WELCOME TO The THE INTERNET OF THINGS REPORT
Next Gen. Networks Must Meet Seven Key Challenges To Deliver IoT Services, Security, FMC, Cloud, Network Slices, 5G and Bursty Video
| August 11, 2017
Mutual Mobile is an innovation consultancy that brings digital experiences to life through an integrated approach to design and technology.
Article | March 11, 2020
When people think of AI, it's easy to jump to the many possible uses seen in movies -- such as accessing secret areas with biometric data or robots completing human jobs -- but applying AI realistically requires architects and administrators to understand just how flexible AI is in a business setting. Tech leaders have rapidly increased the number of AI and IoT projects in many areas of their businesses, including customer experience, data analysis and security. When organizations apply AI into these different aspects, they can more effectively process the IoT data they create and further improve their operations and products. Popular movies have made customer experience AI one of the better-known examples of AI. Ads may not be as flashy as the personally tailored ones using customer biometrics as seen in The Minority Report, but it's easy to see how organizations will get there from the online ads that use AI to give consumers offers specific to their interests. Businesses use AI that learns from data analytics on customer behavior throughout the IoT customer journey.
Article | February 26, 2020
The Internet of Things continues to grow fueled by applications that solve problems for enterprise customers. One of the biggest barriers to IoT solutions in enterprise settings is reliable and low-cost wireless connectivity. Where Wi-Fi, Bluetooth, LoRa, Zigbee and others have tried to solve the problem before, CBRS (Citizens Broadband Radio Service) is posed to offer a viable alternative for enterprise IoT connectivity. Specific to the United States, Citizen’s Broadband Radio Service (CBRS) is a piece of the radio spectrum between 3550 – 3700 MHz. This is a valuable area of the spectrum because it allows good propagation (ability to penetrate walls and go medium distances) with the benefits of higher bandwidth services, such as LTE and 5G.
Article | March 31, 2020
An IoT ecosystem, like any biome on Earth, is constantly subjected to changes and threats at various scales. Whether the system is an asset tracking solution in a hospital to help deliver more effective healthcare or cold chain management ensuring temperature control during transportation, the hardware/sensor is where the data journey commences in an IoT ecosystem. The integrity of these hardware components is paramount to the success of an IoT solution, but there are currently critical threat points on these devices which left unaddressed could be disastrous. Much of the focus of IoT security is on keeping the communicated data from IoT devices untampered up the solution stack. Methods like end-to-end AES encryption are currently standard by most network protocols and are well secured and tested.
Article | March 5, 2020
As industries invest in the next generation of technology, the internet of things is at the top of the list. Once a novelty best known in residential settings, IoT technology has become mainstream in business and industry. Some even predict that having a Google Home or Amazon Echo in the conference room will become the norm. Now, you will find connected devices in Amazon’s warehouse robotics system Kiva, Airbus’ Factory of the Future and the augmented reality used by Caterpillar in its Cat Connect system. The number of IoT devices in use by 2025 could reach 22 billion, according to an IoT Analytics report. They will transform manufacturing, warehouse and logistics, health care, agriculture, shipping, energy and aviation. IoT security can’t be done as an afterthought; it must be integrated into operations from Day One because connected devices and systems use cryptographic keys that transmit data. Cybercriminals can gain access through these keys, allowing them to infect devices and systems with malware, steal data or shut down systems. Sometimes, the vulnerability has gone undetected for months.
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE