Machine to Machine - M2M Telemetry - Telstra Business

| March 1, 2016

article image
This video outlines a number of M2M applications across various industries. It demonstrates how M2M technology can be utilised in multiple settings to provide productivity benefits to businesses.

Spotlight

IoT Business News

IoT Business News is a 100% online media, 100% focused on the business side of M2M and IoT.

OTHER ARTICLES

Finding and Fixing Blind Spots in Enterprise IoT Security

Article | March 20, 2020

The Internet of Things has been a breakthrough, and adoption rates keep exploding. There are possibly over 20 billion IoT devices in the world, and by 2025, there may have been 75 billion. Even though there has been a rise in smart home devices, most IoT devices are found in businesses, industries, and healthcare. The benefits are overwhelming: from enabling automation of repetitive tasks (both simple and complex), to real-time data insights and analytics, IoT devices make workers more productive, improve customer experience, and reduce operating costs. However, with the many benefits of IoT devices come serious disadvantages, chief of which is security. Here are some reasons why IoT devices have such serious security risks:

Read More

Advantages and Disadvantages of Implementing IoT in Healthcare

Article | March 20, 2020

Given such examples, the Internet of Things (IoT) is seen as a way of living a smarter and safer life and its application is highly encouraged in medical establishments. However, digital transformation in healthcare isn’t without threats. It’s important to weigh all the advantages and disadvantages of implementing IoT systems in healthcare to be able to plan for ways to maximize the pros while mitigating the cons.

Read More

5 Ways the Internet of Things is Changing the Game for Education and Learning

Article | March 20, 2020

There’s been so much buzz about the Internet of Things (IoT) in the past couple of years. For today’s youngsters, the day will come when a computer is no longer seen as a separate object or device. With technology very much entwined in the basic fabric of everyday living, our children might feel offended if their obedient room lamp doesn’t immediately acknowledge their presence by switching itself on. Over time, IoT will be a mindset rather than a steady stream of technology. Even though every other device in our homes, workplaces, or surrounding environments will be intelligent enough to connect and talk to each other, people will inevitably focus on the transformational possibilities for our world.

Read More

Run-Time Provisioning of Security Credentials for IoT Devices

Article | March 20, 2020

To prevent counterfeit devices from joining a network or to limit the opportunity for network attacks, it’s important to authenticate devices attempting to join Internet of Things (IoT) networks and subsequently connect only authorized devices. The standard mechanism to securely authenticate clients connecting to a server is transport-layer-security (TLS) client-side authentication. To implement such authentication in an IoT network, the appropriate certificate authority (CA)—usually the IoT device provider—issues a unique X.509 certificate to each IoT device and the associated private key that functions as a unique security credential for the IoT device. Once the certificate and associated private key are stored on the IoT device, it may use them during the TLS client-authentication process to securely join the IoT network.

Read More

Spotlight

IoT Business News

IoT Business News is a 100% online media, 100% focused on the business side of M2M and IoT.

Events