How to Connect Network Devices in the Internet of Things

Over the last few years, many companies have introduced platformsand products designed for the Internet of Things (IoT). These prod‐ucts often are either just proprietary middleware and services, or are simply embedded electronics, with or without the addition of a net‐ work connection. Just adding a network connection to an existing device doesn’t make it part of the Internet of Things. In an environment that is rapidly changing, and will continue to be volatile for several more years before best practices, or even just accepted practices, start to emerge, designing your product will depend heavily on a number of factors: naturally, the requirements are important, but there’s also the refresh cycle, time to market, physical environment, and how the device will connect to the net‐ work. One of the key problems in the current generation of Internet of Things devices is the refresh cycle problem.

Spotlight

Lexumo

Lexumo offers the first automated service that continuously monitors your code for public vulnerabilities such as Heartbleed.

OTHER WHITEPAPERS
news image

Creating secure IoT device identities

whitePaper | December 5, 2022

IoT applications are extremely vulnerable to cybersecurity attacks as they control both data access (often personal or sensitive) and connected devices. Without proper security, IoT technology will not grow as projected nor live up to its true potential in the marketplace. This paper focuses on how to create secure IoT device and sensor identities, fostering data access and interaction across devices in a trusted ecosystem.

Read More
news image

Using eSIM and iSIM will save money for IoT deployments

whitePaper | June 22, 2022

Transforma Insights analysis points to an 8-13% saving to be made on lifetime connectivity spend by enterprises if they choose eSIM and iSIM options rather than removable plastic SIM cards for their IoT deployments. Embedded SIM (eSIM), and to a lesser extent its coming successor integrated SIM (iSIM), have established themselves as part of the range of capabilities that need to be carefully considered by an organisation when planning a cellular-based IoT solution. Alongside the physical components of eSIM and iSIM.

Read More
news image

Smart Buildings and the Benefits of Convergence

whitePaper | May 11, 2022

Working from home, working remotely, hybrid work, and the changing office paradigm are redefining building design and management. Some companies find they don’t need the same space or need to use their space differently. The office isn’t going away, but it’s definitely changing, and smart buildings are crucial to those changes.

Read More
news image

Best Practice For End-To-End IoT Security

whitePaper | January 31, 2022

Security concerns remain a major barrier to IoT adoption for as many as 85% of IoT industry leaders1. Fraud is growing in this area, causing widespread agreement across the ecosystem that securing the IoT application is the only way to fully develop its business potential. The good news is the vast majority of attacks can be prevented – and the resilience of any IoT deployment significantly improved – with measures that are simple and cost-effective to implement.

Read More
news image

Monitoring IT, OT and IIoT with Paessler PRTG: use cases and dashboards

whitePaper | May 18, 2022

Digitalization and the convergence of IT and OT makes it crucial to have a unified view of your entire infrastructure. From machines on the factory floor, PLCs, programmable logic controllers and IIoT devices, through to industrial gateways and IPCs – you need to know the status and condition of it all.

Read More
news image

Aruba IOT gateway solution

whitePaper | May 4, 2022

The Internet of Things, represents the billion autonomous devices connected to a network, primarily the Internet. You could find it at home, in the cities, in the industry, at hospital, and almost everywhere. IoT has given rise to concepts called smart home, smart cities, Industry 2.0 / 4.0 (depending if it’s used with or without AI) or smart healthcare.

Read More

Spotlight

Lexumo

Lexumo offers the first automated service that continuously monitors your code for public vulnerabilities such as Heartbleed.

Events