted via the Internet to other devices. It's closely related to machine-to-machine (M2M) technology. While the concept had been around for some time, the term "Internet of Things" was first used in 1999 by Kevin Ashton, who was a Procter & Gamble employee at the time. Read more

IoT tinkerers get new Linux hub & open platforms

Cloud Media, the maker of entertainment box Popcorn Hour, launched a project on Kickstarter, Inc. that will add to the growing number of smart hubs for people to connect and control smart devices. Called the STACK Box, it features a Cavium ARM11 core processor, 256MB DDR3 RAM, 512MB flash, SD slot, 802.11n WiFi, Bluetooth LE 4.0, Z-Wave, standard 10/100 Ethernet port, optional X10 wired communication, 5 USB 2.0 ports, RS-232 port, 2 optocoupler I/O, Xbee Bus, Raspberry Pi-compatible 26-pin bus and runs Linus Kernel 3.10. IT also features optional wireless communications for Dust Networks and Insteon with RF433/315, EnOcean, ZigBee, XBee, DCLink, RFID, IR coming soon. Read more

Citrix and Google partner to bring native enterprise features to Chromebooks

Chromebooks are making inroads into the education sector, and a push is coming for the enterprise with new native Chrome capabilities from Citrix. Google and Citrix have announced Citrix Receiver for Chrome, a native app for the Chromebook which has direct access to the system resources, including printing, audio, and video. To provide the security needed for the enterprise, the new Citrix app assigns a unique Receiver ID to each device for monitoring, seamless Clipboard integration across remote and local applications, end user experience monitoring with HDX Insight, and direct SSL connections. Read more

Is Open Source an Open Invitation to Hack Webmail Encryption?

While the open source approach to software development has proven its value over and over again, the idea of opening up the code for security features to anyone with eyeballs still creates anxiety in some circles. Such worries are ill-founded, though. One concern about opening up security code to anyone is that anyone will include the NSA, which has a habit of discovering vulnerabilities and sitting on them so it can exploit them at a later time. Such discoveries shouldn't be a cause of concern, argued Phil Zimmermann, creator of PGP, the encryption scheme Yahoo and Google will be using for their webmail. Read more