Winners of McRock IIoT Awards 2016 – Davra Networks, GE, and Allan Alter

McRock Capital Corporation, a leading venture capital fund manager focused exclusively on the Industrial Internet of Things (IIoT), announced the 3 category winners of the McRock IIoT Awards during its 5th Annual McRock IIoT Symposium in Montreal. The inaugural McRock IIoT awards program recognizes organizations and individuals in three categories; IIoT Private Company of the Year, IIoT Corporate Leader of the Year, and IIoT Influencer of the Year. The winners were selected by an industry-led judging committee. The junges for the 2016 awards were Ron Sege, Chairman and CEO of Echelon Corporation, Peter Williams, CTO of Big Green Innovations with IBM, and Peter Van Deventer, Chief Marketing Officer at Tessera Technologies.

Spotlight

Crux Labs Pte. Ltd.

Founded by Rohit Gupta, Crux Labs is a Singapore-based technology startup focused on building IT products that simplify technology, in an innovative yet cost effective way, resulting in solutions that are quick to deploy and self serviced by users.

OTHER ARTICLES
IoT Security

Overcoming IoT Security Challenges for Safe Implementation

Article | July 17, 2023

Explore the IoT security solutions for critical issues and proactive solutions for the safe implementation of connected devices. Delve into cross-domain interactions for secure data storage. Contents 1. Introduction 1.1 Significance of IoT Security for Safe Implementation 2. IoT Security Landscape 2.1 Emerging Threats in IoT Environments 2.2 Importance of Proactive Security Measures 3. Challenges Posed in IoT Systems 3.1 Cross-Domain Interactions 3.2 Denial of Service (DoS) Attacks 3.3 Insecure Interfaces and APIs 3.4 Vulnerable Third-Party Components 3.5 Safeguarding Data Storage and Retention 4. Solutions to Prevent Threats 4.1 Secure Integration and Communication 4.2 Traffic Monitoring and Analysis 4.3 Robust Authentication and Authorization Protocols 4.4 Patch Management and Vulnerability Monitoring 4.5 Access Control and User Authentication 5 Conclusion 1. Introduction 1.1 Significance of IoT Security for Safe Implementation The significance of IoT connectivity and security for safe implementation is paramount in today's interconnected world. Some essential points highlight its importance at both the business and advanced levels. IoT devices collect and transmit vast amounts of sensitive data. Without proper security measures, this data can be intercepted, leading to breaches of privacy and potential misuse of personal or corporate information. Implementing robust IoT security ensures the protection of data throughout its lifecycle. Safeguarding Critical Infrastructure is crucial as Many IoT deployments are integrated into critical infrastructure systems such as power grids, transportation networks, and healthcare facilities. A breach in the security of these interconnected systems can have severe consequences, including disruption of services, financial losses, and even threats to public safety. IoT security helps mitigate these risks by preventing unauthorized access and potential attacks. Mitigating financial losses, ensuring operational continuity and preventing IoT botnets and DDoS attacks contribute to security as IoT devices are often integrated into complex ecosystems, supporting various business operations. In recent years, compromised IoT devices have been used to create massive botnets for launching distributed denial-of-service (DDoS) attacks. These attacks can overwhelm networks and cause significant disruptions, affecting the targeted businesses and the internet infrastructure as a whole. Robust IoT security measures, such as strong authentication and regular device updates, can help prevent these attacks. 2. IoT Security Landscape 2.1 Emerging Threats in IoT Environments Botnets and DDoS Attacks Botnets, consisting of compromised IoT devices, can be leveraged to launch massive distributed denial-of-service (DDoS) attacks. These attacks overwhelm networks, rendering them inaccessible and causing disruptions to critical services. Inadequate Authentication and Authorization Weak or non-existent authentication and authorization mechanisms in IoT devices can allow unauthorized access to sensitive data or control of connected systems. This can lead to unauthorized manipulation, data breaches, and privacy violations. Firmware and Software Vulnerabilities IoT devices often rely on firmware and software components that may contain vulnerabilities. Attackers can exploit these weaknesses to gain unauthorized access, execute malicious code, or extract sensitive information. Lack of Encryption and Data Integrity Insufficient or absent encryption mechanisms in IoT communications can expose sensitive data to interception and tampering. Without data integrity safeguards, malicious actors can modify data transmitted between devices, compromising the integrity and reliability of the system. Physical Attacks and Tampering IoT devices deployed in public or accessible locations are vulnerable to physical attacks. These attacks include tampering, theft, or destruction of devices, which can disrupt services, compromise data, or manipulate the functioning of the IoT ecosystem. Insider Threats Insiders with authorized access to IoT systems, such as employees or contractors, may abuse their privileges or inadvertently introduce vulnerabilities. This can include unauthorized access to sensitive data, intentional manipulation of systems, or unintentional actions compromising security. Supply Chain Risks The complex and global nature of IoT device supply chains introduces potential risks. Malicious actors can exploit vulnerabilities in the manufacturing or distribution process, implanting backdoors or tampering with devices before they reach end-users. 2.2 Importance of Proactive Security Measures Security measures are vital for ensuring the safety and reliability of IoT environments. Organizations can mitigate risks and stay ahead of potential vulnerabilities and threats by taking a proactive approach. These measures include conducting regular vulnerability assessments, implementing robust monitoring and detection systems, and practicing incident response preparedness. Proactive security measures also promote a 'Security by Design' approach, integrating security controls from the outset of IoT development. Compliance with regulations, safeguarding data privacy, and achieving long-term cost savings are additional benefits of proactive security. Being proactive enables organizations to minimize the impact of security incidents, protect sensitive data, and maintain their IoT systems' secure and reliable operation. 3. Challenges Posed in IoT Systems 3.1 Cross-Domain Interactions Cross-domain interactions refer to the communication and interaction between IoT devices, systems, or networks that operate in different domains or environments. These interactions occur when IoT devices need to connect and exchange data with external systems, platforms, or networks beyond their immediate domain. Incompatibilities in protocols, communication standards, or authentication mechanisms can create vulnerabilities and potential entry points for attackers. 3.2 Denial of Service (DoS) Attacks Denial of Service attacks are malicious activities aimed at disrupting or rendering a target system, network, or service unavailable to its intended users. In a DoS attack, the attacker overwhelms the targeted infrastructure with an excessive amount of traffic or resource requests, causing a significant degradation in performance or a complete service outage. Protecting IoT devices and networks from DoS attacks that aim to disrupt their normal operation by overwhelming them with excessive traffic or resource requests becomes challenging. The issue here lies in distinguishing legitimate traffic from malicious traffic, as attackers constantly evolve their techniques. 3.3 Insecure Interfaces and APIs Insecure interfaces and application programming interfaces (APIs) refer to vulnerabilities or weaknesses in the interfaces and APIs used by IoT devices for communication and data exchange. An interface is a point of interaction between different components or systems, while an API allows applications to communicate with each other. Insecure interfaces and APIs can be exploited by attackers to gain unauthorized access to IoT devices or intercept sensitive data. Ensuring secure authentication and authorization mechanisms, proper encryption of data in transit, and secure storage of API keys and credentials, thus, becomes a challenge. 3.4 Vulnerable Third-Party Components Vulnerable third-party components refer to software, libraries, frameworks, or modules developed and maintained by external parties and integrated into IoT devices or systems. These components may contain security vulnerabilities that attackers can exploit to gain unauthorized access, manipulate data, or compromise the overall security of the IoT ecosystem. Pain points arise from the challenge of assessing the security of third-party components, as organizations may have limited visibility into their development processes or dependencies. 3.5 Safeguarding Data Storage and Retention Data storage and retention refers to the management and security of data collected and generated by IoT devices throughout its lifecycle. Safeguarding stored IoT data throughout its lifecycle, including secure storage, proper data retention policies, and protection against unauthorized access or data leakage, poses a threat. Ensuring secure storage infrastructure, protecting data at rest and in transit, and defining appropriate data retention policies include safeguarding data and maintaining the privacy of stored data. Failure to implementing strong encryption, access controls, and monitoring mechanisms to protect stored IoT data leads to this issue. 4. Solutions to Prevent Threatsc 4.1 Secure Integration and Communication Implement secure communication protocols, such as transport layer security (TLS) or virtual private networks (VPNs), to ensure encrypted and authenticated communication between IoT devices and external systems. Regularly assess and monitor the security posture of third-party integrations and cloud services to identify and mitigate potential vulnerabilities. Organizations need to invest time and resources in thoroughly understanding and implementing secure integration practices to mitigate the risks associated with cross-domain interactions. 4.2 Traffic Monitoring and Analysis Deploy network traffic monitoring and filtering mechanisms to detect and block suspicious traffic patterns. Implement rate limiting, traffic shaping, or access control measures to prevent excessive requests from overwhelming IoT devices. Utilize distributed denial of service (DDoS) mitigation services or hardware appliances to handle volumetric attacks. Organizations must deploy robust traffic analysis and anomaly detection mechanisms to identify and mitigate DoS attacks promptly. Additionally, scaling infrastructure and implementing load-balancing mechanisms become essential to handle sudden surges in traffic during an attack. 4.3 Robust Authentication and Authorization Protocols Apply secure coding practices and implement strong authentication and authorization mechanisms for interfaces and APIs. Utilize secure communication protocols (e.g., HTTPS) and enforce strict access controls to prevent unauthorized access. Regularly update and patch interfaces and APIs to address any known vulnerabilities. Organizations must conduct regular security audits of their interfaces and APIs, implement strong access controls, and regularly update and patch vulnerabilities to address these effectively. 4.4 Patch Management and Vulnerability Monitoring Conduct thorough security assessments of third-party components before integration, verifying their security track record and ensuring they are regularly updated with security patches. Establish a process for monitoring and addressing vulnerabilities in third-party components, including timely patching or replacement. Establishing strict vendor evaluation criteria, conducting regular security assessments, and maintaining an up-to-date inventory of third-party components can help address these issues and mitigate the risks associated with vulnerable components. 4.5 Access Control and User Authentication Encrypt stored IoT data to protect it from unauthorized access or leakage. Implement access controls and user authentication mechanisms to restrict data access based on role or privilege. Establish data retention policies that comply with relevant regulations and securely dispose of data when no longer needed. Clear data retention policies should be established, specifying how long data should be stored and when it should be securely deleted or anonymized to minimize data leakage risks. It's important to note that these solutions should be tailored to specific organizational requirements and constantly evaluated and updated as new threats and vulnerabilities emerge in the IoT security landscape. 5. Conclusion Ensuring the safe implementation of IoT requires overcoming various security challenges through proactive measures and a comprehensive approach. By implementing proactive security measures, organizations can mitigate risks and maintain the safety and reliability of IoT environments. Overcoming these challenges requires organizations to invest in certain integration practices, traffic analysis, authentication mechanisms, encryption protocols, and vendor evaluation criteria. Overcoming IoT security challenges for safe implementation necessitates a proactive and comprehensive approach encompassing vulnerability management, monitoring and detection, incident response preparedness, secure design practices, compliance with regulations, and robust data storage and retention mechanisms. The emergence in IoT security encompasses the incorporation of machine learning and AI for improved threat detection, the application of blockchain for secure transactions and device authentication, the integration of security measures at the edge through edge computing, the establishment of standardized protocols and regulatory frameworks, the adoption of advanced authentication methods, and the automation of security processes for efficient IoT security management. These trends aim to address evolving risks, safeguard data integrity and privacy, and enable IoT systems' safe and secure implementation.

Read More
IoT Security

Connected Fleet Management: Why a Unified Network is Key

Article | June 28, 2023

As consumer demands evolve, fleet managers are turning to IoT to deliver products faster and more efficiently. The progress being made in edge computing represents the full potential of IoT: the power of data on the move. However, operating on the edge also reveals some of IoT’s greatest challenges: maintaining network security as the number of endpoints multiplies; rethinking traditional business models as industries become increasingly interdependent; and, perhaps most importantly, establishing a seamless, reliable network across borders, cultures, and regulatory environments.

Read More
Industrial IoT, IoT Security

5 IoT Trends for Marketers to Watch in 2021

Article | July 12, 2023

The COVID-19 pandemic turned the tides towards remote work and virtual connectivity. And even though growth seemed to have slowed down in 2020, experts see double-digit growth in the next few years. The tides may be turning but virtual connectivity and the tools required for remote growth are not slowing down in demand. As the tech world adapts to new shifts, IoT is among one of the most anticipated technologies to prosper in 2021. Digital transformation has rapidly accelerated in the past year and if the experts are to be believed, 2021 shows promise for an even better year for technological advancement. According to IDC’s 2020-2024 forecast, spending will reach an annual growth rate of 11.3 percent. And with this, the number of connected devices is likely to grow up. Take a look at what will be the focus of IoT industry trends in 2021. Privacy & Security As smart homes are becoming the norm and you cannot throw a stone without hitting a smart device, one thing is clear—IoT devices are everywhere. People almost always forget smartphones when talking about IoT devices, but the fact is that smartphones are very much a part of the IoT ecosystem. And with the infusion of IoT in our everyday lives, questions about privacy and security are cropping up. Just recently, as WhatsApp announced its new privacy policy, millions of users planned to migrate to other alternatives. This led to WhatsApp pushing back its privacy update and tech businesses taking note of changing winds. In 2021, privacy and security will be at the forefront of IoT industry trends, as devices infuse further into the everyday lives of people. According to recent research, 90 percent of consumers lack confidence in IoT device security. And the onus of bolstering consumer confidence will be up to IoT businesses. Workforce Management According to Gartner’s “Top Strategic Technology Trends For 2021” report, IoT will be a large part of the office experience in 2021. As businesses are trying to avoid the losses that occurred in early 2020, workplaces are being geared up with RFID tags, sensors, and monitors to ensure social distancing measures, whether employees are wearing masks and overall health monitoring. Additionally, many organizations have decided to move permanently to a remote mode and will rely more on IoT devices for connectivity. So we can expect better automated scheduling and calendar tools, more interactive video conferencing, and virtual meeting technology. In the case of fieldwork, IoT will offer an added factor of monitoring behavior. Greener IoT Experts predict that energy will be a crucial factor in the IoT industry trends in 2021. With smart grids, metering, and restoration resilience being powered by IoT, 2021 will move towards optimized energy consumption and devices that are designed to encourage energy-friendly practices. What’s more? Smart engines and automobiles can be optimized to reduce their carbon footprint and become energy-friendly. As evidenced by the Paris summit and the wildfires in 2020, the world is becoming ecologically conscious. IoT devices in 2021 will focus heavily on reduced emissions, lowering air and ocean pollution, and minimizing power expenditure. Location Data As COVID-19 limited human interaction, location-based services soared during the pandemic. Businesses started leveraging location data to offer curbside pickup, virtual queues, and check-ins for reservations to enhance the customer experience during the pandemic. According to experts, the use of location data will continue to be crucial for customer service and convenience in 2021. As people prefer being safe even as the vaccines are being delivered, location data will allow businesses to cater to their customers without compromising on customer or employee safety. Digital twins IoT is being helmed as the perfect technology partner for creating digital twins in many industries. As IoT collects a large amount of data through physical devices, this data can be reinterpreted to create the perfect digital twins. Also, IoT can offer visibility into the full product life cycle and unfold deeper operational intelligence. Companies like Siemens are already leveraging technologies like AIoT to design and create digital twins for product design and production. Coupled with AI, IoT will be used more commonly for creating digital twins in 2021. A technology as dynamic as IoT can be leveraged for almost any application. Therefore, it may surprise us all in the way it progresses in 2021. However, experts believe that the above 5 IoT industry trends will rule 2021 for sure. Frequently Asked Questions What are the latest IoT industry trends? The use of IoT in Healthcare, Artificial Intelligence, workforce management, and ecological conservation can be deemed as some of the latest trends in IoT. What is the future scope of IoT? As experts believe there will be over 85 billion connected devices by the end of 2021, and the numbers are promising for upcoming years, we can safely say that the future of IoT is indeed bright. What industries are most likely to use the Internet of things technology? IoT is a dynamic technology with applications in almost every industry. However, industries like healthcare, construction, manufacturing, tech, and resource management are most like to use IoT right now. { "@context": "https://schema.org", "@type": "FAQPage", "mainEntity": [{ "@type": "Question", "name": "What are the latest IoT industry trends?", "acceptedAnswer": { "@type": "Answer", "text": "The use of IoT in Healthcare, Artificial Intelligence, workforce management, and ecological conservation can be deemed as some of the latest trends in IoT." } },{ "@type": "Question", "name": "What is the future scope of IoT?", "acceptedAnswer": { "@type": "Answer", "text": "As experts believe there will be over 85 billion connected devices by the end of 2021, and the numbers are promising for upcoming years, we can safely say that the future of IoT is indeed bright." } },{ "@type": "Question", "name": "What industries are most likely to use the Internet of things technology?", "acceptedAnswer": { "@type": "Answer", "text": "IoT is a dynamic technology with applications in almost every industry. However, industries like healthcare, construction, manufacturing, tech, and resource management are most like to use IoT right now." } }] }

Read More

IoT Adoption: Before and After COVID-19

Article | April 14, 2020

The survey data I’m referring to comes from a study conducted by the Eclipse Foundation about the adoption of commercial Internet of Things (IoT) technology. The aim of the study was to get a better understanding of the IoT industry landscape by identifying the requirements, priorities, and challenges faced by organizations deploying and using commercial IoT technologies. More than 350 respondents from multiple industries responded, with about a quarter of respondents coming from industrial production businesses. While this survey was not solely focused on the manufacturing and processing industries, its results reflect the general business community’s IoT adoption at the end of 2019. As such, it is a pre-COVID-19 snapshot of IoT adoption.

Read More

Spotlight

Crux Labs Pte. Ltd.

Founded by Rohit Gupta, Crux Labs is a Singapore-based technology startup focused on building IT products that simplify technology, in an innovative yet cost effective way, resulting in solutions that are quick to deploy and self serviced by users.

Related News

Industrial IoT

Casa Systems Unveils New AurusXT 5G Industrial IoT Router Series Featuring the World’s First Dynamic Slicing Support

Casa Systems | January 10, 2024

Casa Systems (Nasdaq: CASA), provider of innovative access network solutions serving customers worldwide, today announced the launch of the first solution in its AurusXT 5G Industrial IoT (IIoT) Series, the NTC-500 5G IIoT router, which leverages the speed and coverage of a 5G network to provide high-speed Ethernet-to-cellular connectivity. Casa’s NTC-500 is the first 5G IIoT router to support dynamic network slicing capabilities, allowing operators to provide new and tailored services to their enterprise customers. Casa’s AurusXT Series will offer a range of 5G IIoT devices designed to deliver reliable connectivity to a broad range of both fixed and mobile use cases. The NTC-500 is the first of the AurusXT Series to disrupt the IIoT market with a cost-effective 5G IIoT Router that utilizes the speed and coverage of a 5G Sub-6 GHz network to deliver a fast and reliable connection to machines, equipment, and vehicles. Casa’s industry-first and proprietary 5G Dynamic Slicing Technology sets the NTC-500 apart from every other IIoT router on the market. Other 5G IIoT routers are limited to static slicing, forcing end users to endure labor- and time-intensive manual, on-site reconfigurations whenever they want to make a slicing change. Casa’s Dynamic Slicing Technology empowers mobile operators to unlock new revenue streams by allowing their customers to flexibly establish and rescind network priority on demand. “The proliferation of 5G networks coupled with the sunset of global 3G networks has created a groundswell of demand for 5G IIoT devices,” said Steve Collins, SVP of Access Devices, Casa Systems. “Our AurusXT Series is designed to deliver cost-effective 5G IIoT solutions that will address most use cases. With our dynamic network slicing capabilities, mobile operators will be able to unlock new revenue streams by offering tailored service plans to meet their enterprise customers’ individual requirements.” IIoT routers can be found in installations around the world – wherever Ethernet-to-cellular connectivity is in demand – from remote security cameras in industrial sites or on roadways, to digital signs in shopping malls or other public venues, to standalone ticketing and other vending machines, to anywhere an IIoT device in any industry needs wireless connectivity to transmit data. Enterprises facing the inescapable sunsetting of 3G technology now have a cost-effective and future-proof option for upgrading the hundreds, thousands, or even tens of thousands of IIoT routers within their domain. By opting to deploy Casa’s NTC-500, operators can bypass the adoption of 4G devices and minimize costly truck rolls to replace both 3G and 4G IIoT routers. The NTC-500 supports the latest 3GPP Release 16 features, including 5G Non-standalone (NSA) and 5G Standalone (SA) with failover to 4G LTE. This ensures it will not become obsolete when 4G technology phases out, minimizing the operational impact of updating hardware. The NTC-500 is compatible with both 4G and 5G, enabling customers to enjoy the benefits of 5G with the added assurance that existing 4G devices will deliver the best possible performance. Casa Systems is currently welcoming new resellers globally. Resellers or system integrators interested in becoming a Casa Systems IIoT device reseller are encouraged to contact Casa at https://www.casa-systems.com/. About Casa Systems Casa Systems, Inc. (Nasdaq: CASA) is a next-gen technology leader that supports mobile, cable, and wireline communications services providers with market leading solutions. Casa’s virtualized and cloud-native software solutions modernize operators’ network architectures, expand the range of services they can offer their consumer and commercial customers, accelerate time to revenue, and reduce the TCO of their network infrastructure and operations. Casa’s suite of open, cloud-native network solutions unlocks new ways for service providers to quickly build flexible networks and service offerings that maximize revenue-generating capabilities. Commercially deployed in more than 70 countries, Casa Systems serves over 475 Tier 1 and regional service providers worldwide. For more information, visit http://www.casa-systems.com/.

Read More

Industrial IoT

Comcast and Broadcom to Develop the World’s First AI-Powered Access Network With Pioneering New Chipset

Business Wire | October 23, 2023

Comcast and Broadcom today announced joint efforts to develop the world’s first AI-powered access network with a new chipset that embeds artificial intelligence (AI) and machine learning (ML) within the nodes, amps and modems that comprise the last few miles of Comcast’s network. With these new capabilities broadly deployed throughout the network, Comcast will be able to transform its operations by automating more network functions and deliver an improved customer experience through better and more actionable intelligence. Additionally, the new chipset will be the first in the world to incorporate DOCSIS 4.0 Full Duplex (FDX), Extended Spectrum (ESD) and the ability to run both simultaneously, enabling Internet service providers across the globe to deliver DOCSIS 4.0 services using a toolkit with technology options to meet their business needs. DOCSIS 4.0 is the next-generation network technology that will introduce symmetrical multi-gigabit Internet speeds, lower latency, and even better security and reliability to hundreds of millions of people and businesses over their existing connections without the need for major construction of new network infrastructure. On October 12, Comcast announced that it will begin to introduce the first customers in the world to Internet services powered by DOCSIS 4.0 using FDX. While the company will continue to leverage FDX, the collaboration with Broadcom will provide Comcast and other operators with additional options in the pursuit of delivering the best possible connectivity experience. The Xfinity 10G Network leverages the latest advancements in edge compute, digital optics and real-time, actionable telemetry to meet and exceed our customers’ constantly evolving connectivity needs, said Elad Nafshi, Chief Network Officer, Comcast Cable. With this new Unified DOCSIS4 chipset from Broadcom, we can broadly deploy transformational AI network capabilities alongside symmetrical multi-gig speeds. FDX is the best technology for Comcast, but this groundbreaking unified chipset will provide the entire industry with options when upgrading their nodes, amps, and cable modems for DOCSIS 4.0. The new end-to-end chipsets will be the industry’s first to incorporate AI and ML capabilities that will transform the operations and customer experience functions by: Making smarter network performance decisions using network diagnostics insights produced by both local and cloud AI. Enhanced monitoring and issue detection using bandwidth-efficient telemetry data. Transforming network maintenance of the network using real time issue localization plus predictive and self-healing network intelligence. Protecting network facilities and customers with improved cybersecurity intrusion detection. Assisting customers more effectively through local and cloud-based AI. Monitoring home IoT devices for connectivity disruptions. All these capabilities, and more, are achieved while reducing network latency and insulating customer data to ensure the utmost privacy standards. “By enabling a toolkit that includes FDX, ESD or both simultaneously, this new Unified DOCSIS4 chipset incorporates the advantages of both technologies and will enable economies of scale as well as a common retail modem for the industry,” said Rich Nelson, Senior Vice President and General Manager, Broadband Video Group, Broadcom. “The edge network and in-home capabilities of this chipset will improve network intelligence and reliability to create an improved broadband experience with enhanced privacy protection and cyber security for the consumer.” Comcast and Broadcom are designing and building the new chipset based upon CableLabs’ DOCSIS 4.0 specifications. The companies have a history of working together to introduce innovations that have pushed the industry to the next generation of connectivity. In 2021, Comcast conducted the world’s first full duplex multi-gigabit symmetrical test on Broadcom-built silicon. In January 2022 the companies tested the first Full Duplex DOCSIS 4.0 system-on-chip (SoC) cable modem that delivered symmetrical speeds faster than 4 Gbps. Later that year, Comcast successfully tested the final technical component of necessary to deliver multi-gig symmetrical speed powered by DOCSIS 4.0 throughout its network with 10G smart amps built on a Broadcom-developed reference design. The companies expect to begin trials early in 2024 and to begin deploying the new chipset in live networks before the end of the same year.

Read More

Enterprise Iot

Tavant Unveils Data Beats™: A Data-Driven Ecosystem Built for Fintechs and Financial Institutions to Harness Data Insights

Business Wire | October 20, 2023

Tavant, Silicon Valley’s leading digital lending solutions provider, today announced at the MBA's Annual Convention & Expo in Philadelphia, the launch of Data Beats™, a groundbreaking data platform that promises to redefine the financial services landscape. Built to inform, provide insights, act, recommend, and predict, Data Beats ushers in a new era of data-driven intelligence for the industry. This versatile platform empowers businesses to harness the power of their data and maximize its value, effectively taking the stress out of data management. Key benefits of Data Beats include: Provides actionable data insights that work for your business; Analyzes data from various aspects of your operations; Adapts and learns from your data to provide real-time recommendations; and Looks into the future, learns and predicts trends. Data Beats is a platform offering within Tavant's banking and financial services suite of technology products. Data Beats is set to serve as the analytics and IoT engine for the financial services industry, initially focusing on mortgage and home equity products. Tavant plans to extend this robust data ecosystem to all consumer loans and banking products, making it a comprehensive solution for financial institutions. With Data Beats, Tavant empowers financial institutions towards proactive rather than reactive operations by incorporating generative AI to prompt users on the best course of action. This revolutionary approach allows the platform to offer precise recommendations for loan officers, consumers, processors, and underwriters, enhancing the overall efficiency of the lending process. Abhinav Asthana, Fintech Product Business and Growth Leader at Tavant said, Tavant's mission is to stay at the forefront of innovation and to be the engineering partner of choice in the financial services industry. Data Beats exemplifies our commitment to providing our customers with an advanced platform that accelerates their vision to transform into a data-first organization. We are proud to launch this platform, which brings insights, intelligence, and efficiency to the heart of the lending process. Data Beats has already started demonstrating its value within Tavant's existing customer base by enhancing and automating the home buying experience. By consolidating data from various stages of the customer journey, from acquisition to servicing and beyond, Data Beats provides invaluable insights that can be used to predict future behavior, optimize operations, and improve overall business performance. The system's foundation, the data lake, can ingest a wide range of data inputs, limited only by the specific business problem it aims to solve. This flexibility positions Data Beats to become a game-changing tool for a wide range of industries beyond mortgage and lending.

Read More

Industrial IoT

Casa Systems Unveils New AurusXT 5G Industrial IoT Router Series Featuring the World’s First Dynamic Slicing Support

Casa Systems | January 10, 2024

Casa Systems (Nasdaq: CASA), provider of innovative access network solutions serving customers worldwide, today announced the launch of the first solution in its AurusXT 5G Industrial IoT (IIoT) Series, the NTC-500 5G IIoT router, which leverages the speed and coverage of a 5G network to provide high-speed Ethernet-to-cellular connectivity. Casa’s NTC-500 is the first 5G IIoT router to support dynamic network slicing capabilities, allowing operators to provide new and tailored services to their enterprise customers. Casa’s AurusXT Series will offer a range of 5G IIoT devices designed to deliver reliable connectivity to a broad range of both fixed and mobile use cases. The NTC-500 is the first of the AurusXT Series to disrupt the IIoT market with a cost-effective 5G IIoT Router that utilizes the speed and coverage of a 5G Sub-6 GHz network to deliver a fast and reliable connection to machines, equipment, and vehicles. Casa’s industry-first and proprietary 5G Dynamic Slicing Technology sets the NTC-500 apart from every other IIoT router on the market. Other 5G IIoT routers are limited to static slicing, forcing end users to endure labor- and time-intensive manual, on-site reconfigurations whenever they want to make a slicing change. Casa’s Dynamic Slicing Technology empowers mobile operators to unlock new revenue streams by allowing their customers to flexibly establish and rescind network priority on demand. “The proliferation of 5G networks coupled with the sunset of global 3G networks has created a groundswell of demand for 5G IIoT devices,” said Steve Collins, SVP of Access Devices, Casa Systems. “Our AurusXT Series is designed to deliver cost-effective 5G IIoT solutions that will address most use cases. With our dynamic network slicing capabilities, mobile operators will be able to unlock new revenue streams by offering tailored service plans to meet their enterprise customers’ individual requirements.” IIoT routers can be found in installations around the world – wherever Ethernet-to-cellular connectivity is in demand – from remote security cameras in industrial sites or on roadways, to digital signs in shopping malls or other public venues, to standalone ticketing and other vending machines, to anywhere an IIoT device in any industry needs wireless connectivity to transmit data. Enterprises facing the inescapable sunsetting of 3G technology now have a cost-effective and future-proof option for upgrading the hundreds, thousands, or even tens of thousands of IIoT routers within their domain. By opting to deploy Casa’s NTC-500, operators can bypass the adoption of 4G devices and minimize costly truck rolls to replace both 3G and 4G IIoT routers. The NTC-500 supports the latest 3GPP Release 16 features, including 5G Non-standalone (NSA) and 5G Standalone (SA) with failover to 4G LTE. This ensures it will not become obsolete when 4G technology phases out, minimizing the operational impact of updating hardware. The NTC-500 is compatible with both 4G and 5G, enabling customers to enjoy the benefits of 5G with the added assurance that existing 4G devices will deliver the best possible performance. Casa Systems is currently welcoming new resellers globally. Resellers or system integrators interested in becoming a Casa Systems IIoT device reseller are encouraged to contact Casa at https://www.casa-systems.com/. About Casa Systems Casa Systems, Inc. (Nasdaq: CASA) is a next-gen technology leader that supports mobile, cable, and wireline communications services providers with market leading solutions. Casa’s virtualized and cloud-native software solutions modernize operators’ network architectures, expand the range of services they can offer their consumer and commercial customers, accelerate time to revenue, and reduce the TCO of their network infrastructure and operations. Casa’s suite of open, cloud-native network solutions unlocks new ways for service providers to quickly build flexible networks and service offerings that maximize revenue-generating capabilities. Commercially deployed in more than 70 countries, Casa Systems serves over 475 Tier 1 and regional service providers worldwide. For more information, visit http://www.casa-systems.com/.

Read More

Industrial IoT

Comcast and Broadcom to Develop the World’s First AI-Powered Access Network With Pioneering New Chipset

Business Wire | October 23, 2023

Comcast and Broadcom today announced joint efforts to develop the world’s first AI-powered access network with a new chipset that embeds artificial intelligence (AI) and machine learning (ML) within the nodes, amps and modems that comprise the last few miles of Comcast’s network. With these new capabilities broadly deployed throughout the network, Comcast will be able to transform its operations by automating more network functions and deliver an improved customer experience through better and more actionable intelligence. Additionally, the new chipset will be the first in the world to incorporate DOCSIS 4.0 Full Duplex (FDX), Extended Spectrum (ESD) and the ability to run both simultaneously, enabling Internet service providers across the globe to deliver DOCSIS 4.0 services using a toolkit with technology options to meet their business needs. DOCSIS 4.0 is the next-generation network technology that will introduce symmetrical multi-gigabit Internet speeds, lower latency, and even better security and reliability to hundreds of millions of people and businesses over their existing connections without the need for major construction of new network infrastructure. On October 12, Comcast announced that it will begin to introduce the first customers in the world to Internet services powered by DOCSIS 4.0 using FDX. While the company will continue to leverage FDX, the collaboration with Broadcom will provide Comcast and other operators with additional options in the pursuit of delivering the best possible connectivity experience. The Xfinity 10G Network leverages the latest advancements in edge compute, digital optics and real-time, actionable telemetry to meet and exceed our customers’ constantly evolving connectivity needs, said Elad Nafshi, Chief Network Officer, Comcast Cable. With this new Unified DOCSIS4 chipset from Broadcom, we can broadly deploy transformational AI network capabilities alongside symmetrical multi-gig speeds. FDX is the best technology for Comcast, but this groundbreaking unified chipset will provide the entire industry with options when upgrading their nodes, amps, and cable modems for DOCSIS 4.0. The new end-to-end chipsets will be the industry’s first to incorporate AI and ML capabilities that will transform the operations and customer experience functions by: Making smarter network performance decisions using network diagnostics insights produced by both local and cloud AI. Enhanced monitoring and issue detection using bandwidth-efficient telemetry data. Transforming network maintenance of the network using real time issue localization plus predictive and self-healing network intelligence. Protecting network facilities and customers with improved cybersecurity intrusion detection. Assisting customers more effectively through local and cloud-based AI. Monitoring home IoT devices for connectivity disruptions. All these capabilities, and more, are achieved while reducing network latency and insulating customer data to ensure the utmost privacy standards. “By enabling a toolkit that includes FDX, ESD or both simultaneously, this new Unified DOCSIS4 chipset incorporates the advantages of both technologies and will enable economies of scale as well as a common retail modem for the industry,” said Rich Nelson, Senior Vice President and General Manager, Broadband Video Group, Broadcom. “The edge network and in-home capabilities of this chipset will improve network intelligence and reliability to create an improved broadband experience with enhanced privacy protection and cyber security for the consumer.” Comcast and Broadcom are designing and building the new chipset based upon CableLabs’ DOCSIS 4.0 specifications. The companies have a history of working together to introduce innovations that have pushed the industry to the next generation of connectivity. In 2021, Comcast conducted the world’s first full duplex multi-gigabit symmetrical test on Broadcom-built silicon. In January 2022 the companies tested the first Full Duplex DOCSIS 4.0 system-on-chip (SoC) cable modem that delivered symmetrical speeds faster than 4 Gbps. Later that year, Comcast successfully tested the final technical component of necessary to deliver multi-gig symmetrical speed powered by DOCSIS 4.0 throughout its network with 10G smart amps built on a Broadcom-developed reference design. The companies expect to begin trials early in 2024 and to begin deploying the new chipset in live networks before the end of the same year.

Read More

Enterprise Iot

Tavant Unveils Data Beats™: A Data-Driven Ecosystem Built for Fintechs and Financial Institutions to Harness Data Insights

Business Wire | October 20, 2023

Tavant, Silicon Valley’s leading digital lending solutions provider, today announced at the MBA's Annual Convention & Expo in Philadelphia, the launch of Data Beats™, a groundbreaking data platform that promises to redefine the financial services landscape. Built to inform, provide insights, act, recommend, and predict, Data Beats ushers in a new era of data-driven intelligence for the industry. This versatile platform empowers businesses to harness the power of their data and maximize its value, effectively taking the stress out of data management. Key benefits of Data Beats include: Provides actionable data insights that work for your business; Analyzes data from various aspects of your operations; Adapts and learns from your data to provide real-time recommendations; and Looks into the future, learns and predicts trends. Data Beats is a platform offering within Tavant's banking and financial services suite of technology products. Data Beats is set to serve as the analytics and IoT engine for the financial services industry, initially focusing on mortgage and home equity products. Tavant plans to extend this robust data ecosystem to all consumer loans and banking products, making it a comprehensive solution for financial institutions. With Data Beats, Tavant empowers financial institutions towards proactive rather than reactive operations by incorporating generative AI to prompt users on the best course of action. This revolutionary approach allows the platform to offer precise recommendations for loan officers, consumers, processors, and underwriters, enhancing the overall efficiency of the lending process. Abhinav Asthana, Fintech Product Business and Growth Leader at Tavant said, Tavant's mission is to stay at the forefront of innovation and to be the engineering partner of choice in the financial services industry. Data Beats exemplifies our commitment to providing our customers with an advanced platform that accelerates their vision to transform into a data-first organization. We are proud to launch this platform, which brings insights, intelligence, and efficiency to the heart of the lending process. Data Beats has already started demonstrating its value within Tavant's existing customer base by enhancing and automating the home buying experience. By consolidating data from various stages of the customer journey, from acquisition to servicing and beyond, Data Beats provides invaluable insights that can be used to predict future behavior, optimize operations, and improve overall business performance. The system's foundation, the data lake, can ingest a wide range of data inputs, limited only by the specific business problem it aims to solve. This flexibility positions Data Beats to become a game-changing tool for a wide range of industries beyond mortgage and lending.

Read More

Events