Arm expands IoT connectivity and device management capabilities with acquisition of Stream Technologies

Arm’s vision of a trillion connected devices by 2035 is driven by many factors, including the opportunity for companies to derive real business value from IoT data. The benefits of leveraging this data are often obvious, says Hima Mukkamala, senior vice president and general manager, IoT Cloud Services, Arm: greater efficiencies, faster time to market, cost savings and new revenue streams. Embracing these benefits ultimately comes down to ensuring the data is trusted, secure and quickly accessible to provide meaningful insights. The Arm Mbed IoT Device Management Platform addresses these requirements by enabling organisations to securely develop, provision and manage connected devices at scale. The next evolution of the Mbed IoT Device Management platform is now underway, with the acquisition of Stream Technologies, which will be integrated with the platform to enable connectivity management of every device regardless of location or network.

Spotlight

Zuul IoT

It is the time of the Internet of Things. With all of the excitement and opportunity that brings, the rapidly expanding Internet of Things exposes your company’s networks to never before seen levels of vulnerability from external attacks. This unprecedented influx of internet-connected devices is also creating enormous headaches for IT departments everywhere.

OTHER ARTICLES
Enterprise Iot

5 IoT Trends for Marketers to Watch in 2021

Article | May 11, 2023

The COVID-19 pandemic turned the tides towards remote work and virtual connectivity. And even though growth seemed to have slowed down in 2020, experts see double-digit growth in the next few years. The tides may be turning but virtual connectivity and the tools required for remote growth are not slowing down in demand. As the tech world adapts to new shifts, IoT is among one of the most anticipated technologies to prosper in 2021. Digital transformation has rapidly accelerated in the past year and if the experts are to be believed, 2021 shows promise for an even better year for technological advancement. According to IDC’s 2020-2024 forecast, spending will reach an annual growth rate of 11.3 percent. And with this, the number of connected devices is likely to grow up. Take a look at what will be the focus of IoT industry trends in 2021. Privacy & Security As smart homes are becoming the norm and you cannot throw a stone without hitting a smart device, one thing is clear—IoT devices are everywhere. People almost always forget smartphones when talking about IoT devices, but the fact is that smartphones are very much a part of the IoT ecosystem. And with the infusion of IoT in our everyday lives, questions about privacy and security are cropping up. Just recently, as WhatsApp announced its new privacy policy, millions of users planned to migrate to other alternatives. This led to WhatsApp pushing back its privacy update and tech businesses taking note of changing winds. In 2021, privacy and security will be at the forefront of IoT industry trends, as devices infuse further into the everyday lives of people. According to recent research, 90 percent of consumers lack confidence in IoT device security. And the onus of bolstering consumer confidence will be up to IoT businesses. Workforce Management According to Gartner’s “Top Strategic Technology Trends For 2021” report, IoT will be a large part of the office experience in 2021. As businesses are trying to avoid the losses that occurred in early 2020, workplaces are being geared up with RFID tags, sensors, and monitors to ensure social distancing measures, whether employees are wearing masks and overall health monitoring. Additionally, many organizations have decided to move permanently to a remote mode and will rely more on IoT devices for connectivity. So we can expect better automated scheduling and calendar tools, more interactive video conferencing, and virtual meeting technology. In the case of fieldwork, IoT will offer an added factor of monitoring behavior. Greener IoT Experts predict that energy will be a crucial factor in the IoT industry trends in 2021. With smart grids, metering, and restoration resilience being powered by IoT, 2021 will move towards optimized energy consumption and devices that are designed to encourage energy-friendly practices. What’s more? Smart engines and automobiles can be optimized to reduce their carbon footprint and become energy-friendly. As evidenced by the Paris summit and the wildfires in 2020, the world is becoming ecologically conscious. IoT devices in 2021 will focus heavily on reduced emissions, lowering air and ocean pollution, and minimizing power expenditure. Location Data As COVID-19 limited human interaction, location-based services soared during the pandemic. Businesses started leveraging location data to offer curbside pickup, virtual queues, and check-ins for reservations to enhance the customer experience during the pandemic. According to experts, the use of location data will continue to be crucial for customer service and convenience in 2021. As people prefer being safe even as the vaccines are being delivered, location data will allow businesses to cater to their customers without compromising on customer or employee safety. Digital twins IoT is being helmed as the perfect technology partner for creating digital twins in many industries. As IoT collects a large amount of data through physical devices, this data can be reinterpreted to create the perfect digital twins. Also, IoT can offer visibility into the full product life cycle and unfold deeper operational intelligence. Companies like Siemens are already leveraging technologies like AIoT to design and create digital twins for product design and production. Coupled with AI, IoT will be used more commonly for creating digital twins in 2021. A technology as dynamic as IoT can be leveraged for almost any application. Therefore, it may surprise us all in the way it progresses in 2021. However, experts believe that the above 5 IoT industry trends will rule 2021 for sure. Frequently Asked Questions What are the latest IoT industry trends? The use of IoT in Healthcare, Artificial Intelligence, workforce management, and ecological conservation can be deemed as some of the latest trends in IoT. What is the future scope of IoT? As experts believe there will be over 85 billion connected devices by the end of 2021, and the numbers are promising for upcoming years, we can safely say that the future of IoT is indeed bright. What industries are most likely to use the Internet of things technology? IoT is a dynamic technology with applications in almost every industry. However, industries like healthcare, construction, manufacturing, tech, and resource management are most like to use IoT right now. { "@context": "https://schema.org", "@type": "FAQPage", "mainEntity": [{ "@type": "Question", "name": "What are the latest IoT industry trends?", "acceptedAnswer": { "@type": "Answer", "text": "The use of IoT in Healthcare, Artificial Intelligence, workforce management, and ecological conservation can be deemed as some of the latest trends in IoT." } },{ "@type": "Question", "name": "What is the future scope of IoT?", "acceptedAnswer": { "@type": "Answer", "text": "As experts believe there will be over 85 billion connected devices by the end of 2021, and the numbers are promising for upcoming years, we can safely say that the future of IoT is indeed bright." } },{ "@type": "Question", "name": "What industries are most likely to use the Internet of things technology?", "acceptedAnswer": { "@type": "Answer", "text": "IoT is a dynamic technology with applications in almost every industry. However, industries like healthcare, construction, manufacturing, tech, and resource management are most like to use IoT right now." } }] }

Read More
Industrial IoT, IoT Security

Top 10 Tools for IoT Security Testing: Mitigating Cyber Threats

Article | July 12, 2023

Explore the IoT tools for security and maintenance. These IoT monitoring tools addresses cyber security and privacy issues, catering to a various users including industrialists & individuals. With the proliferation of interconnected devices in the Internet of Things ecosystem, ensuring robust security measures has become crucial to protect against cyber threats. The complexity and diversity of IoT systems pose unique challenges, making thorough security testing an essential practice. To address these challenges, various IoT development tools have emerged that enable organizations to assess and mitigate vulnerabilities in their IoT deployments. In this article, explore the top ten tools to secure IoT and IoT testing, equipping professionals and organizations with the means to identify and address potential security weaknesses, thus bolstering the overall security posture of their IoT infrastructure. 1. AWS IoT Device Defender AWS IoT Device Defender is one of the security IoT management tools, designed to protect and manage IoT devices and fleets. Its auditing capabilities and continuous monitoring enable users to assess their IoT resources' security posture, identify vulnerabilities, and address potential gaps. By leveraging machine learning models or defining custom device behaviors, it can monitor and detect malicious activities, such as traffic from suspicious IP addresses or unusual connection attempts. The tool provides security alerts for failed audits or behavior anomalies, allowing users to mitigate potential risks quickly. Built-in actions facilitate security issue resolution, including device certificate updates, quarantine, and policy replacements. AWS IoT Device Defender offers automation for security assessments, identification of attack vectors, analysis of historical device behavior, and alarm notifications through various AWS interfaces. 2. Dynamic Application Security Testing Appknox offers two robust mobile application security solutions: Automated Dynamic Application Security Testing (DAST) and Penetration Testing (PT). With Automated DAST, users can assess the security of their mobile apps in real time while running in their operational environment. The solution provides access to real devices, allowing users to replicate real-life interactions and identify security vulnerabilities. On the other hand, Appknox's Penetration Testing solution delivers reliable and thorough security assessments by expert security researchers. Users can request a manual pentest effortlessly, and the skilled team analyzes apps to identify and eliminate potential threats. The process includes identifying the tech stack, analyzing the threat landscape, setting up breakpoints, testing responses, detecting bugs, and performing advanced threat exploits. 3. Enterprise IoT Security Enterprise IoT Security is a comprehensive Zero Trust solution designed to address IoT devices' security challenges in modern enterprises. It helps eliminate implicit trust and enforces zero-trust principles through least privilege access, continuous trust verification, and continuous security inspection. With this solution, organizations can quickly discover and assess every IoT device, easily segment and enforce the least privileged access, and protect against known and unknown threats. By simplifying operations, Enterprise IoT Security enables faster deployment, with a 15-time faster deployment than other solutions. The solution offers better and faster protection for IoT devices, delivering 70 times more security efficiency and 20 times speedier policy creation. 4. Azure Sphere Azure Sphere is a secure IoT platform offered by Microsoft that allows businesses to create, connect, and maintain intelligent IoT devices. It provides end-to-end security, from the silicon level to the operating system (OS) to the cloud. With Azure Sphere, organizations can securely connect, manage, and protect existing and new IoT devices. The platform offers over-the-air updates, integration with IoT platform services, and continuous security improvements. It helps businesses deploy real-time security patches, maintain device operations, and accelerate time to market. Azure Sphere incorporates essential security properties and offers comprehensive security and compliance. 5. Microsoft Defender for IoT Microsoft Defender for IoT is a comprehensive security solution that provides real-time asset discovery, vulnerability management, and threat protection for the Internet of Things and industrial infrastructure, including ICS/OT environments. It offers context-aware visibility into IoT and OT assets, enabling organizations to manage their security posture and reduce attack surfaces based on risk prioritization. With behavioral analytics, it detects and responds to attacks across IT and OT networks. Integrated with SIEM/SOAR and XDR tools, it delivers unified security and leverages threat intelligence for automatic response. Microsoft Defender for IoT is designed to meet the unique security needs of various industries and supports complete endpoint protection when combined with Defender for Endpoint. 6. IoT Security Forescout offers an IoT security solution that automates security measures and provides visibility for every device connected to the network. Their zero-trust approach ensures complete device visibility, proactive network segmentation, and least-privilege access control for IoT, OT, IoMT, and IT devices. The platform classifies and monitors devices in real time, identifies weak credentials, and enforces strong passwords. It also enables dynamic network segmentation and automates zero trust policy orchestration across multi-vendor environments. Forescout's solution efficiently manages asset inventory and device lifecycle and has been proven to scale for enterprise-level deployments. 7. ThingSpace The ThingSpace Platform for IoT offers a comprehensive set of iot tools and devices for developing and managing the lifecycle of IoT devices. It enables connectivity management at scale, allowing secure activation on the Verizon network and providing features to troubleshoot, locate, and manage IoT devices. Whether at the prototype stage or ready to scale for enterprise-level deployment, ThingSpace provides the necessary resources for IoT solution development and management. As a Magic Quadrant Leader for IoT Connectivity Services, ThingSpace offers solutions for software management, device readiness, and overall device lifecycle management. Businesses can collaborate with technology leaders through their Executive Briefing Program to achieve their specific goals and gain a competitive edge. 8. Verimatrix The Verimatrix Secure Delivery Platform offers a unified user experience by combining cybersecurity and anti-piracy services into a comprehensive cloud ecosystem. It provides media companies, content owners, streaming providers, and broadcast operators with a single pane of glass experience for securing content, applications, and devices. Key offerings include Streamkeeper Multi-DRM for cloud-based digital rights management, Verimatrix App Shield for zero code hardening of mobile applications, Verimatrix Video Content Authority System (VCAS) for real-time monitoring, and Streamkeeper Counterspy for cybersecurity and anti-piracy solutions. The platform also facilitates partner integrations, enabling seamless onboarding and revenue preservation. 9. Trustwave Trustwave's Managed IoT Security provides comprehensive solutions to secure the Internet of Things (IoT) and minimize the risk of compromise. With expertise from Trustwave SpiderLabs, it offers knowledge about network assets, identifies weaknesses in applications, servers, APIs, and cloud clusters, and enables secure IoT deployment with quick validation of fixes. This reduces the risk of compromised devices, which can lead to various threats, including DoS attacks, privacy violations, and data theft. Trustwave's services cater to IoT developers/manufacturers, offering product security reviews, testing, and incident readiness services. For IoT implementers, it provides managed security services and testing to safeguard deployments and associated data. 10. ARMIS Agentless Device Security Platform The ARMIS Agentless Device Security Platform supports implementing the Critical Security Controls(CIS) framework. Developed by the Center for Internet Security (CIS), these controls are periodically updated by a global community of experts. ARMIS aligns with the CIS Controls and provides a comprehensive set of security controls to address the framework's requirements. The platform caters to enterprises of all sizes and offers different implementation groups based on risk profile and available resources. With ARMIS, organizations can enhance their cybersecurity posture and implement the CIS Controls effectively. Final Thoughts Security is a major concern in IoT tools and software due to the proliferation of connected devices, the diverse and complex nature of IoT ecosystems, the need to protect data privacy and confidentiality, the lack of standardization, the long lifecycles of devices, and the distributed and scalable nature of IoT deployments. Addressing these concerns is crucial to prevent unauthorized access, data breaches, and ensure the integrity and privacy of IoT data. The IoT tools and technologies discussed in this article represent some of the top options for conducting comprehensive IoT security testing. By leveraging these tools, professionals and organizations can proactively identify and address vulnerabilities in their IoT systems, ensuring their data and devices' confidentiality, integrity, and availability. By incorporating these tools into their security practices, organizations can bolster their IoT security strategy and enhance their ability to protect against emerging threats in the dynamic IoT landscape.

Read More
IoT Security

IoT Adoption: Before and After COVID-19

Article | July 5, 2023

The survey data I’m referring to comes from a study conducted by the Eclipse Foundation about the adoption of commercial Internet of Things (IoT) technology. The aim of the study was to get a better understanding of the IoT industry landscape by identifying the requirements, priorities, and challenges faced by organizations deploying and using commercial IoT technologies. More than 350 respondents from multiple industries responded, with about a quarter of respondents coming from industrial production businesses. While this survey was not solely focused on the manufacturing and processing industries, its results reflect the general business community’s IoT adoption at the end of 2019. As such, it is a pre-COVID-19 snapshot of IoT adoption.

Read More
Enterprise Iot

Securing Real-world IoT Applications through Penetration Testing

Article | July 20, 2023

Enhancing IoT security: Unveiling the significance of penetration testing in securing real-world IoT applications, identifying vulnerabilities, and mitigating risks for the protection of IoT data. Contents 1. Introduction to IoT Application Security and Penetration Testing 1.1 Vulnerabilities of IoT application security 2. Fundamentals of IoT Penetration Testing 3. Considerations for IoT Penetration Testing 4. Methodologies and Approaches for IoT Penetration Testing 5. Takeaway 1. Introduction to IoT Application Security and Penetration Testing Securing real-world IoT applications is paramount as the Internet of Things (IoT) permeates various aspects of any individuals lives. Penetration testing serves as a vital tool in identifying vulnerabilities and assessing the resilience of IoT systems against cyber threats. In this article, delve into the significance of penetration testing in securing IoT applications, exploring its role in identifying weaknesses, mitigating risks, and ensuring the integrity and confidentiality of IoT data. 1.1 Vulnerabilities of IoT application security Expanded Attack Surface: The proliferation of IoT devices has dramatically expanded the attack surface, increasing the potential for security breach enterprise networks. With billions of interconnected devices, each presenting a potential vulnerability, the risk of unauthorized access, data breaches, and other security incidents is significantly heightened. Risks: IoT devices often possess limited computational resources, making them susceptible to software and firmware vulnerabilities. Their resource-constrained nature can limit the implementation of robust security measures, leaving them exposed to potential attacks. Furthermore, a significant concern is the prevalence of default or weak credentials on these devices. Diverse Threat Landscape: The threat landscape surrounding IoT devices is extensive and ever-evolving. It encompasses various attack vectors, including malware, botnets, DDoS attacks, physical tampering, and data privacy breaches. One notable example is the Mirai botnet, which compromised a vast number of IoT devices to launch large-scale DDoS attacks, leading to significant disruptions in internet services. In addition, IoT devices can serve as entry points for infiltrating larger networks and systems, allowing attackers to pivot and gain control over critical infrastructure. Botnets: IoT devices can be infected with malware and become part of a botnet, which can be used for various malicious activities. Botnets are often utilized to launch distributed denial-of-service (DDoS) attacks, where a network of compromised devices overwhelms a target system with traffic, causing it to become inaccessible. Ransomware: IoT devices are also vulnerable to ransomware attacks. Ransomware is malicious software that encrypts the data on a device and demands a ransom payment in exchange for the decryption key. Data Breaches: IoT devices can be targeted to steal sensitive data, including personal identifiable information (PII) or financial data. Due to inadequate security measures, such as weak authentication or unencrypted data transmissions, attackers can exploit IoT devices as entry points to gain unauthorized access to networks and systems. 2. Fundamentals of IoT Penetration Testing IoT penetration testing, also known as ethical hacking or security assessment, is a critical process for testing and identifying vulnerabilities and assessing the security posture of IoT devices, networks, and applications. It involves simulating real-world attacks to uncover weaknesses and provide insights for remediation. IoT penetration testing involves identifying vulnerabilities, conducting targeted attacks, and evaluating the effectiveness of security controls in IoT systems. IoT pen-testing aims to proactively identify and address potential weaknesses that malicious actors could exploit. The methodology of IoT pen-testing typically follows a structured approach. It begins with attack surface mapping, which involves identifying all potential entry and exit points that an attacker could leverage within the IoT solution. This step is crucial for understanding the system's architecture and potential vulnerabilities. Pentesters spend considerable time gathering information, studying device documentation, analyzing communication protocols, and assessing the device's hardware and software components. Once the attack surface is mapped, the following steps involve vulnerability identification and exploitation. This includes conducting security tests, exploiting vulnerabilities, and evaluating the system's resilience to attacks. The penetration testers simulate real-world attack scenarios to assess the device's ability to withstand threats. After exploitation, post-exploitation activities are performed to determine the extent of the compromise and evaluate the potential impact on the device and the overall IoT ecosystem. Finally, a detailed technical report summarizes the findings, vulnerabilities, and recommendations for improving the device's security. 3. Considerations for IoT Penetration Testing Fuzzing and Protocol Reverse Engineering: Employ advanced techniques like fuzzing to identify vulnerabilities in communication protocols used by IoT devices. Fuzzing involves sending malformed or unexpected data to inputs and analyzing the system's response to uncover potential weaknesses. Radio Frequency (RF) Analysis: Perform RF analysis to identify weaknesses in wireless communication between IoT devices. This includes analyzing RF signals, monitoring wireless communication protocols, and identifying potential vulnerabilities such as replay attacks or unauthorized signal interception. Red Team Exercises: Conduct red team exercises to simulate real-world attack scenarios and evaluate the organization's detection and response capabilities. Red team exercises go beyond traditional penetration testing by emulating the actions and techniques of skilled attackers. This helps uncover any weaknesses in incident response, detection, and mitigation processes related to IoT security incidents. Embedded System Analysis: Gain expertise in analyzing and reverse engineering embedded systems commonly found in IoT devices. This includes understanding microcontrollers, debugging interfaces, firmware extraction techniques, and analyzing the device's hardware architecture. Embedded system analysis helps identify low-level vulnerabilities and potential attack vectors. Zero-Day Vulnerability Research: Engage in zero-day vulnerability research to identify previously unknown vulnerabilities in IoT devices and associated software. This requires advanced skills in vulnerability discovery, exploit development, and the ability to responsibly disclose vulnerabilities to vendors. 4. Methodologies and Approaches for IoT Penetration Testing Mobile, Web and Cloud Application Testing Mobile, web, and cloud application testing is integral to IoT penetration testing, focusing on assessing the security of applications that interact with IoT devices. This methodology involves various steps to evaluate the security of these applications across different platforms. For mobile applications, the methodology includes reviewing the binary code, conducting reverse engineering to understand the inner workings, and analyzing the file system structure. Sensitive information such as keys and certificates embedded within the mobile app are scrutinized for secure storage and handling. The assessment extends to examining the application's resistance to unauthorized modifications. In web applications, the testing covers common vulnerabilities like cross-site scripting (XSS), insecure direct object references (IDOR), and injection attacks. Application reversing techniques are employed to gain insights into the application's logic and potential vulnerabilities. Additionally, hardcoded API keys are identified and assessed for their security implications. Firmware Penetration Testing Firmware penetration testing is a crucial aspect of IoT security assessments, aiming to identify vulnerabilities within the firmware running on IoT devices. The methodology encompasses multiple steps to uncover weaknesses. The process begins with binary analysis, dissecting the firmware to understand its structure, functionality, and potential vulnerabilities. Reverse engineering techniques are applied to gain deeper insights into the firmware's inner workings, exposing potential weaknesses like hardcoded credentials or hidden functionality. The analysis extends to examining different file systems used in the firmware and evaluating their configurations and permissions. Sensitive keys, certificates, and cryptographic material embedded within the firmware are scrutinized for secure generation, storage, and utilization. Additionally, the resistance of the firmware to unauthorized modification is assessed, including integrity checks, secure boot mechanisms, and firmware update processes. IoT Device Hardware Pentest IoT device hardware penetration testing involves a systematic methodology to assess the security of IoT devices at the hardware level. This comprehensive approach aims to identify vulnerabilities and weaknesses that attackers could exploit. The methodology includes analyzing internal communication protocols like UART, I2C, and SPI to understand potential attack vectors. Open ports are examined to evaluate the security controls and risks associated with communication interfaces. The JTAG debugging interface is explored to gain low-level access and assess the device's resistance to unauthorized access. Extracting firmware from EEPROM or FLASH memory allows testers to analyze the code, configurations, and security controls. Physical tampering attempts are made to evaluate the effectiveness of the device's physical security measures. 5. Takeaway Penetration testing is crucial in securing real-world IoT applications, enabling organizations to identify vulnerabilities and mitigate risks effectively. By conducting comprehensive and regular penetration tests, organizations can proactively identify and address security weaknesses, ensuring the integrity and confidentiality of IoT data. With the ever-growing threat landscape and increasing reliance on IoT technologies, penetration testing has become indispensable to safeguard IoT applications and protect against potential cyber-attacks. Several key factors will shape the future of IoT penetration testing. First, the increasing complexity of IoT systems will require testing methodologies to adapt and assess intricate architectures, diverse protocols, and a wide range of devices. Second, there will be a greater emphasis on security by design, with penetration testing focusing on verifying secure coding practices, robust access controls, and secure communication protocols. Third, supply chain security will become crucial, necessitating penetration testing to assess the security measures implemented by vendors, third-party components, and firmware updates. Fourth, integrating IoT penetration testing with DevSecOps practices will ensure continuous monitoring and improvement of IoT system security. Lastly, as attackers become more sophisticated, future IoT penetration testing methodologies will need to keep pace with evolving IoT-specific attack techniques. By embracing these advancements, IoT penetration testing will play a vital role in ensuring the security and privacy of IoT deployments.

Read More

Spotlight

Zuul IoT

It is the time of the Internet of Things. With all of the excitement and opportunity that brings, the rapidly expanding Internet of Things exposes your company’s networks to never before seen levels of vulnerability from external attacks. This unprecedented influx of internet-connected devices is also creating enormous headaches for IT departments everywhere.

Related News

Harnessing IoT data from the edge to the cloud and back

IoT Now | July 10, 2018

The Internet-of-Things (IoT) offers the potential to dramatically improve many tasks as diverse as preventative maintenance for electronic appliances to smart traffic lights to help reduce congestion.As Pinakin Patel, head of Solutions Engineering for MapR says, many of the use cases require the collection of sensor data from edge devices that is sent over a network connection to a centralised application for analysis before an action is carried out; often back at the edge. This classic input, process and output methodology is well understood but any IoT environment can be a data management challenge because of the huge volumes of data that are created and the latencies inherent in having global distribution.

Read More

Liege gets smart parking through NB-IoT technology – and a new partnership

IoT Tech News | July 04, 2018

Belgium-based CommuniThings has partnered with Orange to launch the first smart-parking solution over NB-IoT technology for commercial use. Dubbed as "Shop & Drive", the solution assists commuters to find available parking space via a mobile application at the same time as stimulating shopping activities through increased vehicle rotations at each spot. This Shop & Drive smart parking solution running on Orange Belgium's Mobile IoT network introduces low-power wireless sensors and open-data applications serving residents, retailers and municipalities.

Read More

A virtual va-va-voom: How service providers can achieve true flexibility and adopt a sustainable pay-as-you-grow model

IoT Now | July 09, 2018

There’s been a lot of talk about virtualisation in the telecoms world over the past decade. We’ve heard all about how it will enable service providers to drive down capital expenditure, simplify configuration and maintenance, and improve the agility of their networks,allowing them to provide the highest Quality of Experience (QoE) to the end user, who demands 4G access. But, asks Alistair Grant, business development EMEA at Adax, are service providers truly seeing the fruits of their labour? Have they actually got to grips with today’s virtual world?

Read More

Harnessing IoT data from the edge to the cloud and back

IoT Now | July 10, 2018

The Internet-of-Things (IoT) offers the potential to dramatically improve many tasks as diverse as preventative maintenance for electronic appliances to smart traffic lights to help reduce congestion.As Pinakin Patel, head of Solutions Engineering for MapR says, many of the use cases require the collection of sensor data from edge devices that is sent over a network connection to a centralised application for analysis before an action is carried out; often back at the edge. This classic input, process and output methodology is well understood but any IoT environment can be a data management challenge because of the huge volumes of data that are created and the latencies inherent in having global distribution.

Read More

Liege gets smart parking through NB-IoT technology – and a new partnership

IoT Tech News | July 04, 2018

Belgium-based CommuniThings has partnered with Orange to launch the first smart-parking solution over NB-IoT technology for commercial use. Dubbed as "Shop & Drive", the solution assists commuters to find available parking space via a mobile application at the same time as stimulating shopping activities through increased vehicle rotations at each spot. This Shop & Drive smart parking solution running on Orange Belgium's Mobile IoT network introduces low-power wireless sensors and open-data applications serving residents, retailers and municipalities.

Read More

A virtual va-va-voom: How service providers can achieve true flexibility and adopt a sustainable pay-as-you-grow model

IoT Now | July 09, 2018

There’s been a lot of talk about virtualisation in the telecoms world over the past decade. We’ve heard all about how it will enable service providers to drive down capital expenditure, simplify configuration and maintenance, and improve the agility of their networks,allowing them to provide the highest Quality of Experience (QoE) to the end user, who demands 4G access. But, asks Alistair Grant, business development EMEA at Adax, are service providers truly seeing the fruits of their labour? Have they actually got to grips with today’s virtual world?

Read More

Events