<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
    <title>Insufficient.Coffee - machine-to-machine</title>
    <subtitle>On a mission to solve communications security issues for the whole Internet. That, and drink coffee.</subtitle>
    <link rel="self" type="application/atom+xml" href="https://insufficient.coffee/tag/machine-to-machine/atom.xml"/>
    <link rel="alternate" type="text/html" href="https://insufficient.coffee"/>
    <generator uri="https://www.getzola.org/">Zola</generator>
    <updated>2014-07-04T00:00:00+00:00</updated>
    <id>https://insufficient.coffee/tag/machine-to-machine/atom.xml</id>
    <entry xml:lang="en">
        <title>Prevalence of Well Known Peers in the Internet of Things</title>
        <published>2014-07-04T00:00:00+00:00</published>
        <updated>2014-07-04T00:00:00+00:00</updated>
        
        <author>
          <name>
            
              Unknown
            
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://insufficient.coffee/well-known-peers-iot/"/>
        <id>https://insufficient.coffee/well-known-peers-iot/</id>
        
        <summary type="html">&lt;p&gt;The Internet of Things is imagined to be a interconnection of sensors and physical devices of all kinds into the world’s information systems: a collection of machine-to-machine communication devices used to gather and distribute information about the world, contrasted with the human-machine interactions making up the bulk of today’s Internet. The machine-to-machine model places new restrictions on the common practices for security, as the standard practice of user authentication becomes troublesome without the regular involvement of a user.&lt;&#x2F;p&gt;</summary>
        
    </entry>
</feed>