Machine-to-Machine (M2M) Gateway to a connected world

| March 1, 2016

article image
Machine-to-Machine (M2M) technology connects physical infrastructure (such as smart meters, CCTV cameras, vehicles, ATM machines and medical equipment) to communication networks to enable real-time observation and control of remote assets. It facilitates communication between machines and other machines, and between machines and people.

Spotlight

Qimonda

Qimonda AG (NYSE: QI) is a leading global memory supplier with a broad diversified DRAM product portfolio...

OTHER ARTICLES

5 Ways to Secure Your IoT Devices—Before They Get Hacked

Article | March 13, 2020

Internet of Things (IoT) devices make our lives more efficient and our day-to-day more convenient. They allow us to monitor our homes from afar, control our lights, thermostats, and locks and beef up the security of our homes—among a host of other things. But because smart devices have become so integrated into our lives, they leave us vulnerable to cybercrime too. In general, IoT devices have little to no built-in security, making them top targets for hackers. And since most IoT devices are interconnected, it puts your whole suite of devices at risk if even one gets hacked. Just as you lock your front door before you go to bed, you’ll want to make sure your IoT devices are secure before you start using them.

Read More

WiFi for Enterprise IoT: Why You Shouldn’t Use It

Article | April 9, 2020

So you’re building an IoT solution and you’re ready to select your connectivity approach. Should you use Bluetooth? WiFi? LoRa? Cellular? Satellite? As I’ve explored in a previous post, the connectivity approach you choose ultimately comes down to the specific needs of your use case. Some use cases favor mobility and bandwidth, and power consumption doesn’t matter as much. Other use cases favor extensive battery life and broad coverage, and bandwidth doesn’t matter as much. In this post, I argue that for Enterprise IoT solutions, you shouldn’t use WiFi regardless of the use case. To build and implement a successful IoT solution, your connectivity needs to be reliable and consistent. When there’s an issue that needs troubleshooting, knowing that certain components of your IoT solution are reliable and consistent enables you to narrow your focus and address issues more effectively. There are many challenges in IoT, many of which stem from operational challenges and from having thousands of devices out in the real world where they’re subject to harsh, ever-changing environments.

Read More

The rise of enterprise in IoT

Article | February 25, 2020

GSMA Intelligence’s principal IoT analyst Sylwia Kechiche explores enterprises’ digital transformation journey. For better or worse, the IoT has captured the public attention. Yet, while news headlines focuses mostly on consumer devices being connected (speakers, cars, fridges, drones), this is just one part of the story. Purely connecting devices is not the IoT end-game. Rather, it is about the data these devices generate, the insights derived and actions taken as a result to create value and benefit consumers, enterprises and wider society. We are now at the point that IoT is real: it has moved beyond novelty factor and proof of concepts. MWC19 witnessed that, but it also left unanswered questions that are still being grappled with.

Read More

OT/IoT Security Superheroes: Tackling the Remote Employee Challenge

Article | April 14, 2020

Organizations around the world are coping with a variety of challenges related to the COVID-19 outbreak. Many companies are struggling to convert their processes from ‘in-office’ to ‘remotely accessible’. And, they’re scrambling to find new ways to “remote” tasks – with “remote” now becoming a verb. For example, we’ve heard from many customers that adding or expanding remote employee access capabilities is a hot topic. One such customer told us that they went from 9% of their workforce working remotely, to 52%. Wow! That’s not only a substantial change to operations and processes – it also directly impacts the company’s security posture. The challenge facing OT security practitioners is daunting. We absolutely must secure the people and systems responsible for saving mankind from an alien super-virus pandemic. But, while the bad guys are lobbing attacks from afar, the good guys are acting behind the scenes like NPCs (non-player characters). They’re bypassing the security systems we developed through years of hard work, like using Gmail or Zoom, or turning off anti-virus, in the name of getting things done.

Read More

Spotlight

Qimonda

Qimonda AG (NYSE: QI) is a leading global memory supplier with a broad diversified DRAM product portfolio...

Events