Systems Engineering for the Internet of Things

| July 3, 2019

article image
Today’s connected world is increasing product complexity, putting systems engineers at the heart of a new challenge to deliver products faster and with improved quality. IBM Engineering offers a variety of cloud-based tools to help teams better collaborate, improve requirements, manage workflow and testing.

Spotlight

Webini

Webini, web software house, focused on creating highly customized, advanced and scalable internet solutions. Formed 5 years ago, located in Wroclaw, company comprises of people with many years of experience in internet projects realization.

OTHER ARTICLES

Arm Unveils AI, ML Chips for IoT and Edge

Article | February 11, 2020

Arm wants to help IoT and other embedded devices to think for themselves. Today the company unveiled two chips designed to eliminate the reliance on cloud-based artificial intelligence (AI) by delivering machine learning (ML) capabilities right on the device.“Enabling AI everywhere requires device makers and developers to deliver machine learning locally on billions and ultimately trillions of devices,” said Dipti Vachani, SVP and general manager of Arm’s automotive and IoT line of business, in a statement. The Cortex-M55 processor is the company’s first to leverage the Armv8.1-M architecture and features Arm’s Helium vector processing technology, which is designed with ML and digital signal processing in mind.

Read More

Lock Down Personal Smart Devices to Improve Enterprise IoT Security

Article | February 11, 2020

The presence of internet of things (IoT) devices in employee’s homes is a neglected item in many enterprise threat models. Caution is certainly warranted here, but it’s entirely possible to improve your risk awareness and secure smart devices in a calm and measured way. Overlooking privacy and security risks has consequences. It’s in everyone’s best interest to consider the potential impact of every point of data output in your technological ecosystem. Any of these devices could affect the security of your digital connections. To minimize both personal and enterprise risk, it’s important to adhere to the following IoT security best practices.

Read More

Run-Time Provisioning of Security Credentials for IoT Devices

Article | February 11, 2020

To prevent counterfeit devices from joining a network or to limit the opportunity for network attacks, it’s important to authenticate devices attempting to join Internet of Things (IoT) networks and subsequently connect only authorized devices. The standard mechanism to securely authenticate clients connecting to a server is transport-layer-security (TLS) client-side authentication. To implement such authentication in an IoT network, the appropriate certificate authority (CA)—usually the IoT device provider—issues a unique X.509 certificate to each IoT device and the associated private key that functions as a unique security credential for the IoT device. Once the certificate and associated private key are stored on the IoT device, it may use them during the TLS client-authentication process to securely join the IoT network.

Read More

Advantages and Disadvantages of Implementing IoT in Healthcare

Article | February 11, 2020

Given such examples, the Internet of Things (IoT) is seen as a way of living a smarter and safer life and its application is highly encouraged in medical establishments. However, digital transformation in healthcare isn’t without threats. It’s important to weigh all the advantages and disadvantages of implementing IoT systems in healthcare to be able to plan for ways to maximize the pros while mitigating the cons.

Read More

Spotlight

Webini

Webini, web software house, focused on creating highly customized, advanced and scalable internet solutions. Formed 5 years ago, located in Wroclaw, company comprises of people with many years of experience in internet projects realization.

Events