Connected Helmet Protects Workers: IBM IoT + ARM mbed in Action

| November 11, 2015

article image
Bob the Builder" meets ARM mbed, analyzed by IBM Internet of Things Foundation in the cloud, at ARM TechCon 2015.

Spotlight

iMin Technology

A majority of the retail businesses and restaurants you encounter on a day to day basis, out and about, either need to implement business transformation or have the desire to do so. They use hardware equipment, apps, websites, data, and other forms of IoT, cloud and communication including chatbots and messaging platforms to make this happen. Sometimes it's a integration nightmare, and it's impossible to get everything from hardware to cloud software to work together seamlessly. This is where iMin comes in.

OTHER ARTICLES

Automotive Cyber Security: A Crash Course on Protecting Cars Against Hackers

Article | March 26, 2020

Modern cars have dozens of computers on board, and they’re not just for running GPS or playing music. Computers monitor and control nearly every system on your vehicle, including steering, brakes, and the engine itself. This is why automotive cyber security is essential. If a vehicle’s computer systems aren’t properly protected, hackers can steal data or even take control of the vehicle. As you can imagine, that makes automotive cyber security a major concern for consumers, auto companies, and OEMs alike. But what is there to know about automotive cyber security? We’ll explore what cybersecurity in the automotive industry entails and what the biggest threats are to automotive IoT and connected vehicles. We’ll also share some insights from a recent webinar by Sectigo and Mentor Graphics on how to protect connected vehicles from emerging cybersecurity threats.

Read More

Frailties of LoRaWAN IoT Devices

Article | March 26, 2020

Low-power wide-area networks (LPWANs) are helping drive the Internet of things (IoT) explosion. They connect millions of low-power IoT and Industrial IoT (IIoT) devices into wireless networks over a range of distances, from short to really, really long, from indoor applications to those covering large fields or even cities. But device designers using the LoRaWAN standard may be lulled into thinking that just configuring its security keys is enough to prevent their devices from being hacked. A new report says it isn’t. Four protocols give enterprises a choice in LPWAN connectivity: cellular NB-IoT, LTE-M, and Sigfox, and the non-cellular LoRaWAN standard. Among these, the open LoRaWAN overwhelmingly dominates. Omdia (formerly IHS Markit – Technology) projects a “quite high forecast” for LoRa, said Lee Ratliff, senior principal analyst, connectivity and IoT.

Read More

WISeKey Drives Innovations in IoT Security with 23 Strategic Patents in the US

Article | March 26, 2020

WISeKey International Holding Ltd., cybersecurity delivering Integrated Security Platforms, announced that it has registered a total of 23 new strategic patents in US which are essential to the digital transformation applications that are fueling the growth in the IoT market.With a rich portfolio of more than 46 patent families, covering over 100 fundamental individual patents, and another 22 patents under review, WISeKey continues to expand its technology footprint in various domains including the design of secure chips, near field communication (NFC), the development of security firmware and backend software, the secure management of data, the improvement of security protocols between connected objects and advanced cryptography.

Read More

WiFi for Enterprise IoT: Why You Shouldn’t Use It

Article | March 26, 2020

So you’re building an IoT solution and you’re ready to select your connectivity approach. Should you use Bluetooth? WiFi? LoRa? Cellular? Satellite? As I’ve explored in a previous post, the connectivity approach you choose ultimately comes down to the specific needs of your use case. Some use cases favor mobility and bandwidth, and power consumption doesn’t matter as much. Other use cases favor extensive battery life and broad coverage, and bandwidth doesn’t matter as much. In this post, I argue that for Enterprise IoT solutions, you shouldn’t use WiFi regardless of the use case. To build and implement a successful IoT solution, your connectivity needs to be reliable and consistent. When there’s an issue that needs troubleshooting, knowing that certain components of your IoT solution are reliable and consistent enables you to narrow your focus and address issues more effectively. There are many challenges in IoT, many of which stem from operational challenges and from having thousands of devices out in the real world where they’re subject to harsh, ever-changing environments.

Read More

Spotlight

iMin Technology

A majority of the retail businesses and restaurants you encounter on a day to day basis, out and about, either need to implement business transformation or have the desire to do so. They use hardware equipment, apps, websites, data, and other forms of IoT, cloud and communication including chatbots and messaging platforms to make this happen. Sometimes it's a integration nightmare, and it's impossible to get everything from hardware to cloud software to work together seamlessly. This is where iMin comes in.

Events