Has IoT Peaked? Corporations Are Now Backing Fewer Deals To IoT Startups

| May 10, 2016

article image
Corporates and their venture arms piled into over 130 deals for Internet of Things startups in 2015, but the start of this year has seen that interest taper significantly.

Spotlight

Data Blue, LLC

Data Blue, a pioneer in business transformation solutions, redefines the Value Added Reseller space by offering both the customer and manufacturer something that’s a step above what is currently available in the marketplace. By utilizing our vast cross-platform integration expertise and unparalleled product knowledge, Data Blue delivers tailored solutions that empower organizations to lead their market space by leveraging the latest Cloud, Big Data and Datacenter technologies.

OTHER ARTICLES

The rise of enterprise in IoT

Article | February 25, 2020

GSMA Intelligence’s principal IoT analyst Sylwia Kechiche explores enterprises’ digital transformation journey. For better or worse, the IoT has captured the public attention. Yet, while news headlines focuses mostly on consumer devices being connected (speakers, cars, fridges, drones), this is just one part of the story. Purely connecting devices is not the IoT end-game. Rather, it is about the data these devices generate, the insights derived and actions taken as a result to create value and benefit consumers, enterprises and wider society. We are now at the point that IoT is real: it has moved beyond novelty factor and proof of concepts. MWC19 witnessed that, but it also left unanswered questions that are still being grappled with.

Read More

Hardware Threats to an IoT Ecosystem

Article | March 31, 2020

An IoT ecosystem, like any biome on Earth, is constantly subjected to changes and threats at various scales. Whether the system is an asset tracking solution in a hospital to help deliver more effective healthcare or cold chain management ensuring temperature control during transportation, the hardware/sensor is where the data journey commences in an IoT ecosystem. The integrity of these hardware components is paramount to the success of an IoT solution, but there are currently critical threat points on these devices which left unaddressed could be disastrous. Much of the focus of IoT security is on keeping the communicated data from IoT devices untampered up the solution stack. Methods like end-to-end AES encryption are currently standard by most network protocols and are well secured and tested.

Read More

IoT: Quench the thirst for smart water management

Article | April 7, 2020

Water is one of our most precious resources. Yet every year, we lose more than 126 million cubic meters globally to leaks, poor metering and theft. Beyond that is the energy wasted moving water that never gets used. It adds up to staggering economic – and environmental – costs. It also presents one of the most compelling opportunities to use industrial IoT solutions. Water utilities can use IoT to address two fundamental aspects of water management: maintaining the physical infrastructure and addressing water safety and sustainability. With IoT sensors throughout a water utility’s infrastructure, it becomes possible to. In many ways, these uses mirror what’s possible in manufacturing. But while factory floors are condensed environments – with all assets located in a confined area – water utilities operate highly distributed environments. Reservoirs, pipes, pumps and other assets are spread across a massive physical footprint. Such environments introduce some unique challenges. One of the most pressing is cost. Capturing data across a massive infrastructure – and moving it to the enterprise and/or cloud – is a heavy lift. That’s especially true when considering the criticality of timely transmission and analysis of water data. Any delay can contribute to continued losses.

Read More

Securing industrial networks: it’s a journey

Article | April 14, 2021

Trying to secure the industrial network in one go is like boiling the ocean. Better to view it as a journey. At each step in the journey, you’ll make incremental changes to people, process, and technology. Minimal security. This is the current state for most manufacturers. If you’re here, you’ve segmented the industrial network from the IT network. Traffic can’t cross from the IT network to the industrial network without clearing the DMZ. You can block malware from entering the industrial network. You can block malware from leaving the industrial network to infect the enterprise network. But if the industrial network is exposed to malicious software, you don’t have a way to contain it. That means the malware might affect multiple manufacturing cells or production lines — even multiple plants.

Read More

Spotlight

Data Blue, LLC

Data Blue, a pioneer in business transformation solutions, redefines the Value Added Reseller space by offering both the customer and manufacturer something that’s a step above what is currently available in the marketplace. By utilizing our vast cross-platform integration expertise and unparalleled product knowledge, Data Blue delivers tailored solutions that empower organizations to lead their market space by leveraging the latest Cloud, Big Data and Datacenter technologies.

Events