Internet of Things Gateway

| March 1, 2016

article image
This small, compact implementation of an Ethernet gateway, designed for low-power wireless networks, is based on IEEE 802.15.4 standards, so it’s compatible with ZigBee and JenNet-IP.

Spotlight

Brighterion

Brighterion has the world's deepest and broadest portfolio of real-time artificial intelligence and machine learning technologies successfully applied in retail analytics, marketing, real-time cross-channel fraud prevention (identification of previously unknown fraud schemes), credit risk and delinquency prediction, chargeback prevention, behavioral device identification, AML detection, data breach detection and homeland security. Rather than being programmed to anticipate every possible scenario, Brighterion's products are built using our cognitive computing platform; the world's most comprehensive artificial intelligence and machine learning solution that predicts, infers and makes intelligent real-time decisions.

OTHER ARTICLES

The road to industrial IoT security

Article | February 25, 2020

One of the main topics of this year’s RSA Conference is IT-OT cybersecurity convergence. But what are we talking about? Industrial IoT (IIoT) is all around us: in water, in gas, and electricity distribution networks, running power plants and critical infrastructure, in production lines and transportation networks, and more. In the traditional IT world, security risks involve threats that would undermine the confidentiality, integrity, and availability of data and systems. Given that in 2019, $3.5 billion was lost to known cyber-scams and ransomware according to the FBI’s Internet Crime Report, the impact is largely financial. IIoT drives the physical world where operational technologies (OT) are used. The risk in IIoT environments involves threats that would undermine the operational safety (physical security of goods and people, environmental impact) and the availability or even the physical integrity of the production process. Theft of intellectual property and trade secrets is a major concern, and the impact is not just financial, but also social, human, and ecological.

Read More

Hardware Threats to an IoT Ecosystem

Article | February 25, 2020

An IoT ecosystem, like any biome on Earth, is constantly subjected to changes and threats at various scales. Whether the system is an asset tracking solution in a hospital to help deliver more effective healthcare or cold chain management ensuring temperature control during transportation, the hardware/sensor is where the data journey commences in an IoT ecosystem. The integrity of these hardware components is paramount to the success of an IoT solution, but there are currently critical threat points on these devices which left unaddressed could be disastrous. Much of the focus of IoT security is on keeping the communicated data from IoT devices untampered up the solution stack. Methods like end-to-end AES encryption are currently standard by most network protocols and are well secured and tested.

Read More

5G in IoT Starts to Crystallize in Industrial IoT Market

Article | February 25, 2020

Much of the attention on 5G technology centers on a future of smarter phones, drones and self-driving cars. But 5G’s role in next-generation industrial IoT applications bears watching as well. While 5G may be one among many evolutionary steps, it is important in the development of new industrial IoT use cases. 5G connectivity, is the fifth generation of cellular technology. It is designed to increase network speed, reduce latency, and improve flexibility of wireless services. 5G technology has a theoretical peak speed of 20 Gbps, while the peak speed of 4G is only 1 Gbps. 5G improve the performance of business applications in various context, such as factories, self-driving cars and in handheld devices for field technicians.

Read More

How Big Data and IoT Are Connected

Article | February 25, 2020

Big data as a term and a field, has been around for some time. It relates to the ways in which we study, analyze and process data sets that are too large to be handled by traditional data-processing software. Data can be described as ‘big’ when it demonstrates the four ‘V’ qualities: veracity (accuracy), velocity (speed), volume (size) and variety (both structured and unstructured). IoT, on the other hand, came much later and relates to devices, data and marrying them together. This area looks at making devices ‘smart’ (anything from watches to kettles) and collecting data about their performance or usage to influence consumer behavior.

Read More

Spotlight

Brighterion

Brighterion has the world's deepest and broadest portfolio of real-time artificial intelligence and machine learning technologies successfully applied in retail analytics, marketing, real-time cross-channel fraud prevention (identification of previously unknown fraud schemes), credit risk and delinquency prediction, chargeback prevention, behavioral device identification, AML detection, data breach detection and homeland security. Rather than being programmed to anticipate every possible scenario, Brighterion's products are built using our cognitive computing platform; the world's most comprehensive artificial intelligence and machine learning solution that predicts, infers and makes intelligent real-time decisions.

Events