Internet of Things and connected car: Discover Las Vegas 2016

| July 14, 2016

article image
The automotive sector provides an example of how HPE is helping OEMs deploy value-added services such as advanced driver assistance systems (ADAS) and accelerate the path to IoT data monetization.

Spotlight

DataCloud

DataCloud builds breakthrough technology solutions that help mining companies to master the subsurface so they can transform their economics and own the future. Our real-time geoscience, artificial intelligence and IoT technologies enable mine operators to improve their processes, performance and productivity.

OTHER ARTICLES

5 Ways to Secure Your IoT Devices—Before They Get Hacked

Article | March 13, 2020

Internet of Things (IoT) devices make our lives more efficient and our day-to-day more convenient. They allow us to monitor our homes from afar, control our lights, thermostats, and locks and beef up the security of our homes—among a host of other things. But because smart devices have become so integrated into our lives, they leave us vulnerable to cybercrime too. In general, IoT devices have little to no built-in security, making them top targets for hackers. And since most IoT devices are interconnected, it puts your whole suite of devices at risk if even one gets hacked. Just as you lock your front door before you go to bed, you’ll want to make sure your IoT devices are secure before you start using them.

Read More

AI and IoT projects optimize industries inside and out

Article | March 11, 2020

When people think of AI, it's easy to jump to the many possible uses seen in movies -- such as accessing secret areas with biometric data or robots completing human jobs -- but applying AI realistically requires architects and administrators to understand just how flexible AI is in a business setting. Tech leaders have rapidly increased the number of AI and IoT projects in many areas of their businesses, including customer experience, data analysis and security. When organizations apply AI into these different aspects, they can more effectively process the IoT data they create and further improve their operations and products. Popular movies have made customer experience AI one of the better-known examples of AI. Ads may not be as flashy as the personally tailored ones using customer biometrics as seen in The Minority Report, but it's easy to see how organizations will get there from the online ads that use AI to give consumers offers specific to their interests. Businesses use AI that learns from data analytics on customer behavior throughout the IoT customer journey.

Read More

Make Room For Public Clouds In Your Industrial IoT Strategy

Article | March 1, 2020

Not too long ago, executives from manufacturing and related industries would not consider running their internet of things (IoT) initiatives from a cloud. Now? It’s hard to find one who doesn’t enthusiastically embrace some role for the public cloud. Makers of industrial IoT (IIoT) software platforms have undergone a similar change of heart, pivoting from making grand plans for multibillion-dollar global data center rollouts to wholeheartedly partnering with one or more of the hyperscale public clouds. So far, so simple: Public cloud is definitely now part of the industrial IoT story. But there are a multitude of ways to use a public cloud, from just installing your own software there to fully integrating with all of the cloud, development, and IoT services that the hyperscale public cloud platforms increasingly offer. I explore this range of options in my latest report, “Hyperscale Public Clouds Power Your Industrial IoT Future,” and shall be discussing the issues in a client webinar on March 31.

Read More

Securing industrial networks: it’s a journey

Article | April 14, 2021

Trying to secure the industrial network in one go is like boiling the ocean. Better to view it as a journey. At each step in the journey, you’ll make incremental changes to people, process, and technology. Minimal security. This is the current state for most manufacturers. If you’re here, you’ve segmented the industrial network from the IT network. Traffic can’t cross from the IT network to the industrial network without clearing the DMZ. You can block malware from entering the industrial network. You can block malware from leaving the industrial network to infect the enterprise network. But if the industrial network is exposed to malicious software, you don’t have a way to contain it. That means the malware might affect multiple manufacturing cells or production lines — even multiple plants.

Read More

Spotlight

DataCloud

DataCloud builds breakthrough technology solutions that help mining companies to master the subsurface so they can transform their economics and own the future. Our real-time geoscience, artificial intelligence and IoT technologies enable mine operators to improve their processes, performance and productivity.

Events