Digital Industrial Transformation with the Internet of Things

| December 6, 2019

article image
At the heart of the digital transformation of asset-intensive industries, such as manufacturing, is the leveraging of emerging technology to streamline decade-old processes and operations, improve existing products and launch new ones, create new channels to the customers and develop new business models.

Spotlight

LoopPay

Founded in 2012 in Boston, MA, LoopPay is the most widely accepted mobile payment provider, empowering consumers to finally leave their physical wallets at home, today. LoopPay’s patented Magnetic Secure Transmission™ (MST) technology turns existing mag stripe readers into mobile contactless readers without any change or cost to merchants or their payment processors, enabling secure mobile payments at more than 10 million locations in the U.S. Consumers can select from an array of devices that match their phones and fit their lifestyles, including the LoopPay Fob, ChargeCase, CardCase and Card. In addition, all cards, including payment, gift, loyalty, reward and IDs, can be stored in one place via the LoopPay app, which offers utmost convenience and security, as all data is password and PIN-protected. LoopPay also encrypts and stores all card track data in secure memory within any device and is a Level One PCI Certified Payment Provider.

OTHER ARTICLES

WiFi for Enterprise IoT: Why You Shouldn’t Use It

Article | April 9, 2020

So you’re building an IoT solution and you’re ready to select your connectivity approach. Should you use Bluetooth? WiFi? LoRa? Cellular? Satellite? As I’ve explored in a previous post, the connectivity approach you choose ultimately comes down to the specific needs of your use case. Some use cases favor mobility and bandwidth, and power consumption doesn’t matter as much. Other use cases favor extensive battery life and broad coverage, and bandwidth doesn’t matter as much. In this post, I argue that for Enterprise IoT solutions, you shouldn’t use WiFi regardless of the use case. To build and implement a successful IoT solution, your connectivity needs to be reliable and consistent. When there’s an issue that needs troubleshooting, knowing that certain components of your IoT solution are reliable and consistent enables you to narrow your focus and address issues more effectively. There are many challenges in IoT, many of which stem from operational challenges and from having thousands of devices out in the real world where they’re subject to harsh, ever-changing environments.

Read More

Which IoT Applications will Benefit Most from Edge Computing?

Article | April 9, 2020

Edge computing refers to information being processed at the edge of the network, rather than being sent to a central cloud server. The benefits of edge computing include reduced latency, reduced costs, increased security and increased business efficiency. Transferring data from the edge of a network takes time, particularly if the data is being collected in a remote location. While the transfer may usually take less than a second, glitches in the network or an unreliable connection may increase the time required. For some IoT applications, for example, self-driving cars, even a second may be too long. Imagine a security camera that’s monitoring an empty hallway. There’s no need to send hours of large video files of an empty hallway to a cloud server (where you will need to pay to store them). With edge computing, the video could be sent to the cloud only if there is movement detected in the hallway.

Read More

Microsoft acquires ReFirm Labs to enhance IoT security

Article | April 9, 2020

Modern computing devices can be thought of as a collection of discrete microprocessors each with a dedicated function like high-speed networking, graphics, Disk I/O, AI, and everything in between. The emergence of the intelligent edge has accelerated the number of these cloud-connected devices that contain multiple specialized sub-processors each with its own firmware layer and often a custom operating system. Many vulnerability analysis and endpoint detection and response (EDR) tools find it challenging to monitor and protect devices at the firmware level, leading to an attractive security gap for attackers to exploit. At the same time, we have also seen growth in the number of attacks against firmware where sensitive information like credentials and encryption keys are stored in memory. A recent survey commissioned by Microsoft of 1,000 security decision-makers found that 83 percent had experienced some level of firmware security incident, but only 29 percent are allocating resources to protect that critical layer. And according to March 2021 data from the National Vulnerability Database included in a presentation from the Department of Homeland Security’s Cybersecurity and Infrastructure Agency (CISA) at the 2021 RSA, difficult-to-patch firmware attacks are continuing to rise. Microsoft’s Azure Defender for IoT team (formerly CyberX) recently announced alongside the Department of Homeland Security a series of more than 25 critical severity vulnerabilities in IoT and OT devices

Read More

Advantages and Disadvantages of Implementing IoT in Healthcare

Article | April 9, 2020

Given such examples, the Internet of Things (IoT) is seen as a way of living a smarter and safer life and its application is highly encouraged in medical establishments. However, digital transformation in healthcare isn’t without threats. It’s important to weigh all the advantages and disadvantages of implementing IoT systems in healthcare to be able to plan for ways to maximize the pros while mitigating the cons.

Read More

Spotlight

LoopPay

Founded in 2012 in Boston, MA, LoopPay is the most widely accepted mobile payment provider, empowering consumers to finally leave their physical wallets at home, today. LoopPay’s patented Magnetic Secure Transmission™ (MST) technology turns existing mag stripe readers into mobile contactless readers without any change or cost to merchants or their payment processors, enabling secure mobile payments at more than 10 million locations in the U.S. Consumers can select from an array of devices that match their phones and fit their lifestyles, including the LoopPay Fob, ChargeCase, CardCase and Card. In addition, all cards, including payment, gift, loyalty, reward and IDs, can be stored in one place via the LoopPay app, which offers utmost convenience and security, as all data is password and PIN-protected. LoopPay also encrypts and stores all card track data in secure memory within any device and is a Level One PCI Certified Payment Provider.

Events