PTC IoT Academic Program How to use the Enhanced Android App for ThingWorx

| March 1, 2016

article image
This video tutorial guides you true installing the Enhanced Android App for ThingWorx on your phone and using it to send data from your phone to your ThingWorx instance.

Spotlight

IIoT Center

Within the Industrial Internet of Things (IIoT) Center at the Fraunhofer FOKUS in Berlin (Germany), industrial network technologies, standard-based connectivity and communication mechanisms, Fog/Edge/Cloud computing infrastructures, machine-to-machine communication, device management, orchestration and data analytics platforms enable a new generation of highly reliable, highly secure, near-realtime and intelligent IIoT applications.

OTHER ARTICLES

IoT Security: Inherent Risks Require Robust Solutions

Article | February 25, 2020

IoT technologies offer many remarkable benefits. They can make complicated tasks, such as tracking a fleet of thousands of vehicles, monitoring and adjusting manufacturing processes or automating a smart home or office simpler, easier and more cost-effective than ever before. By inviting IoT devices into our homes, workplaces and public spaces, however, we also expose new attack surfaces. When we assign an IoT system to be responsible for a critical task or trust it to monitor sensitive information in our most private spaces, we want to ensure that the system can be trusted. For this reason, it is vital that security best practices are applied at all stages when developing an IoT solution.

Read More

How Retail Security Can Welcome IoT Innovations Without Putting Customers at Risk

Article | February 25, 2020

Retail businesses, from mom-and-pop shops to major department stores, are investing heavily in technology to enhance the in-store experience. With the imminent arrival of mainstream 5G, smarter systems are expected to dominate the retail space as the internet of things (IoT) expands. But as we know from connected device deployments in other sectors, such as financial services and healthcare, the IoT is fraught with security vulnerabilities. For retail security, the risks of deploying IoT devices are no less dire. As organizations rely more on the IoT to enable internet connection at every stage of the retail process, protecting IoT infrastructure is critical. Getting on board with the right mindset can go a long way toward achieving a win-win for retail security.

Read More

An Introduction to IoT Sensors

Article | February 25, 2020

This post will cover various important sensors that are possibilities for an IoT deployment. Sensors are the backbone of any IoT deployment. They gather information and provide software with sensory information it needs to achieve its full potential. In addition, this post will go over considerations and decision-making for selecting sensors in an IoT deployment. Often times, a single sensor is not the best implementation, a suite of sensors can gather more data and even affect behavior for other sensors. In many cases, more than one sensor is necessary to perform the IoT deployment’s function. Sensors are just as critical to every IoT application as the internet. Imagine Alexa or Google Home without a microphone: it wouldn’t work. People wouldn’t be able to interact with the device, or it would need some other kind of sensor such as a keyboard to obtain input from a user.

Read More

Which IoT Applications will Benefit Most from Edge Computing?

Article | February 25, 2020

Edge computing refers to information being processed at the edge of the network, rather than being sent to a central cloud server. The benefits of edge computing include reduced latency, reduced costs, increased security and increased business efficiency. Transferring data from the edge of a network takes time, particularly if the data is being collected in a remote location. While the transfer may usually take less than a second, glitches in the network or an unreliable connection may increase the time required. For some IoT applications, for example, self-driving cars, even a second may be too long. Imagine a security camera that’s monitoring an empty hallway. There’s no need to send hours of large video files of an empty hallway to a cloud server (where you will need to pay to store them). With edge computing, the video could be sent to the cloud only if there is movement detected in the hallway.

Read More

Spotlight

IIoT Center

Within the Industrial Internet of Things (IIoT) Center at the Fraunhofer FOKUS in Berlin (Germany), industrial network technologies, standard-based connectivity and communication mechanisms, Fog/Edge/Cloud computing infrastructures, machine-to-machine communication, device management, orchestration and data analytics platforms enable a new generation of highly reliable, highly secure, near-realtime and intelligent IIoT applications.

Events