Intel ® IoT Commercial Workshop Demo

DANIEL HOLMLUND | March 1, 2016

article image
Daniel Holmlund explains the temperature controlled room demo built to teach the curriculum in the Intel Commercial IoT Workshop

Spotlight

Vidsys, Inc.

Vidsys provides transformational Physical Security Information Management (PSIM) and Converged Security and Information Management (CSIM) software platform that has been adopted by some of the world’s leading brands and technology partners within key verticals, including Transportation, Energy, Utility, Healthcare, and Government. Vidsys software has obtained highest levels of information security and assurance from both top-tier global corporations and the US federal government.

OTHER ARTICLES

The IoT Smarthome Battlefield: A Jointly Endorsed IoT Standard for the Home Area Network

Article | February 12, 2020

Google announced that together with Amazon and Apple (the big 3 smart home players) they will work on the adoption of a joint wireless IoT standard for the smart home. This new connectivity standard is designed to make it easier for smart home products to work with each other.In the statement, Google said they were “joining Amazon, Apple and others to create Connected Home over IP, a new independent working group managed by the Zigbee Alliance (separate from the existing Zigbee 3.0/Pro protocol). We’re contributing two of our market-tested and open-source smart home technologies, Weave and Thread. Both are built on IP and have been integrated into millions of homes around the world.”

Read More

Securing industrial networks: it’s a journey

Article | February 12, 2020

Trying to secure the industrial network in one go is like boiling the ocean. Better to view it as a journey. At each step in the journey, you’ll make incremental changes to people, process, and technology. Minimal security. This is the current state for most manufacturers. If you’re here, you’ve segmented the industrial network from the IT network. Traffic can’t cross from the IT network to the industrial network without clearing the DMZ. You can block malware from entering the industrial network. You can block malware from leaving the industrial network to infect the enterprise network. But if the industrial network is exposed to malicious software, you don’t have a way to contain it. That means the malware might affect multiple manufacturing cells or production lines — even multiple plants.

Read More

5 Ways the Internet of Things is Changing the Game for Education and Learning

Article | February 12, 2020

There’s been so much buzz about the Internet of Things (IoT) in the past couple of years. For today’s youngsters, the day will come when a computer is no longer seen as a separate object or device. With technology very much entwined in the basic fabric of everyday living, our children might feel offended if their obedient room lamp doesn’t immediately acknowledge their presence by switching itself on. Over time, IoT will be a mindset rather than a steady stream of technology. Even though every other device in our homes, workplaces, or surrounding environments will be intelligent enough to connect and talk to each other, people will inevitably focus on the transformational possibilities for our world.

Read More

Zigbee vs. Bluetooth: Choosing the Right Protocol for Your IoT Application

Article | February 12, 2020

Both Zigbee® and Bluetooth® wireless protocols are widely used for local communications in Internet of Things (IoT) applications, and there are some trade-offs to review in choosing the right one for your application. Each protocol has unique strengths that guide which solution to implement when designing a new network. In certain situations, one protocol will be a better fit than the other, though sometimes the right solution is to implement both together to take advantage of their combined strengths, as we will discuss in this article. To better understand these IoT protocol options, let's take a look at the advantages and limitations of Zigbee, followed by the same for three different "flavors" of Bluetooth: Classic, BLE, and BT Mesh. This will help explain the trade-offs and show some use cases for each, so that you can choose the optimal protocol for your IoT application - be it a smart city, industrial IoT, digital signage or other connected technology use case.

Read More

Spotlight

Vidsys, Inc.

Vidsys provides transformational Physical Security Information Management (PSIM) and Converged Security and Information Management (CSIM) software platform that has been adopted by some of the world’s leading brands and technology partners within key verticals, including Transportation, Energy, Utility, Healthcare, and Government. Vidsys software has obtained highest levels of information security and assurance from both top-tier global corporations and the US federal government.

Events