AVR IoT WG Development Board Introduction

This video provides an overview of the AVR-IoT WG Development board.  The AVR-IoT WG board was designed to be extremely easy to use, secure and low power.  With this device, you will be able to connect your IoT node to the internet in 30 seconds or less.

Spotlight

Medigate

Securing the clinical environment requires a new security strategy and coordinated approach as IT, OT, IoT and physical systems converge and the threat of bad actors exploiting vulnerabilities across new and old infrastructure is increasing. IT also requires detailed knowledge of each and every medical device, their proprietary protocols, and a comprehensive understanding of medical workflows. In a network with hundreds of different device types, thousands of devices from different manufacturers, and a mix of protocols and operational parameters it can be overwhelming to protect.

OTHER VIDEOS

How To Enable IMEI lock on Your Soracom IoT SIM

video | July 12, 2023

How to set IMEI lock on your SIM in the User Console...

Watch Now

How To Change The Speed Class of Your IoT SIM in the Soracom User Console

video | July 12, 2023

Walk through of the ways to change speed class in the user console...

Watch Now

How to secure Your Soracom IoT SIM with CHAP authentication

video | July 12, 2023

walk through of setting up CHAP auth on the Soracom User Console...

Watch Now

How To Update Your SIM Status in the Soracom User Console

video | July 12, 2023

How to change status of SIMs in the Soracom User Console...

Watch Now

Spotlight

Medigate

Securing the clinical environment requires a new security strategy and coordinated approach as IT, OT, IoT and physical systems converge and the threat of bad actors exploiting vulnerabilities across new and old infrastructure is increasing. IT also requires detailed knowledge of each and every medical device, their proprietary protocols, and a comprehensive understanding of medical workflows. In a network with hundreds of different device types, thousands of devices from different manufacturers, and a mix of protocols and operational parameters it can be overwhelming to protect.

Events