The Fun Side of the Internet of Things (IoT)

Rie Vainstein • October 4, 2018

The Fun Side of the Internet of Things

With so many, more serious, applications of the Internet of Things (IoT) it is nice to see development of applications that are “just for fun”.

The Internet, as we all know, is the thing that makes the world go around. We use it in pretty much every aspect of our lives: work, school, research, shopping, entertainment, social interaction. The list goes on and on. Nowadays, we could not imagine life without it. It has integrated itself to the very fabric of our personal and interpersonal existence.

All in the Past

We have all heard of Wireless. Radio waves – the basis of wireless – were scientifically proved to exist in the mid-1880s. It wasn’t until the mid-1890s that Marconi created the wireless telegraph system. Going back a bit further in history we also remember Baron Schilling who first sent an electromagnetic telegraph in Russia in the early 1830s. He was followed by Morse who invented and released his radio code in the mid-1840s. We’ll come back to these at a later time.

In the old days, all computers were plugged in – with wires – and connectivity was painfully slow. They were all called “desktop computers” because we had no other available choice. I know it seems hard to imagine, but we didn’t have the capability of wandering around with our laptops, iPads, or even our smart phone (which had not yet been invented – shock, horror!). We were well-and-truly stuck at our desks.

Introduction of Wireless Enablement and the birth of Internet of Things (IOT)

WiFi capability was only released to consumers as recently as 1997, when a committee with the unassuming name of “802.11” was created. The ideas the committee had on standardization was later created into a coherent set of rules called IEEE802.11. Adherence to this set the standards enabled different devices from different manufacturers to communicate. It was tweaked a little, a couple of years later (802.11b), and has gone through a number of revisions since that time. (This is not the point of this post, so I am not going to go into the whos, whats, and whens of that story, at this time.)

From this Wireless capability has developed the Internet of Things (IoT) – a way in which things can be connected to the Internet, which was unheard of 20 years ago. And, to develop the idea even further, is the concept of the Internet of Everything (IoE), which proposes that a way can be determined for everything to be connected to everything else, and to the Internet. The more developed and popular of the two, at this time, is IoT.

Practical Applications of the Internet of Things (IoT)

There are a multitude of applications for IoT now available to us – and which we take for granted. From simply going to work and connecting your laptop or smartphone to the network, to having your fridge sense something missing and auto-order food from the grocery store.

There are, additionally, a plethora of industrial applications for enabled technology: even farmers can use wireless sensors, stuck in the ground, to instruct the watering system when to water the crops!

There are countless ways in which computing devices can wirelessly connect to each other and to the Internet and have practical and helpful uses… and often fun ones, too!

New Idea of Fun

A new and fun usage has very recently been revealed within a “Harry Potter” style bar!

IoT-enabled wands are provided to each customer, who then uses their wand to perform functions. They can turn on lamps, open cabinets, and “magically” stir their concoctions!

Drinks can even be obtained by the customer simply holding their wand close to the wall. The requested liquid is then mysteriously dispensed through the tap – with no need to touch levers or buttons. How cool is that?

This looks like fun, doesn’t it?:  https://www.bbc.com/news/business-45642270

Chance to Learn More

If you want to learn more about Wireless, Internet of Things (IoT), and other related technologies, check out our range of related Cisco classes:
CCNA (Associate) level: WiFUND
CCNP (Professional) level: WiDESIGN , WiDEPLOY , WiSECURE , WiTSHOOT
CCIE (Expert) level: CIEWL1

If you are looking to advance your IT career, perhaps in Internet of Things (IOT), and would like to discuss your options, contact NC-Expert today.

NC-Expert Blog

By Rie Vainstein March 31, 2025
A Digital Shield for Your Online Adventures As tech professionals, we often spend a good chunk of our lives navigating the digital realm. Whether you’re troubleshooting a network, coding a new app, or just binge-watching the latest series, one thing is clear: your connection to the internet is a double-edged sword. It’s both incredibly convenient and, if not properly secured, a potential vulnerability. Enter the VPN (Virtual Private Network) our trusty, digital bodyguard. If you’re not already using one, or if you’re not entirely sure why you should, let’s walk through some of the reasons why a VPN is essential for anyone working in IT and, frankly, for anyone who uses the internet. What Is a VPN? In simple terms, a VPN creates a secure, encrypted tunnel between your device and the internet. It allows your data to travel securely, masking your IP address, and ensuring that no one (be it hackers or nosy advertisers) can track or intercept your online activity. Think of it as your personal “cloak of invisibility” in the digital world! 
By Phil Morgan March 13, 2025
Troubleshooting Wireless Networks with Ekahau: A Professional Engineer’s Guide Wireless networks have become the backbone of modern business infrastructure. From office environments to large-scale enterprises, ensuring a seamless wireless experience is essential for productivity. However, despite advancements in Wi-Fi technology, network performance issues often arise, ranging from signal interference and dead zones to capacity overloads and channel mismanagement. To tackle these issues efficiently, professional engineers rely on powerful tools. One such tool, Ekahau AI Pro, has become a gold standard in the wireless industry for troubleshooting and optimizing Wi-Fi networks. This blog delves into troubleshooting wireless networks using Ekahau tools, providing practical examples and technical insights to guide professional engineers in improving network performance.
By Rie Vainstein March 3, 2025
Futureproofing Our Security In our increasingly connected world, the security of digital information has never been more critical. From banking transactions to private communications, our data is constantly transmitted and stored across the internet. The current systems that protect this data rely on cryptography, a branch of mathematics that helps keep information secure by encoding it in ways that are difficult to decode without the proper key. However, with the rise of quantum computers, traditional cryptography is facing new and significant threats. This is where Post-Quantum Cryptography comes into play. What is Post-Quantum Cryptography? Post-Quantum Cryptography (PQC) [1] refers to cryptographic algorithms that are specifically designed to be secure against the power of quantum computers. Quantum computers, once they become practical, will be capable of solving complex mathematical problems much faster than classical computers. This will render many of the encryption methods we rely on today [such as RSA (Rivest, Shamir, and Adleman – initials of the inventors) and ECC (Elliptic Curve Cryptography)] vulnerable to attack. Quantum computers operate on quantum bits, or “qubits”, which can exist in multiple states simultaneously, unlike classical bits that are either a zer (0) or one (1). This allows quantum computers to perform certain calculations exponentially faster than classical computers. For example, in a matter of seconds, a quantum computer could potentially break an RSA key, which is considered secure by today’s standards. As quantum computing technology advances, the need for PQC becomes even more urgent.