{"id":889024,"date":"2026-02-19T08:00:55","date_gmt":"2026-02-19T08:00:55","guid":{"rendered":"https:\/\/www.electronicsweekly.com\/?p=889024"},"modified":"2026-02-26T15:51:14","modified_gmt":"2026-02-26T15:51:14","slug":"changing-roles-for-the-iot-and-security","status":"publish","type":"post","link":"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/","title":{"rendered":"Changing roles for the IoT and security"},"content":{"rendered":"<p>As the IoT has evolved and changed, so have the requirements for efficient performance and security, says Nick Wood.<\/p><div class=\"elect-content\" style=\"margin-left: auto; margin-right: auto; text-align: center; \" id=\"elect-827409855\"><div id=\"x02\">\r\n<script type=\"text\/javascript\"> if ($(window).width() <= 768) { googletag.display('x02'); } <\/script>\r\n<\/div>\r\n<\/div>\n<div id=\"attachment_889025\" style=\"width: 310px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-889025\" class=\"wp-image-889025 size-medium\" src=\"https:\/\/static.electronicsweekly.com\/wp-content\/uploads\/2026\/02\/10150819\/Insight-a-300x225.webp\" alt=\"Changing roles for the IoT and security\" width=\"300\" height=\"225\" srcset=\"https:\/\/static.electronicsweekly.com\/wp-content\/uploads\/2026\/02\/10150819\/Insight-a-300x225.webp 300w, https:\/\/static.electronicsweekly.com\/wp-content\/uploads\/2026\/02\/10150819\/Insight-a-440x330.webp 440w, https:\/\/static.electronicsweekly.com\/wp-content\/uploads\/2026\/02\/10150819\/Insight-a.webp 749w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-889025\" class=\"wp-caption-text\">Picture Credit: Peter Linforth<\/p><\/div>\n<p>IoT, or internet of things, is a vague term, but the most general definition would be devices that talk to each other without human directed intervention. Early implementations were typically just adding connectivity to previously standalone electronic apparatus. Often these connections were wireless and allowed a device to be configured and monitored remotely. Sometimes a phone or some other device such as a Wi-Fi router acting as a gateway could provide connectivity to the wider internet.<\/p><div class=\"elect-test\" style=\"margin-left: auto; margin-right: auto; text-align: center; \" id=\"elect-707883598\"><div id=\"DFP-EW-InRead1\">\r\n<script type=\"text\/javascript\"> if ($(window).width() > 768) { googletag.display('DFP-EW-InRead1'); } <\/script>\r\n<\/div>\r\n<BR>\r\n<\/div>\n<h2>Vision for IoT<\/h2>\n<p>Over time the vision for IoT has grown more ambitious, with solutions involving networks of interconnected devices in diverse settings including industrial systems, healthcare, smart homes and buildings, as well as personal wearables. This in turn has imposed requirements on the IoT devices, driven by both hope \u2013 of seamlessly integrated systems working across short and long distances; and fear \u2013 of such widely connected networks offering many avenues of attack for malicious actors.<\/p><div class=\"elect-post-content-2\" style=\"margin-left: auto; margin-right: auto; text-align: center; \" id=\"elect-653413479\"><div id=\"DFP-EW-InRead1-Mobile\">\r\n<script type=\"text\/javascript\"> if ($(window).width() <= 768) { googletag.display('DFP-EW-InRead1-Mobile'); } <\/script>\r\n<\/div>\r\n<\/div>\n<h2>Multi-protocol devices<\/h2>\n<p>One key trend is multi-protocol devices. Early IoT often required only a simple point-to-point connection via Bluetooth, Wi-Fi or some other protocol. Most application-level functions were proprietary. Next-generation devices often require multiple connectivity options, perhaps Bluetooth for provisioning or other local connectivity functions and Wi-Fi or Thread for wider network connectivity.<\/p>\n<p>Interoperability is another driver; all device manufacturers know interoperability and choice are important market drivers. IP connectivity can be a foundation, but there are also open application-level protocols for certain market segments, for example, Matter, for the smart home, digital addressable lighting interface protocol for complex lighting solutions or controller area network (CAN) bus for vehicle systems.<\/p>\n<p>All this flexible connectivity is very appealing, but it comes at a price: more demands on storage for multiple protocol stacks, RAM to run them efficiently and processing power to handle the real-time requirements of running concurrent connections. Open application protocols provide versatility, but there is an inevitable overhead involved in interpreting and encoding their messages in terms of processing and communication bandwidth.<\/p>\n<p>To put this in more concrete terms, Insight SiP\u2019s first generation of Bluetooth low energy modules with onboard processors offered 256kB of storage, with 32kB of RAM, powered by an M0 Cortex processor running at 16Mhz. By contrast the latest generation device will support processor speeds up to 320Mhz and offer 2MB of storage and 1MB of RAM, as well as supporting multiple protocols such as Thread, Matter, Zigbee and a CAN bus peripheral.<\/p>\n<h2>AI at the edge<\/h2>\n<p>All this processing capability is not just for running protocols. Next generation IoT devices are required to be the hub of sophisticated applications. Communications bandwidth is often a constraint. So rather than just sending raw data on to the next stage or to the cloud, devices will intelligently process data on board. This will avoid network congestion and enable low latency response to inputs. Next-generation applications are implementing \u2018AI at the edge\u2019. Machine learning algorithms are trained on servers offline, but can be downloaded to a device so that they can act autonomously for simple functions. Examples include voice recognition, people counting\/monitoring and facial recognition.<\/p>\n<h2>Power efficiency<\/h2>\n<p>Increased processing and radio demands can easily lead to devices becoming more power-hungry. While battery technology has improved, it has been at a slower rate than the semiconductor world. Not all IoT devices are battery-powered, but many are, so power consumption is a key issue in IoT devices.<\/p>\n<p>There have been two main strands to keeping power consumption under control. The first is to improve the silicon, using smaller processor nodes, which enables more efficient processing and radios. The other approach is to be smarter. Dual core devices with separate radio and application processors and sometimes peripheral processors can ensure that only the parts of the system that need to be active at any one time are awake, and the rest can be in a low power sleep state.<\/p>\n<h2>Security<\/h2>\n<p>Early IoT devices had very limited security features. A basic application lock system might prevent a malicious actor accessing the application code, but anyone with access to a device could do what they wanted with it relatively easily. More connected devices opens up big security risks, as more functions can be initiated remotely and any malware transmitted from one device to another.<\/p>\n<p>Even if product manufacturers were willing to ignore such concerns, in the EU at least, the Cyber Resilience Act is making it obligatory to take security into account to launch a certified product on the market.<\/p>\n<h2>End-to-end security<\/h2>\n<p>Individual links in a communications chain are either reasonably secure by design or can be made so. Bigger risks are incurred when you have a more complex network of multiple links, where there is a large \u2018attack surface\u2019 for a malicious actor to intervene, especially where some parts of the network may be public and thus outside direct control. Providing end-to-end security is therefore a key component of any security architecture.<\/p>\n<p>What this means in practice is using a secure mechanism such as public\/private key encryption so that even if a malicious actor is able to intervene somewhere in the system, they cannot read information or inject malicious data in it.<\/p>\n<h2>Key storage and provisioning<\/h2>\n<p>A public\/private key mechanism can be effective in encrypting data and authenticating the end user and any software update received over the air, although this introduces further demands on the IoT device at the end of the chain.<\/p>\n<p>Encrypting and authentication processing can take significant computing power. Devices will increasingly have dedicated crypto accelerator blocks or even separate security processors.<\/p>\n<p>A public\/private key mechanism is only as secure as the keys used in it, so devices will need secure key storage and ideally a secure processing block around it. In practice this means that keys can be written to a device, but never read back and the security code runs in a secure domain, so that even if an attacker has access to a device, they cannot access the keys or calculate them.<\/p>\n<p>The protection of the secure domain can be in core software and ideally will have hardware protection, so even advanced probing of the silicon cannot identify the keys.<\/p>\n<p>A key issue in implementing such a secure system is placing the first set of keys into it, a process known as provisioning.<\/p>\n<h2>The Cyber Resilience Act<\/h2>\n<p>Within the EU, the Cyber Resilience Act requires that security be considered and implemented throughout the device lifecycle. It is not entirely clear what this means in practice. It seems that manufacturers of connected devices will be required to monitor potential security breaches and issue updates to fix potential issues, which in turn would have to be securely delivered and authenticated. This requires additional free storage on devices to be able to receive an update patch, and then a secure boot mechanism to load the new software.<\/p>\n<p>The trend for IoT devices is clear \u2013 bigger capacity, more features, more powerful processors, while being able to operate under battery power if required. The simple single mode devices of even a few years ago are being updated with new advanced multicore designs often supporting multiple protocols.<\/p>\n<p>Security is no longer going to be an optional extra and devices will have to offer dedicated security components to support this. We will be able to do things on IoT devices unimaginable a decade ago, but with a corresponding increase in challenges to designers to succeed.<\/p>\n<div class=\"clear\"><\/div><div class=\"author-info\"><img decoding=\"async\" class=\"author-img\" src=\"\" alt=\"\" \/><div class=\"author-info-content\"><h3>About The Author<\/h3>\n\t\t\tNick Wood is director, sales and marketing, Insight SIP\n\t\t\t<\/div><\/div>\n<p><a rel=\"image\" href=\"https:\/\/www.electronicsweekly.com\/market-sectors\/internet-of-things\/\" target=\"_blank\" rel=\"noopener\">See all our IoT content<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the IoT has evolved and changed, so have the requirements for efficient performance and security, says Nick Wood. IoT, or internet of things, is a vague term, but the &#8230;<\/p>\n","protected":false},"author":9,"featured_media":889025,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12695,12640],"tags":[12892,12904],"class_list":["post-889024","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-of-things","category-news","tag-iot","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Changing roles for the IoT and security | Electronics Weekly<\/title>\n<meta name=\"description\" content=\"As the IoT has evolved and changed, so have the requirements for efficient performance and security, says Nick Wood. IoT, or internet of things, is a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Changing roles for the IoT and security | Electronics Weekly\" \/>\n<meta name=\"twitter:description\" content=\"As the IoT has evolved and changed, so have the requirements for efficient performance and security, says Nick Wood. IoT, or internet of things, is a\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/static.electronicsweekly.com\/wp-content\/uploads\/2026\/02\/10150819\/Insight-a.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@ElectronicsNews\" \/>\n<meta name=\"twitter:site\" content=\"@ElectronicsNews\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EW Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/\"},\"author\":{\"name\":\"EW Staff\",\"@id\":\"https:\/\/www.electronicsweekly.com\/#\/schema\/person\/496caa11063670e48dc64a819c2a1dba\"},\"headline\":\"Changing roles for the IoT and security\",\"datePublished\":\"2026-02-19T08:00:55+00:00\",\"dateModified\":\"2026-02-26T15:51:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/\"},\"wordCount\":1281,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/static.electronicsweekly.com\/wp-content\/uploads\/2026\/02\/10150819\/Insight-a.webp\",\"keywords\":[\"IoT\",\"Security\"],\"articleSection\":[\"Internet of Things\",\"News\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/\",\"url\":\"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/\",\"name\":\"Changing roles for the IoT and security | Electronics Weekly\",\"isPartOf\":{\"@id\":\"https:\/\/www.electronicsweekly.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/static.electronicsweekly.com\/wp-content\/uploads\/2026\/02\/10150819\/Insight-a.webp\",\"datePublished\":\"2026-02-19T08:00:55+00:00\",\"dateModified\":\"2026-02-26T15:51:14+00:00\",\"author\":{\"@id\":\"https:\/\/www.electronicsweekly.com\/#\/schema\/person\/496caa11063670e48dc64a819c2a1dba\"},\"description\":\"As the IoT has evolved and changed, so have the requirements for efficient performance and security, says Nick Wood. IoT, or internet of things, is a\",\"breadcrumb\":{\"@id\":\"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/#primaryimage\",\"url\":\"https:\/\/static.electronicsweekly.com\/wp-content\/uploads\/2026\/02\/10150819\/Insight-a.webp\",\"contentUrl\":\"https:\/\/static.electronicsweekly.com\/wp-content\/uploads\/2026\/02\/10150819\/Insight-a.webp\",\"width\":749,\"height\":561,\"caption\":\"Picture Credit: Peter Linforth\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.electronicsweekly.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Changing roles for the IoT and security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.electronicsweekly.com\/#website\",\"url\":\"https:\/\/www.electronicsweekly.com\/\",\"name\":\"Electronics Weekly\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.electronicsweekly.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.electronicsweekly.com\/#\/schema\/person\/496caa11063670e48dc64a819c2a1dba\",\"name\":\"EW Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/17af4c4ee6baee33ab5823837b3cad05d8cbd280f1a56aa0642592d81194d867?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/17af4c4ee6baee33ab5823837b3cad05d8cbd280f1a56aa0642592d81194d867?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/17af4c4ee6baee33ab5823837b3cad05d8cbd280f1a56aa0642592d81194d867?s=96&d=mm&r=g\",\"caption\":\"EW Staff\"},\"url\":\"https:\/\/www.electronicsweekly.com\/author\/sue-proud\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Changing roles for the IoT and security | Electronics Weekly","description":"As the IoT has evolved and changed, so have the requirements for efficient performance and security, says Nick Wood. IoT, or internet of things, is a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/","twitter_card":"summary_large_image","twitter_title":"Changing roles for the IoT and security | Electronics Weekly","twitter_description":"As the IoT has evolved and changed, so have the requirements for efficient performance and security, says Nick Wood. IoT, or internet of things, is a","twitter_image":"https:\/\/static.electronicsweekly.com\/wp-content\/uploads\/2026\/02\/10150819\/Insight-a.webp","twitter_creator":"@ElectronicsNews","twitter_site":"@ElectronicsNews","twitter_misc":{"Written by":"EW Staff","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/#article","isPartOf":{"@id":"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/"},"author":{"name":"EW Staff","@id":"https:\/\/www.electronicsweekly.com\/#\/schema\/person\/496caa11063670e48dc64a819c2a1dba"},"headline":"Changing roles for the IoT and security","datePublished":"2026-02-19T08:00:55+00:00","dateModified":"2026-02-26T15:51:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/"},"wordCount":1281,"commentCount":0,"image":{"@id":"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/#primaryimage"},"thumbnailUrl":"https:\/\/static.electronicsweekly.com\/wp-content\/uploads\/2026\/02\/10150819\/Insight-a.webp","keywords":["IoT","Security"],"articleSection":["Internet of Things","News"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/","url":"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/","name":"Changing roles for the IoT and security | Electronics Weekly","isPartOf":{"@id":"https:\/\/www.electronicsweekly.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/#primaryimage"},"image":{"@id":"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/#primaryimage"},"thumbnailUrl":"https:\/\/static.electronicsweekly.com\/wp-content\/uploads\/2026\/02\/10150819\/Insight-a.webp","datePublished":"2026-02-19T08:00:55+00:00","dateModified":"2026-02-26T15:51:14+00:00","author":{"@id":"https:\/\/www.electronicsweekly.com\/#\/schema\/person\/496caa11063670e48dc64a819c2a1dba"},"description":"As the IoT has evolved and changed, so have the requirements for efficient performance and security, says Nick Wood. IoT, or internet of things, is a","breadcrumb":{"@id":"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/#primaryimage","url":"https:\/\/static.electronicsweekly.com\/wp-content\/uploads\/2026\/02\/10150819\/Insight-a.webp","contentUrl":"https:\/\/static.electronicsweekly.com\/wp-content\/uploads\/2026\/02\/10150819\/Insight-a.webp","width":749,"height":561,"caption":"Picture Credit: Peter Linforth"},{"@type":"BreadcrumbList","@id":"https:\/\/www.electronicsweekly.com\/news\/changing-roles-for-the-iot-and-security-2026-02\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.electronicsweekly.com\/"},{"@type":"ListItem","position":2,"name":"Changing roles for the IoT and security"}]},{"@type":"WebSite","@id":"https:\/\/www.electronicsweekly.com\/#website","url":"https:\/\/www.electronicsweekly.com\/","name":"Electronics Weekly","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.electronicsweekly.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.electronicsweekly.com\/#\/schema\/person\/496caa11063670e48dc64a819c2a1dba","name":"EW Staff","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/17af4c4ee6baee33ab5823837b3cad05d8cbd280f1a56aa0642592d81194d867?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/17af4c4ee6baee33ab5823837b3cad05d8cbd280f1a56aa0642592d81194d867?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/17af4c4ee6baee33ab5823837b3cad05d8cbd280f1a56aa0642592d81194d867?s=96&d=mm&r=g","caption":"EW Staff"},"url":"https:\/\/www.electronicsweekly.com\/author\/sue-proud\/"}]}},"_links":{"self":[{"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/posts\/889024","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/comments?post=889024"}],"version-history":[{"count":3,"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/posts\/889024\/revisions"}],"predecessor-version":[{"id":890142,"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/posts\/889024\/revisions\/890142"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/media\/889025"}],"wp:attachment":[{"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/media?parent=889024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/categories?post=889024"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/tags?post=889024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}