Intel Unveils Tiny Smart House at Intel IoT Insights 2015

DAVID MCKINNEY | March 1, 2016

article image
At Intel IoT Insights 2015, we revealed that the framework of our Intel IoT Platform reference architecture is expanding with the announcement of the Intel IoT Smart Home Developer Enablement Platform. As a diverse team of people who pack up and return to our assorted apartments, condos, and houses each evening, we spend a good deal of time thinking about how we can improve the way we experience the world around us. That’s why Intel commissioned a nationwide smart home survey asking people to envision the kind of house they want to come home to each night.

Spotlight

SolarWinds

SolarWinds is a leading provider of powerful and affordable IT infrastructure management software. Our products give organizations worldwide, regardless of type, size, or IT infrastructure complexity, the power to monitor and manage the performance of their IT environments, whether on-premises, in the cloud, or in hybrid models. We continuously engage with all types of technology professionals – IT operations professionals, DevOps professionals, and managed service providers (MSPs) – to understand the challenges they face maintaining high-performing and highly available IT infrastructures. The insights we gain from engaging with them, in places like our THWACK online community, allow us to build products that solve well-understood IT management challenges in ways that technology professionals want them solved. This focus on the user and commitment to excellence in end-to-end hybrid IT performance management has established SolarWinds as a worldwide leader in network management software

OTHER ARTICLES

Microsoft acquires ReFirm Labs to enhance IoT security

Article | June 2, 2021

Modern computing devices can be thought of as a collection of discrete microprocessors each with a dedicated function like high-speed networking, graphics, Disk I/O, AI, and everything in between. The emergence of the intelligent edge has accelerated the number of these cloud-connected devices that contain multiple specialized sub-processors each with its own firmware layer and often a custom operating system. Many vulnerability analysis and endpoint detection and response (EDR) tools find it challenging to monitor and protect devices at the firmware level, leading to an attractive security gap for attackers to exploit. At the same time, we have also seen growth in the number of attacks against firmware where sensitive information like credentials and encryption keys are stored in memory. A recent survey commissioned by Microsoft of 1,000 security decision-makers found that 83 percent had experienced some level of firmware security incident, but only 29 percent are allocating resources to protect that critical layer. And according to March 2021 data from the National Vulnerability Database included in a presentation from the Department of Homeland Security’s Cybersecurity and Infrastructure Agency (CISA) at the 2021 RSA, difficult-to-patch firmware attacks are continuing to rise. Microsoft’s Azure Defender for IoT team (formerly CyberX) recently announced alongside the Department of Homeland Security a series of more than 25 critical severity vulnerabilities in IoT and OT devices

Read More

IoT Security Flaws Are Putting Your Business at Risk

Article | June 2, 2021

As industries invest in the next generation of technology, the internet of things is at the top of the list. Once a novelty best known in residential settings, IoT technology has become mainstream in business and industry. Some even predict that having a Google Home or Amazon Echo in the conference room will become the norm. Now, you will find connected devices in Amazon’s warehouse robotics system Kiva, Airbus’ Factory of the Future and the augmented reality used by Caterpillar in its Cat Connect system. The number of IoT devices in use by 2025 could reach 22 billion, according to an IoT Analytics report. They will transform manufacturing, warehouse and logistics, health care, agriculture, shipping, energy and aviation. IoT security can’t be done as an afterthought; it must be integrated into operations from Day One because connected devices and systems use cryptographic keys that transmit data. Cybercriminals can gain access through these keys, allowing them to infect devices and systems with malware, steal data or shut down systems. Sometimes, the vulnerability has gone undetected for months.

Read More

How to Effectively Monitor Utility Usage With IoT for Maximum ROI

Article | June 2, 2021

Operating a utility business can be particularly difficult, especially when you’re trying to maximize ROI. In the water utility space, per capita water usage has decreased while the water itself has become more expensive to collect. Across utilities sectors, aging infrastructure takes a large cost to maintain and eventually update. Consumer expectations and regulations also can cut into ROI. As they should, people expect clean and safe water and a continuous supply of electricity. The driving factor in the utilities space is efficiency. Enter the smart water meter. For our IoT water management solution, we used Google Cloud Platform (GCP). GCP has various benefits for water management through its wide array of products. We will go over two important features of a water management IoT solution.

Read More

THE FUTURE OF BIOMETRICS IOT

Article | June 2, 2021

In 2018 when Apple unveiled its iconic iPhone X with a feature to unlock the phone with Face ID thereby eliminating the use of the home button, it met a lot of eye-rolls. Fast forward to now, people are in love with the biometrics enabled technologies. While iPhone X had a unimodal authentication system, gadget these days have updated themselves in a better way. Let’s try to have a better understanding of the Biometrics. Biometrics are a way to measure a person’s physical characteristics to verify their identity. It can be physiological traits, like fingerprints and eyes, or behavioral traits, that define the manner an individual respond to stimuli. These characteristics are unique to the person. Once collected the data compared with the pre-existing database to find a match. Accordingly, it then produces an outcome. There are many varieties in which this data is collected. Facial and voice recognition, iris and finger scanner, signature verification, hand geometry, keystroke, gait detectors are some of the examples.

Read More

Spotlight

SolarWinds

SolarWinds is a leading provider of powerful and affordable IT infrastructure management software. Our products give organizations worldwide, regardless of type, size, or IT infrastructure complexity, the power to monitor and manage the performance of their IT environments, whether on-premises, in the cloud, or in hybrid models. We continuously engage with all types of technology professionals – IT operations professionals, DevOps professionals, and managed service providers (MSPs) – to understand the challenges they face maintaining high-performing and highly available IT infrastructures. The insights we gain from engaging with them, in places like our THWACK online community, allow us to build products that solve well-understood IT management challenges in ways that technology professionals want them solved. This focus on the user and commitment to excellence in end-to-end hybrid IT performance management has established SolarWinds as a worldwide leader in network management software

Events