IBM Watson Internet of Things

| March 1, 2016

article image
"Think about the effect of the Internet of Things (IoT)—we’re radically transforming customer experiences and deepening critical relationships. Powerfully enhancing operational efficiencies. Disrupting professions, businesses and even entire industries. And we’re doing
it all today with only 12 percent of the data. But that’s changing. By bringing together the IoT with IBM Watson™ cognitive computing technologies, we’re infusing a new kind of thinking into objects, systems and processes. Watson technology understands, reasons
and learns. 

Spotlight

Avren Events

Avren Events is known for its in-depth, expertly researched series of conferences and exhibitions in the telecoms sector, having held global summits around topics including Small Cells, Carrier Wi-Fi, Backhaul, ITSF, HetNets, RAN, LPWA and IoT since 2007. Over 3,500 of the most influential senior managers from across the mobile access ecosystem attend Avren Events every year.

OTHER ARTICLES

How AI and IoT Provide Value in Construction

Article | March 24, 2020

Internet of Things (IoT) sensors predominantly provide visibility to an operating stack – enabling access to real-time and accurate operational data. Laying analysis on top of that data produces dashboards and other visual representations but artificial intelligence (AI) extends this further by harnessing the data streams to train models and identify patterns. Observations can then be made by a computer much like a human analyst could but at tremendous speed and scale. AI makes it possible to anticipate and predict events in a robust and scalable way. This can create huge business advantages. In this article, we’ll look at applications of AI and IoT in construction.

Read More

Microsoft acquires ReFirm Labs to enhance IoT security

Article | March 24, 2020

Modern computing devices can be thought of as a collection of discrete microprocessors each with a dedicated function like high-speed networking, graphics, Disk I/O, AI, and everything in between. The emergence of the intelligent edge has accelerated the number of these cloud-connected devices that contain multiple specialized sub-processors each with its own firmware layer and often a custom operating system. Many vulnerability analysis and endpoint detection and response (EDR) tools find it challenging to monitor and protect devices at the firmware level, leading to an attractive security gap for attackers to exploit. At the same time, we have also seen growth in the number of attacks against firmware where sensitive information like credentials and encryption keys are stored in memory. A recent survey commissioned by Microsoft of 1,000 security decision-makers found that 83 percent had experienced some level of firmware security incident, but only 29 percent are allocating resources to protect that critical layer. And according to March 2021 data from the National Vulnerability Database included in a presentation from the Department of Homeland Security’s Cybersecurity and Infrastructure Agency (CISA) at the 2021 RSA, difficult-to-patch firmware attacks are continuing to rise. Microsoft’s Azure Defender for IoT team (formerly CyberX) recently announced alongside the Department of Homeland Security a series of more than 25 critical severity vulnerabilities in IoT and OT devices

Read More

Dotdot Over Thread Deep Dive

Article | March 24, 2020

In the quickly evolving world of the IoT, multiple standards have developed in a short span of time, each with the goal of allowing smart home devices to communicate with each other and with multiple online services. One solution to this issue is the use of the Dotdot, an application layer developed for IoT devices to easily join networks of other similar devices and to communicate their status and capabilities in a standardized way, combined with Thread. Thread is an IP mesh network implementation designed for IoT device communication, promises to be a widely implemented standard in IoT device manufacture and development.

Read More

OT/IoT Security Superheroes: Tackling the Remote Employee Challenge

Article | March 24, 2020

Organizations around the world are coping with a variety of challenges related to the COVID-19 outbreak. Many companies are struggling to convert their processes from ‘in-office’ to ‘remotely accessible’. And, they’re scrambling to find new ways to “remote” tasks – with “remote” now becoming a verb. For example, we’ve heard from many customers that adding or expanding remote employee access capabilities is a hot topic. One such customer told us that they went from 9% of their workforce working remotely, to 52%. Wow! That’s not only a substantial change to operations and processes – it also directly impacts the company’s security posture. The challenge facing OT security practitioners is daunting. We absolutely must secure the people and systems responsible for saving mankind from an alien super-virus pandemic. But, while the bad guys are lobbing attacks from afar, the good guys are acting behind the scenes like NPCs (non-player characters). They’re bypassing the security systems we developed through years of hard work, like using Gmail or Zoom, or turning off anti-virus, in the name of getting things done.

Read More

Spotlight

Avren Events

Avren Events is known for its in-depth, expertly researched series of conferences and exhibitions in the telecoms sector, having held global summits around topics including Small Cells, Carrier Wi-Fi, Backhaul, ITSF, HetNets, RAN, LPWA and IoT since 2007. Over 3,500 of the most influential senior managers from across the mobile access ecosystem attend Avren Events every year.

Events