Hitachi, Infineon promote IoT tech for viral detection

MATT HAMBLEN | April 16, 2020

article image
Tech companies are stepping up Internet of Things technologies to protect against COVID-19 and future viruses by using LiDAR and infrared cameras to detect a person’s body temperature from a distance or even handwashing. Keeping the data secure in such detection is also going to be a challenge. One approach is to put a chip inside an IoT device when it is manufactured to enable strong authentication and secure communication, mainly to guard against device counterfeiting. Hitachi Vantara has touted forward looking infrared cameras (FLIR) cameras to detect the temperature of a person from a distance. That way a passenger on a train or a worker or a customer in a store can be non-intrusively screened, according to a blog from Mark Jules, global vice president of smart spaces and video intelligence.

Spotlight

Fischer Block, Inc.

Fischer Block helps our industrial and utility customers improve energy reliability though innovative solutions. Our patented Internet of Things (IoT) edge device mechanically connects to existing electromechanical and microprocessor based relays and MCC panels in minutes without disrupting plant operations.

OTHER ARTICLES

Zigbee vs. Bluetooth: Choosing the Right Protocol for Your IoT Application

Article | March 5, 2020

Both Zigbee® and Bluetooth® wireless protocols are widely used for local communications in Internet of Things (IoT) applications, and there are some trade-offs to review in choosing the right one for your application. Each protocol has unique strengths that guide which solution to implement when designing a new network. In certain situations, one protocol will be a better fit than the other, though sometimes the right solution is to implement both together to take advantage of their combined strengths, as we will discuss in this article. To better understand these IoT protocol options, let's take a look at the advantages and limitations of Zigbee, followed by the same for three different "flavors" of Bluetooth: Classic, BLE, and BT Mesh. This will help explain the trade-offs and show some use cases for each, so that you can choose the optimal protocol for your IoT application - be it a smart city, industrial IoT, digital signage or other connected technology use case.

Read More

More Than Half of IoT Devices Vulnerable to Severe Attacks

Article | March 11, 2020

More than half of all internet of things (IoT) devices are vulnerable to medium- or high-severity attacks, meaning that enterprises are sitting on a “ticking IoT time bomb,” according to Palo Alto Networks Unit 42 research team. In new research released Tuesday, researchers said that several deep-rooted issues exist around connected devices, both used by general enterprises and in medical environments. At the most basic level researchers found that 98 percent of all IoT device traffic is unencrypted, exposing personal and confidential data on the network. Other issues, like the reliance on outdated legacy protocols and operating systems, are opening up organizations up to older attack techniques that IT teams may not have had to deal with in years. For instance, researchers outlined one attack they discovered of a connected mammogram machine, used in a hospital, by the Conficker worm (malware first discovered more than a decade ago).

Read More

Smart Home Technologies: Zigbee, Z-Wave, Thread, and Dotdot

Article | February 11, 2020

If you own smart home products like SmartThings or Nest, you may be familiar with some of the technologies behind them. Network protocols like Zigbee and Z-Wave dominate the industry, while Thread, a younger network standard, is gaining headway as a strong contender in the battle for market share. Although this may seem like your typical rivalry between industry leaders, the competitive landscape is more complicated than selecting one over another.

Read More

Lock Down Personal Smart Devices to Improve Enterprise IoT Security

Article | April 9, 2020

The presence of internet of things (IoT) devices in employee’s homes is a neglected item in many enterprise threat models. Caution is certainly warranted here, but it’s entirely possible to improve your risk awareness and secure smart devices in a calm and measured way. Overlooking privacy and security risks has consequences. It’s in everyone’s best interest to consider the potential impact of every point of data output in your technological ecosystem. Any of these devices could affect the security of your digital connections. To minimize both personal and enterprise risk, it’s important to adhere to the following IoT security best practices.

Read More

Spotlight

Fischer Block, Inc.

Fischer Block helps our industrial and utility customers improve energy reliability though innovative solutions. Our patented Internet of Things (IoT) edge device mechanically connects to existing electromechanical and microprocessor based relays and MCC panels in minutes without disrupting plant operations.

Events