Stacking Up: Introducing the Complete Enterprise IoT Toolkit

STEPHEN POWELL | September 8, 2016

article image
There is certainly a lot of hype surrounding the Internet of Things, as evidenced by the huge IoT focus at this year’s CTIA Super Mobility Week in Las Vegas (drop by booth 4837 if you’re here with us!). Every year the list of companies playing in IoT gets larger, with everyone trying to differentiate themselves in what is becoming a complex and crowded space.

Spotlight

Honestar Technologies Co Ltd

Honestar Technologies Co., Ltd. provides customized application solutions. The company was founded in 2000 and is based in Shenzhen, China.

OTHER ARTICLES

Automotive Cyber Security: A Crash Course on Protecting Cars Against Hackers

Article | March 26, 2020

Modern cars have dozens of computers on board, and they’re not just for running GPS or playing music. Computers monitor and control nearly every system on your vehicle, including steering, brakes, and the engine itself. This is why automotive cyber security is essential. If a vehicle’s computer systems aren’t properly protected, hackers can steal data or even take control of the vehicle. As you can imagine, that makes automotive cyber security a major concern for consumers, auto companies, and OEMs alike. But what is there to know about automotive cyber security? We’ll explore what cybersecurity in the automotive industry entails and what the biggest threats are to automotive IoT and connected vehicles. We’ll also share some insights from a recent webinar by Sectigo and Mentor Graphics on how to protect connected vehicles from emerging cybersecurity threats.

Read More

THE FUTURE OF BIOMETRICS IOT

Article | March 26, 2020

In 2018 when Apple unveiled its iconic iPhone X with a feature to unlock the phone with Face ID thereby eliminating the use of the home button, it met a lot of eye-rolls. Fast forward to now, people are in love with the biometrics enabled technologies. While iPhone X had a unimodal authentication system, gadget these days have updated themselves in a better way. Let’s try to have a better understanding of the Biometrics. Biometrics are a way to measure a person’s physical characteristics to verify their identity. It can be physiological traits, like fingerprints and eyes, or behavioral traits, that define the manner an individual respond to stimuli. These characteristics are unique to the person. Once collected the data compared with the pre-existing database to find a match. Accordingly, it then produces an outcome. There are many varieties in which this data is collected. Facial and voice recognition, iris and finger scanner, signature verification, hand geometry, keystroke, gait detectors are some of the examples.

Read More

What is Google Pigweed? Google’s unveils new toys for IoT developers

Article | March 26, 2020

One might be forgiven for thinking that Google had enough operating systems. Other than Android, Google also owns Chrome OS and Google Fuchsia – the latter of which isn’t even finished yet! But then came murmurs of a project called Pigweed, following a Google trademark that surfaced in February this year. At first, speculation was rife that this was yet another operating system, due to wording that described it as “computer operating software.” Now we know that is not the case. So what is Google Pigweed? In a recent blog post, Google officially threw back the curtain. Google Pigweed, it turns out, is a collection of embedded platform developer tools for development on 32-bit microcontrollers. Effectively, these are libraries targeted at Internet of Things (IoT) applications.

Read More

Four ways to ensure IoT success

Article | March 26, 2020

Three out of four IoT projects are considered a failure, according to Cisco. This is troubling but even more so when Cisco also found 61 per cent of companies say they believe they’ve barely begun to scratch the surface of IoT can do for their business? Businesses believe in the long-term value offered by integrating IoT into their business plan, however, they lack the knowledge of what is required to ensure the success of such a complex project. By studying past failed projects, technology leaders can gain a better understanding of why they failed and what they can do differently when evaluating and undertaking new IoT initiatives.

Read More