The Internet of Things:An Overview Understanding the Issues and Challenges of a More Connected World

March 1, 2016

Promising to transform the ways we live, work, and play, the Internet of Things (IoT) offers impressive benefits but presents significant challenges. Near the end of the first decade of this century, the world reached an Internet milestone. The number of Internet-connected devices surpassed the number of people alive on planet Earth. At the time, seven billion devices had already been connected to the Internet, and this went completely unnoticed by most people.

Spotlight

Seclogi

We design strategies for businesses to defend against cyber threats and non-compliance through consulting, Managed Services, and Training. We understand, through our own experience from working at startups and smaller companies, that the startups and small businesses are strapped for time and cash. That’s why we use a cost-effective “risk-based” approach to carefully architect a cybersecurity program that meets applicable legal and contractual obligations while protecting your company’s assets.

OTHER WHITEPAPERS
news image

Forecasting the Future of Genomic Data Management

whitePaper | August 14, 2023

Genomics is the study of the complete set of DNA in a person or other organism. DNA underpins a large proportion of an individual's health and disease status, therefore a genomic medicine approach is increasingly being applied in clinical settings.

Read More
news image

Secure IoT begins with Zero-Touch Provisioning at scale

whitePaper | January 26, 2022

What’s the largest roadblock to realizing the promise of the Internet of Things? For many organizations, the obstacle delaying widespread deployments is the strategy for onboarding the necessary edge resources for a lifetime of secure operation. Proof-of-concept and pilot systems comprised of dozens and even hundreds of nodes in a controlled setting are simply different than a full-scale rollout.

Read More
news image

INTERNET OF THINGS AND UEI DATA ACQUISITION & CONTROL SYSTEMS

whitePaper | February 5, 2020

The Internet of Things (IoT) is a networked system of interconnected physical objects that have the capability of sharing data with each other and also with a cloud service for archiving and analysis. With IoT, data producing devices can easily publish data, and multiple consumer clients can receive that data from any location in the world.

Read More
news image

Transforming Endpoints with Artificial Intelligence

whitePaper | August 5, 2021

There has never been so much compute power available in IoT devices - now is the time to be designing and deploying true intelligence in IoT endpoints. Devices which are aware of their environment are capable of adding huge value to the data they collect and the services which they enable. This paper explores how new and emerging technology can enable your devices to see, hear and feel what is going on, interpret what they sense, take autonomous actions and generate real, trusted, valued data for the cloud. Recent developments in hardware and software will enable a step change in the capability of resource-constrained endpoint platforms, allowing developers to build vision, voice and vibration capability, coupled with genuine intelligence at the endpoint.

Read More
news image

Zero Trust Maturity Model

whitePaper | June 13, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

Improving the Reliability of the Internet of Things

whitePaper | May 24, 2022

Despite the best efforts of developers, embedded and IoT systems are usually deployed with bugs remaining in their code. A development team introduces an average of 120 bugs per 1,000 lines of code during development. Approximately 5 percent, or 6 bugs per 1,000 lines of code, typically remain in the shipped software.

Read More

Spotlight

Seclogi

We design strategies for businesses to defend against cyber threats and non-compliance through consulting, Managed Services, and Training. We understand, through our own experience from working at startups and smaller companies, that the startups and small businesses are strapped for time and cash. That’s why we use a cost-effective “risk-based” approach to carefully architect a cybersecurity program that meets applicable legal and contractual obligations while protecting your company’s assets.

Events