Installing Remote Heating Control

This is the second in a series of articles in which I am exploring Remote Heating Control – a technology of the future. Learn more about this series by reading the introductory article, called stepping into the future of smarter living.

In this article, I will be reviewing the installation of the technology I have had fitted in my home: Remote Heating Control.

The Parts

The install involved three main parts: the wireless hub; the wireless receiver; and a new thermostat.

Installation

The wireless receiver was installed first. This was installed near to my boiler, and receives the wireless signal from my new thermostat controller. The wireless receiver is connected to the boiler using a cable.

British Gas Remote Heating Control

My British Gas wireless receiver

After the wireless receiver was connected, Nick (the British Gas engineer who installed my technology) installed my new smart linked thermostat. This looked much more advanced than my previous thermostat controller, and wasn’t just a dial. My new thermostat controller has an LED display and four buttons for programming. Programming can be done via two main methods, on the device itself, or via the online portal. The online portal can be accessed either by smartphone or computer. The easiest way to manage my heating will be online.

British Gas Remote Heating Control

My British Gas smart linked thermostat

British Gas Remote Heating Control

My British Gas wireless hub

Finally, the wireless hub was installed. This is a small device, which plugged into my internet router and the mains – AC power supply. I needed one spare Ethernet port in my internet hub, and a free mains plug socket nearby, which I did. I imagine for most people the mains plug socket shouldn’t be an issue, as the likelyhood is that your router is near a plug socket, so an adapter plug or extension lead can be used. I would also imagine that you will have a spare Ethernet port in your internet hub, however if you are using all the available ports, you may need to buy an extension hub to ensure that you can still have all your devices connected.

How It Works

Here is a brief synopsis of what is now installed in my home, i.e. the technology that makes up Remote Heating Control. My boiler is now connected to a wireless receiver. This wireless receiver ‘talks’ (communicates wirelessly) with my smart linked thermostat, which communicates with my wireless hub. The wireless hub it plugged into my router and sends and receives information to and from the online portal.

To control my heating I can either login to the British Gas portal, online or via a smartphone app, text commands to my heating via SMS, or programme it manually. My new smart linked thermostat which can be used to control the system is wirelessly connected to my boiler. When I change settings on my smart linked thermostat, this affects the behaviour of my boiler, and the information is transmitted to British Gas, which updates the online system.

Opinions

I have a few opinions and thoughts on the installation that I would like to share with you.

The first is that Nick (the engineer) was very friendly, curious and acted professionally. He phoned me before his arrival to check it was okay with me still and let me know his estimated time of arrival.

When installing my wireless hub, Nick asked me to plug it in at the wall, and into my internet router. This is because he didn’t know exactly how my technology worked, and therefore didn’t want to damage it. I have a standard router, however I think it is good that he asked me to do it, yes it removes his liability, but it does mean that I know nothing was broken.

My impression of what British Gas staff (specifically engineers) are like is very good, Nick seem to be no trouble to deal with.

Regarding my smart linked thermostat, it is a little inconvenient that it runs on batteries. My old thermostat was directly wired into my boiler, however this one is wireless and takes two AA batteries. The batteries are no big deal really, I imagine it will get as routine as checking/changing a smoke alarm, however it is a task I had not anticipated I would need to do. That said, it will be easy to know when to change the batteries, as there is battery indicator online!

Online Control

In order to set up my online control I need to log in and get the devices to find each other. It was really easy, and the web based interface gives you a really well explained walk through. Once my devices had been discovered by the system, I was asked to create a four digit pin, which I would have to use when texting heating commands. If you get Remote Heating Control, it would be a good idea to write this down – which I did needless to say!

Next Time

In the next article in the series I will give you my first impressions of using Remote Heating Control for the first time. I will be exploring any issues I encounter, how it helps me, and the potential I believe it has.

BitTorrent Monitoring Report

On Tuesday the web was overrun with reports that BitTorrent users are being monitored by a host of different (and in some cases unknown) organizations. I would like to take a quick look at the actual document that spawned these headlines.

BitTorrent logoThe news is takes from a paper presented this week at the SecureComm conference in Italy by Tom Chothia and colleagues at the University of Birmingham.

The paper is free to read here.

All alarmism aside the paper looks at both indirect and direct monitoring techniques, the indirect being the type that is typically used to “catch” people who are illegally downloading films, music and other copyrighted materials, and the more expensive but precise direct means that various companies are employing.

In the paper the authors state that their contribution to the argument can be summed up as follows:

We determine that indirect monitoring is still in use against BitTorrent users and devise more effective techniques to detect peers engaging in it;

We find indications that certain entities engage in direct monitoring of BitTorrent users and provide features to detect such peers;

We also notice that direct monitoring, in its current form, falls short of providing conclusive evidence of copyright infringement.

This is a complex and technical paper, but certain things are noteworthy. The direct monitoring consists in creating false peers that connect to your IP address and monitor its use, be that downloading updates for Linux or watching War Horse.

A user is much more likely to be directly monitored if they are partaking in one of the top 100 objects for download, and in 40% of cases monitoring began within 3 hours of connection. The less popular the object for download, the longer it takes to become monitored. This suggests that those doing the monitoring (be they copyright authorities or private data collecting companies) spend more resources on popular downloads.

One thing I can take from this paper is that somebody is collecting an awful lot of data about a lot of people and their downloading habits, and I wonder why? And also what do they intend to do with it? Particularly as many lawyers deem the data collected as not strong enough evidence to use in a court of law.

How to safely operate a bring your own device policy

Technology is growing by leaps and bounds and companies of every size are constantly looking for ways to leverage all of the benefits that these technological advances can bring them. It may not be cost effective for companies of any size to jump on every single new technological wonder, even when the price of technology is at an all-time low.

There is a way for companies to benefit from the latest and greatest technological gadgets without having to make any type of monetary investment. Portable devices are making their ways into the hands of people all over the world. Just about everyone has a smartphone, and tablet computers are quickly becoming the norm.

Many companies are choosing to adopt a ‘Bring Your Own Device’ policy in order to take advantage of these technological advances without incurring any type of costs, but there are security risks involved with a Bring Your Own Device Policy. Here are five things that companies can do to ensure their data does not end up in the wrong hands.

Know who is accessing data, and what devices they are using to do it

The very first step towards a successful ‘Bring Your Own Device’ policy is understanding what types of devices are being used to access data. It is also important to understand which employees are accessing which data.

A security audit is a great way for businesses to get a better understanding of exactly what types of devices are being used by employees to access sensitive corporate data. This will help a company determine exactly how to move on to the next step in securing their data in the mobile world.

Decide what data devices can access

The very first conclusion that many companies are jumping to is restricting access to corporate networks via personal devices. This is not the right choice. A security audit should have identified what types of devices are accessing the network.

The next step to properly protect data is to classify it and the networks that are being used to send and retrieve the data. By classifying data, businesses will be able to get a much better look at the areas that need protection, and the areas that do not. Once the data has been classified it will be much easier to see the bigger picture. Companies will be able to set forth a policy that allows certain groups of people access to certain areas of data.

Identify problem apps

Not every app will play nice. Some apps have been known to have huge security vulnerabilities. These apps, without notice to the user can copy and send address lists and personal photos through the corporate network.

The two most popular mobile device operating systems are both guilty of these two examples. iOS which powers Apple devices, and the Android operating system have both been known to have these same security problems. Once the problem apps are identified, they can be prevented from being installed through company networks. Another solution is to restrict app downloads to a company approved app market place.

Create company policies to help reduce mobile security problems

Once these other issues have been addressed, companies will need to create strict policies that will teach employees what can and cannot be done with their own devices on a company network. If an employee uses their own mobile device to conduct work in the work place, a strict policy should dictate what he or she can or can’t do with the device. These policies must also have strict repercussions for any employee that chooses to violate them.

Enforcing policy with software

A security key on a keyboardThere are several solutions on the market that can and will help corporations manage all of this information. These resolutions are called Mobile Device Management Solutions. These types of solutions will allow corporations to enforce the policies that have been set during all of the previous steps.

A mobile device management solution will protect data, manage apps, address mobile device security, protect content, and protect emails. A mobile device management system will also be compatible with every major mobile device operating system on the market.

Allowing employees to use their own portable devices should not present a security breach to any company regardless of its size. Proper planning will always be the best way to prevent any sort of problems.