IoT and Digital Transformation: A Tale of Four Industries

| July 7, 2016

article image
IoT means different things to different people within a healthcare organization, including the IT staff. For most, it means some form of connectivity, typically wireless, that connects things and people across the healthcare ecosystem to acquire, aggregate, and analyze data in order to glean actionable insights.

Spotlight

three6five

Formed in 2009, three6five is a company that delivers world class Professional Network Services to enterprises and carriers across Africa. We pride ourselves on a rigorous approach to IP services that satisfies our customers’ business needs. We are a specialist Systems Integrator and Network-as-a-Service Cloud provider. Our Cybersecurity Services provides our customers with solutions to secure their entire technology portfolio.

OTHER ARTICLES

Artificial Intelligence Applications: Is Your Business Implementing AI Smartly?

Article | March 12, 2020

The book Design, Launch, and Scale IoT Services classifies the components of IoT services into technical modules. One of the most important of these is Artificial Intelligence (AI). This article is intended to supplement the book by providing insight into AI and its applications for IoT. After many years in the wilderness, AI is back on the hype curve and will change the world again. Or, will it? AI has always been interesting, but what has changed to justify the current hype? There are several contributing factors. The volumes of data that will be produced by many IoT services suggest that this data cannot be managed by humans with traditional analytics tools. Therefore, AI can offer opportunities for IoT services to extract maximum value from the data. IoT cloud platforms are now offering AI services via APIs and application development tools, making AI more accessible for many IoT services. Now, AI can be incorporated without requiring extensive development or excessive costs.

Read More

Lock Down Personal Smart Devices to Improve Enterprise IoT Security

Article | March 12, 2020

The presence of internet of things (IoT) devices in employee’s homes is a neglected item in many enterprise threat models. Caution is certainly warranted here, but it’s entirely possible to improve your risk awareness and secure smart devices in a calm and measured way. Overlooking privacy and security risks has consequences. It’s in everyone’s best interest to consider the potential impact of every point of data output in your technological ecosystem. Any of these devices could affect the security of your digital connections. To minimize both personal and enterprise risk, it’s important to adhere to the following IoT security best practices.

Read More

What Is CBRS and How Does It Help IoT?

Article | March 12, 2020

The Internet of Things continues to grow fueled by applications that solve problems for enterprise customers. One of the biggest barriers to IoT solutions in enterprise settings is reliable and low-cost wireless connectivity. Where Wi-Fi, Bluetooth, LoRa, Zigbee and others have tried to solve the problem before, CBRS (Citizens Broadband Radio Service) is posed to offer a viable alternative for enterprise IoT connectivity. Specific to the United States, Citizen’s Broadband Radio Service (CBRS) is a piece of the radio spectrum between 3550 – 3700 MHz. This is a valuable area of the spectrum because it allows good propagation (ability to penetrate walls and go medium distances) with the benefits of higher bandwidth services, such as LTE and 5G.

Read More

Run-Time Provisioning of Security Credentials for IoT Devices

Article | March 12, 2020

To prevent counterfeit devices from joining a network or to limit the opportunity for network attacks, it’s important to authenticate devices attempting to join Internet of Things (IoT) networks and subsequently connect only authorized devices. The standard mechanism to securely authenticate clients connecting to a server is transport-layer-security (TLS) client-side authentication. To implement such authentication in an IoT network, the appropriate certificate authority (CA)—usually the IoT device provider—issues a unique X.509 certificate to each IoT device and the associated private key that functions as a unique security credential for the IoT device. Once the certificate and associated private key are stored on the IoT device, it may use them during the TLS client-authentication process to securely join the IoT network.

Read More

Spotlight

three6five

Formed in 2009, three6five is a company that delivers world class Professional Network Services to enterprises and carriers across Africa. We pride ourselves on a rigorous approach to IP services that satisfies our customers’ business needs. We are a specialist Systems Integrator and Network-as-a-Service Cloud provider. Our Cybersecurity Services provides our customers with solutions to secure their entire technology portfolio.

Events