Cleaning Up Fleet Management with IoT

| September 2, 2016

article image
Learn how the IRIS® Asset Manager Solution from Tennant allows companies to manage their fleet of machines across multiple sites. This intelligent command center, powered by Telit's deviceWISE IoT Platform delivers key performance metrics, empowering you with actionable insights to optimize fleet performance, improve cleaning efficiency, drive measurable results, and reduce cost-to-clean.

Spotlight

Nuvias Cyber Security

The Nuvias Cyber Security practice draws upon many years of experience provided by the highly skilled teams and resources that were formerly Wick Hill in the UK and DCB in Benelux. This international expertise can be accessed via our regional sales teams and offices (formally Zycko offices) across EMEA in 20 countries. Please follow us on Twitter @NuviasCS for Cyber Security news. Follow @nuviasgroup on Twitter & LinkedIn and visit www.nuvias.com for general updates on the Nuvias Group. Follow our various country and practice feeds on LinkedIn and Twitter for regional information.

OTHER ARTICLES

How Will the Emergence of 5G Affect Federated Learning?

Article | April 10, 2020

As development teams race to build out AI tools, it is becoming increasingly common to train algorithms on edge devices. Federated learning, a subset of distributed machine learning, is a relatively new approach that allows companies to improve their AI tools without explicitly accessing raw user data. Conceived by Google in 2017, federated learning is a decentralized learning model through which algorithms are trained on edge devices. In regard to Google’s “on-device machine learning” approach, the search giant pushed their predictive text algorithm to Android devices, aggregated the data and sent a summary of the new knowledge back to a central server. To protect the integrity of the user data, this data was either delivered via homomorphic encryption or differential privacy, which is the practice of adding noise to the data in order to obfuscate the results.

Read More

Finding and Fixing Blind Spots in Enterprise IoT Security

Article | March 20, 2020

The Internet of Things has been a breakthrough, and adoption rates keep exploding. There are possibly over 20 billion IoT devices in the world, and by 2025, there may have been 75 billion. Even though there has been a rise in smart home devices, most IoT devices are found in businesses, industries, and healthcare. The benefits are overwhelming: from enabling automation of repetitive tasks (both simple and complex), to real-time data insights and analytics, IoT devices make workers more productive, improve customer experience, and reduce operating costs. However, with the many benefits of IoT devices come serious disadvantages, chief of which is security. Here are some reasons why IoT devices have such serious security risks:

Read More

IoT Security: Inherent Risks Require Robust Solutions

Article | February 25, 2020

IoT technologies offer many remarkable benefits. They can make complicated tasks, such as tracking a fleet of thousands of vehicles, monitoring and adjusting manufacturing processes or automating a smart home or office simpler, easier and more cost-effective than ever before. By inviting IoT devices into our homes, workplaces and public spaces, however, we also expose new attack surfaces. When we assign an IoT system to be responsible for a critical task or trust it to monitor sensitive information in our most private spaces, we want to ensure that the system can be trusted. For this reason, it is vital that security best practices are applied at all stages when developing an IoT solution.

Read More

Smart Home Technologies: Zigbee, Z-Wave, Thread, and Dotdot

Article | February 11, 2020

If you own smart home products like SmartThings or Nest, you may be familiar with some of the technologies behind them. Network protocols like Zigbee and Z-Wave dominate the industry, while Thread, a younger network standard, is gaining headway as a strong contender in the battle for market share. Although this may seem like your typical rivalry between industry leaders, the competitive landscape is more complicated than selecting one over another.

Read More

Spotlight

Nuvias Cyber Security

The Nuvias Cyber Security practice draws upon many years of experience provided by the highly skilled teams and resources that were formerly Wick Hill in the UK and DCB in Benelux. This international expertise can be accessed via our regional sales teams and offices (formally Zycko offices) across EMEA in 20 countries. Please follow us on Twitter @NuviasCS for Cyber Security news. Follow @nuviasgroup on Twitter & LinkedIn and visit www.nuvias.com for general updates on the Nuvias Group. Follow our various country and practice feeds on LinkedIn and Twitter for regional information.

Events