The Next Retail Transformation: Mobility and the Internet of Things

Internet of Things technology implementations in the retail environment may be one of the most exciting and personally resonant for many people. In his intriguing guest blog post below, Cory McElroy, Director, Product Management and Marketing, Retail Solutions Global Business Unit, HP, examines the role of mobile technology in-store and how mobile and traditional fixed POS systems can coexist in harmony. Check out his great insights and tips about strategy, implementation, and technology solutions powered by Intel® processors.

Spotlight

HubSpire

HubSpire Corp is an Information Technology Company with a product-driven approach and provides Technology consulting & Custom Software development services to Federal government, local government and commercial organizations. HubSpire was founded in 2008 and is a minority certified small business with offices in New Jersey and New York.

OTHER ARTICLES
IoT Security

Evolution of Industry: IIoT a Vital Component

Article | June 27, 2023

Introduction Automation, interconnectivity, machine-learning, and real-time data are part of Industry 4.0, a new phase in the Industrial Revolution. Industry 4.0, which includes IIoT and smart manufacturing, combines physical production and operations with smart digital technologies. It creates a more holistic and linked environment for manufacturing and supply chain management organizations. In today's production environment, "automation" has a new, more advanced meaning than it has in the past. Industry 4.0 refers to the necessity of lean, efficient operations and the function of sustaining and improving production. In contrast, IIoT distinguishes manufacturing gadgets from consumer products that can connect wirelessly to internal networks and the internet. IIoT Powering the Fourth Industrial Revolution Manufacturing, logistics, oil and gas, transportation, mining, aviation, energy, and other industries use the IIoT. Its main goal is to improve operations, mainly through process automation and maintenance. IIoT capabilities improve asset performance and allow for improved maintenance management. The introduction of Industry 4.0 technologies marked a significant milestone in the human-machine relationship's history. I4.0 was first talked about in 2011. Since then, it has proliferated because of new technologies such as cyber-physical systems, IT/OT convergence, AI/ML, Blockchain, and AR/VR. Data is at the heart of the Fourth Industrial Revolution. The growth of the Internet of Things (IoT) is one of the main reasons behind this. The IoT is making a significant contribution in making businesses smarter and improving their workflows. Moreover, more data is being made and used by connected devices than ever before, from the home to the factory. In order to thrive in the fourth industrial revolution, businesses must embrace new technologies. The general structure of IIoT applications is defined by standards-based industrial system architectures such as the Industrial Internet Consortium's Reference Architecture. Sensors and IoT devices, IoT middleware platforms, IoT gateways, edge/cloud infrastructures, and analytics applications are all part of the stack. The Future of the IIoT The Industrial Internet of Things (IIoT) is primarily regarded as one of the most significant current and future trends influencing industrial companies. To comply with new rules, industries are rushing to upgrade their systems, machinery, and equipment. This is necessary to keep up with market volatility and deal with disruptive technologies. Safety, efficiency, and profitability have all improved dramatically in industries that have adopted IIoT. As IIoT technologies become more widely adopted, this tendency is projected to continue. Conclusion The fourth industrial revolution has drastically altered our perceptions of things in the workplace. At a rapid rate, capitalists are becoming more interested in sophisticated ideas. The way forward is to embrace existing and emerging technology throughout fundamental operations to unleash more enticing possibilities. It emphasizes the importance of comprehending the impact collaborative ecosystems can have as well as how they will become a major differentiator for generating value with a better-trained workforce.

Read More
Enterprise Iot

How Will the Emergence of 5G Affect Federated Learning?

Article | May 11, 2023

As development teams race to build out AI tools, it is becoming increasingly common to train algorithms on edge devices. Federated learning, a subset of distributed machine learning, is a relatively new approach that allows companies to improve their AI tools without explicitly accessing raw user data. Conceived by Google in 2017, federated learning is a decentralized learning model through which algorithms are trained on edge devices. In regard to Google’s “on-device machine learning” approach, the search giant pushed their predictive text algorithm to Android devices, aggregated the data and sent a summary of the new knowledge back to a central server. To protect the integrity of the user data, this data was either delivered via homomorphic encryption or differential privacy, which is the practice of adding noise to the data in order to obfuscate the results.

Read More
IoT Security

Practical IoT Data Processing & Management for Businesses

Article | October 11, 2023

IoT has undeniably become the massive growth propellant for modern-day business. Enterprises employ intelligent systems to improve production in factories, and reduce costs, build industrial automation systems to replace human assignments, monitor and reduce energy; and develop autonomous transportation to enhance driver safety. Inside these embedded systems are sensors that rapidly transmit data that must be immediately captured, processed, and acted upon. Traditional embedded database solutions don't understand and meet the complex needs of IoT devices when it comes to processing and managing data. IoT edge database solutions that can understand the constant data stream from sensors enable devices to make crucial decisions in milliseconds. Real-time Edge Data Processing Enterprisers and business owners prefer scalable edge data management solutions to deploy hundreds of IoT devices so that each device can manage, collect, and analyze the massive amounts of data these IoT sensors produce without losing performance. These devices must capture and store critical information so that the IoT node can make independent decisions and trigger appropriate reactions. Database queries allow device apps to get the information they need to make intelligent decisions in real-time, quickly and without wasting time. To be successful in the IoT, you need the right data management software and the ability to quickly collect and connect device data rapidly to get low latency. IoT Data Processing and Management Standard data management solutions do not fully address the complexity of architecting software for IoT data processing. Despite being the primary data source, sensors are often constrained by their limitations and fail to provide sophisticated analysis. The focus of IoT data analysis and management is to harvest real-time information and make sense of it quickly. A good solution uses technologies that many developers are already familiar with, like SQL, to solve the new problem of analyzing IoT sensors directly on edge devices. Conclusion While building a device application, at every stage, developers must make tough calls to select the best data management and database software to launch their edge-centric IoT systems. Such costly decisions consume significant development and validation time as well. Using existing IoT data management platforms is a better way to deal with scaling, security, and the weight of data. Businesses can set up, connect, and grow their IoT infrastructure with these platforms. Organizations don't have to build their own IoT infrastructure from scratch. Instead, they can use IoT platforms that give them access to IoT devices, cloud infrastructure, and networks worldwide. Small and medium-sized businesses may find this method saves money.

Read More
IoT Security

Top Technologies in IoT Network Security for Network Resilience

Article | October 11, 2023

Building resilient IoT networks: Exploring the top technologies for enhancing IoT security and protecting as well as safeguarding against evolving cyber threats in the interconnected era of Industry 4.0. Contents 1. What is Network Resilience and Why is it Needed? 1.1 Continuous Operation 1.2 Mitigating Security Threats 1.3 Data Protection 1.4 System Availability 1.5 Risk Management 1.6 Regulatory Compliance 2. Factors to Consider for Network Resilience 3. Top Trends in IoT Security 3.1 Zero Trust and AI 3.2 Supply Chain Security 3.3 Network Segmentation and Segregation 3.4 Over-the-Air (OTA) Updates 3.5 Device Authentication and Authorization 3.6 Software-defined Networking (SDN) Security 3.7 Identity and Access Management (IAM) 4. Conclusion 1. What is Network Resilience and Why is it Needed? Network resilience refers to the ability of an IoT network to withstand and recover from disruptions, attacks, or failures while maintaining its essential functions. It involves implementing measures to ensure the network remains available, reliable, and secure, even during security threats or unexpected events. Ensuring network resilience is a critical aspect of IoT network security. Network resilience refers to the ability of an IoT network to withstand and recover from disruptions, attacks, or failures while maintaining its essential functions. Ensuring network resilience in IoT network security is crucial for the following reasons: 1.1 Continuous Operation IoT networks often support critical applications and services that require uninterrupted operation. Network resilience ensures that these applications can continue functioning even during disruptions, such as network failures or security incidents. It minimizes downtime and ensures business continuity. 1.2 Mitigating Security Threats IoT networks are susceptible to various cybersecurity threats, including malware, unauthorized access, or Distributed Denial of Service (DDoS) attacks. Network resilience measures help mitigate these threats by implementing security controls, monitoring network traffic, and enabling prompt detection and response to security incidents. 1.3 Data Protection IoT devices generate and transmit vast amounts of sensitive data. Network resilience safeguards data integrity, confidentiality, and availability by implementing secure communication protocols, encryption mechanisms, and access controls. It ensures that data remains protected even during network disruptions or security breaches. 1.4 System Availability IoT systems often rely on real-time data processing and communication. Network resilience ensures that data flows seamlessly, allowing IoT devices to exchange information and execute tasks without interruptions. It supports critical functions such as monitoring, control, and decision-making processes. 1.5 Risk Management Building network resilience helps organizations effectively manage risks associated with IoT deployments. By identifying vulnerabilities, implementing protective measures, and having response plans in place, organizations can minimize the impact of security incidents, reduce financial losses, and maintain the trust of stakeholders. 1.6 Regulatory Compliance Many industries have specific regulations and standards governing the security and resilience of IoT networks. By ensuring network resilience, organizations can demonstrate compliance with these requirements, avoiding penalties, legal issues, and reputational damage. 2. Factors to Consider for Network Resilience Implementing redundancy and failover mechanisms within the network infrastructure helps mitigate the impact of single points of failure. This involves deploying backup systems, redundant network paths, and failover mechanisms to ensure continuous operation despite a failure or attack. Traffic Monitoring and Anomaly Detection for Continuous network traffic monitoring helps identify abnormal patterns or behaviours that may indicate security threats or attacks. By leveraging intrusion detection and prevention systems (IDPS) and traffic analysis tools, organizations can promptly detect and respond to network anomalies, safeguarding network resilience. Moreover, segmentation and Isolation: Dividing the IoT network into segments or zones and isolating critical devices or systems from less secure ones enhances network resilience. Implementing proper network segmentation, VLANs (Virtual Local Area Networks), or software-defined networking (SDN) enables effective control, containment, and mitigation of security incidents. DDoS attacks significantly threaten network resilience by overwhelming the network's resources and causing service disruption. Deploying robust DDoS protection measures, such as traffic filtering, rate limiting, and traffic diversion, helps mitigate the impact of such attacks and ensures network availability. Incident Response and Establishing comprehensive incident response and recovery plans specific to IoT network security incidents is crucial. These plans should outline clear procedures, roles, and responsibilities to efficiently respond to and recover from security breaches or disruptions, minimizing downtime and maintaining network resilience. In addition, regular penetration testing, vulnerability assessments, and network audits help identify weaknesses and vulnerabilities in the IoT network infrastructure. Promptly addressing these issues through patches, updates, and security configuration adjustments strengthens network resilience by proactively addressing potential security risks. By implementing these measures, organizations can enhance the resilience of their IoT networks, ensuring continuous operation, prompt threat detection, and effective response to security incidents. Network resilience plays a vital role in maintaining IoT systems' integrity, availability, and reliability in the face of evolving security challenges. 3. Top Trends in IoT Security 3.1 Zero Trust and AI Zero Trust is an emerging security concept that assumes no implicit trust towards devices or users, even if they are already inside the network perimeter. Implementing Zero Trust principles in IoT networks can help mitigate the risks associated with compromised devices and unauthorized access for IoT security. In order to bolster cybersecurity measures, adopting a zero trust approach. Effectively addressing cybersecurity challenges entails not merely technological solutions but a comprehensive organizational strategy rooted in cultural and policy frameworks. Emphasizing the zero trust concept underscores the importance of policy implementation throughout the entire organization, complementing technological measures. 3.2 Supply Chain Security The complex and interconnected nature of IoT supply chains introduces security risks. The supply chain for IoT devices involves multiple stages, including device manufacturing, software development, distribution, and deployment. Each stage presents potential security risks that can compromise the integrity and security of the IoT network. This includes adopting secure supply chain management practices, such as verifying the security practices of suppliers and manufacturers, and establishing clear security requirements and standards for the entire supply chain. Conducting third-party risk assessments helps evaluate the security posture of suppliers and vendors to identify any potential vulnerabilities or weaknesses. 3.3 Network Segmentation and Segregation In IoT security, minimizing the potential impact of a compromised IoT device is crucial, and network segmentation and segregation play a vital role in achieving this goal. Network segmentation involves dividing the network into separate zones or segments, based on factors such as device type, functionality, or security requirements. The containment strategy helps minimize the impact of a security breach by isolating compromised devices and preventing lateral movement within the network. 3.4 Over-the-Air (OTA) Updates Software updates play a critical role in maintaining the integrity and security of IoT devices. IoT devices frequently require updates to address software bugs, patch vulnerabilities, or introduce new features. Over-the-Air (OTA) update mechanisms are being enhanced with robust security measures to ensure the secure delivery and installation of updates. Code signing is a prevalent practice where updates are digitally signed with cryptographic keys to verify the authenticity and integrity of the software. Secure boot is another important mechanism that establishes a chain of trust during the device boot-up process, ensuring that only authorized and tamper-free software is loaded onto the device. 3.5 Device Authentication and Authorization The increasing number of IoT devices poses a significant challenge in ensuring secure and trusted authentication and authorization. Two-factor authentication (2FA), for example, adds an extra layer of protection by requiring users or devices to provide two separate forms of authentication, such as a password and a unique code sent to a mobile device. Digital certificates, on the other hand, enable secure and trusted device authentication by leveraging public key infrastructure (PKI) technology. Each IoT device is issued a unique digital certificate, which serves as a digital identity, allowing for secure communication and verification of device authenticity. 3.6 Software-defined Networking (SDN) Security Securing Software-defined Networking (SDN) environments is paramount to protect IoT deployments. SDN offers centralized control and management of network resources, providing flexibility and scalability. This ensures that only authorized entities can access and make changes to the SDN infrastructure, preventing unauthorized access and configuration changes. Additionally, continuous traffic monitoring and analysis enable the detection of suspicious activities and potential security breaches. Encryption IoT standards and protocols should be employed to secure communication between the SDN controller, switches, and IoT devices, safeguarding data privacy and integrity. Network segmentation within the SDN environment helps limit the impact of security breaches, reducing the attack surface. 3.7 Identity and Access Management (IAM) Implementing IAM solutions, such as role-based access control (RBAC) and multi-factor authentication (MFA), within IoT networks significantly enhances network security. IAM ensures that only authorized individuals can access and interact with IoT devices and systems. RBAC enables administrators to assign specific access privileges based on user roles and responsibilities, reducing the risk of unauthorized access. Additionally, incorporating MFA adds an extra layer of security by requiring users to provide multiple forms of authentication, such as a password and a unique token or biometric verification. This significantly reduces the risk of unauthorized access even if a user's credentials are compromised. 4. Conclusion The technologies discussed in this article play a crucial role in enhancing IoT network security and resilience. By leveraging these technologies, organizations can mitigate the risks associated with IoT deployments, protect against cyber threats, and ensure the reliability and continuity of their IoT networks. As the IoT landscape evolves, staying up-to-date with these top technologies will be essential for organizations to maintain a robust and secure IoT infrastructure. The transformative landscape of Industry 4.0 demands strong network security in IoT environments. The top technologies discussed in this article empower organizations to enhance network resilience, protect against cyber threats, and ensure the uninterrupted functioning of IoT networks. Embracing these technologies and staying ahead of emerging threats, helps organizations build a secure foundation for their IoT deployments and capitalize on the vast opportunities offered by the IoT ecosystem.

Read More

Spotlight

HubSpire

HubSpire Corp is an Information Technology Company with a product-driven approach and provides Technology consulting & Custom Software development services to Federal government, local government and commercial organizations. HubSpire was founded in 2008 and is a minority certified small business with offices in New Jersey and New York.

Related News

IoT Security

AppViewX Digital Trust Platform Named IoT Security Product of the Year

AppViewX | January 12, 2024

AppViewX, the leader in automated machine identity management (MIM) and application infrastructure security, today announced the AppViewX Digital Trust Platform has been named IoT Security Product of the Year in the 8th annual IoT Breakthrough awards program, which showcases technologies and companies that drive innovation and exemplify the best in IoT technology solutions across the globe. IoT Breakthrough is a leading market intelligence organization that recognizes the top companies, technologies and products in the global IoT market. The mission of the IoT Breakthrough Awards program is to recognize the innovators, leaders and visionaries from around the globe in a range of IoT categories, including Industrial and Enterprise IoT, Smart City technology, Connected Home and Home Automation, Connected Car, and many more. This year's program attracted nominations from companies all over the world. “Unmanaged machine identities for IoT devices can create critical security vulnerabilities, but for most organizations discovering, maintaining visibility into and controlling them has become manually unfeasible,” said Gregory Webb, CEO of AppViewX. “The AppViewX Digital Trust Platform automates IoT identity management at scale across the largest, most complex and distributed customer environments, allowing customers to achieve significantly stronger security posture and meet compliance requirements.” All IoT Breakthrough Award nominations were evaluated by an independent panel of experts within the IoT industry, with the winning products and companies selected based on a variety of criteria, including most innovative and technologically advanced products and services. About AppViewX Digital Trust Platform Out of the box, AppViewX provides instant value to customers by discovering all certificates across complex enterprise environments, building and maintaining inventories, provisioning both private and public trust certificates from any CA, alerting to expiring certificates and fully automating renewals and revocation to eliminate outages and security weaknesses across machines, applications, services, and security infrastructure. About AppViewX AppViewX is trusted by the world’s leading organizations to reduce risk, ensure compliance, and increase visibility through automated machine identity management and application infrastructure security and orchestration. The AppViewX platform provides complete certificate lifecycle management and PKI-as-a-Service using streamlined workflows to prevent outages, reduce security incidents and enable crypto-agility. Fortune 1000 companies, including six of the top ten global commercial banks, five of the top ten global media companies, and five of the top ten managed healthcare providers rely on AppViewX to automate NetOps, SecOps, and DevOps. AppViewX is headquartered in New York with offices in the U.K., Australia and three development centers of excellence in India. For more information, visit https://www.appviewx.com and follow us on LinkedIn and Twitter.

Read More

Software and Tools

ATEL® Unveils the WB550 Apex by ATEL™: The Ultimate 5G Indoor Router with Unmatched Connectivity, Security, and Value

PR Newswire | October 25, 2023

ATEL®, a leader in telecommunications technology, is excited to announce the launch of its latest innovation, the WB550 Apex by ATEL™ 5G Indoor Router. Designed to meet the most demanding Internet connectivity needs, the WB550 Apex by ATEL™ offers unparalleled data speeds, robust security features, and the power to connect up to 32 users. As more of our lives shift to the cloud, having a real-time connection to the Internet is no longer an option, explains Terence "TC" Caston VP of Product Marketing: "Our businesses and homes rely on low-latency applications that perform best with networks that have the power to support them. ATEL® has ensured the network's edge devices have the power to deliver!" The WB-550 FWA (Fixed Wireless Access) device gives your business or home the reliability and power to connect to the things that move you. Key highlights of the WB-550 include: Support for NSA or SA 5G networks C-Band 5G and LTE Cat-19 fallback for lightning-fast speeds in areas without 5G Connections for up to 32 devices on its powerful Wi-Fi 6 network For managing your deployment of devices, ATEL® has also included its premiere device remote management solution called ATRACS™. Our remote management portal has been designed to bring the best-of-breed features to every ATEL® device we launch with two years of free service! About ATEL Asiatelco Technologies Co. (ATEL®) was established in 2003. Since its inception, ATEL® has been growing steadily with its sales covering more than 50 countries. ATEL's business model is JDM/ODM for serving wireless operators and branded customers. With 20 years of accumulated experience, ATEL® has built a strong, effective, and efficient team in R&D and manufacturing. Customers can always rely on the ATEL® team's performance. Quality, flexibility, on-time delivery and lower cost, are just some of the key factors of success at ATEL® and the key to customer satisfaction. ATEL-USA was established in 2017, with its headquarters in Newport Beach, California. We have invested in the industry's top talent for hardware, software, marketing, quality, and operations. This has allowed us to continue the transition from a 3rd Party ODM to a full-service OEM supplier of quality wireless products. Our products include FWA (Fixed Wireless Access), POTs replacement devices, mobile broadband routers, hot spots, home phone connect, OBD, CPE, IoT, safety devices, and smart devices for the US market. A strong, effective, and efficient R&D team, along with the manufacturing team, has positioned ATEL-USA to enter into the OEM space.

Read More

Enterprise Iot

Nokia, BT Group and MediaTek trial 5G RedCap technology to accelerate the Internet of Things

MarketScreener | October 18, 2023

Nokia, together with BT Group and MediaTek today announced that they have successfully completed trials of 5G Reduced Capability (RedCap) technology with RedCap devices. The trial, which took place at BT Group's Adastral Park site, utilized Nokia's AirScale RAN portfolio, EE's 5G Standalone (SA) network, and MediaTek's RedCap testing platform. RedCap is a technology introduced in 3GPP Release 17 that brings 5G to devices that do not require its full capabilities. It has the potential to expand the IoT ecosystem and accelerate its deployment within the industry. BT Group is evaluating RedCap to support new 5G use cases which could benefit both EE's business and consumer customer bases. 5G devices such as smartphones often have complex hardware and power-hungry features which leads to higher cost, size, and power consumption. RedCap technology focuses on simplifying 5G devices, particularly small IoT devices such as wearables or health trackers for consumers as well as ruggedized routers, and environmental or other condition-based monitoring sensors. These devices have less demand for battery life and lower bandwidth requirements. RedCap ensures they maintain performance and optimizes their power efficiency. Nokia has played a pivotal role in advancing RedCap IoT functionality together with the telecommunications industry. Greg McCall, Chief Networks Officer at BT Group said: 'This trial with Nokia demonstrates the potential of RedCap technology in unlocking a new wave of innovation within the 5G services ecosystem. This is especially the case as we move towards the arrival of 5G SA, bringing with it enhanced reliability, responsiveness, security, and speed which - through 5G RedCap - promises to benefit a host of new IoT devices and use cases.' Robert Moffat, Deputy Director Europe Mobile Business Development at MediaTek, said: 'Our collaboration with Nokia and BT Group for this trial of 5G RedCap technology aligns with MediaTek's commitment to driving innovation and expanding the potential of 5G SA to include a wider ecosystem of devices and use cases.' Phil Siveter, CEO, UK and Ireland at Nokia, commented: 'The introduction of RedCap will unlock new 5G opportunities for many industries, with potentially billions of new devices connected with 5G. Our field tests with BT Group show that Nokia 5G Standalone networks are ready to support RedCap devices.'

Read More

IoT Security

AppViewX Digital Trust Platform Named IoT Security Product of the Year

AppViewX | January 12, 2024

AppViewX, the leader in automated machine identity management (MIM) and application infrastructure security, today announced the AppViewX Digital Trust Platform has been named IoT Security Product of the Year in the 8th annual IoT Breakthrough awards program, which showcases technologies and companies that drive innovation and exemplify the best in IoT technology solutions across the globe. IoT Breakthrough is a leading market intelligence organization that recognizes the top companies, technologies and products in the global IoT market. The mission of the IoT Breakthrough Awards program is to recognize the innovators, leaders and visionaries from around the globe in a range of IoT categories, including Industrial and Enterprise IoT, Smart City technology, Connected Home and Home Automation, Connected Car, and many more. This year's program attracted nominations from companies all over the world. “Unmanaged machine identities for IoT devices can create critical security vulnerabilities, but for most organizations discovering, maintaining visibility into and controlling them has become manually unfeasible,” said Gregory Webb, CEO of AppViewX. “The AppViewX Digital Trust Platform automates IoT identity management at scale across the largest, most complex and distributed customer environments, allowing customers to achieve significantly stronger security posture and meet compliance requirements.” All IoT Breakthrough Award nominations were evaluated by an independent panel of experts within the IoT industry, with the winning products and companies selected based on a variety of criteria, including most innovative and technologically advanced products and services. About AppViewX Digital Trust Platform Out of the box, AppViewX provides instant value to customers by discovering all certificates across complex enterprise environments, building and maintaining inventories, provisioning both private and public trust certificates from any CA, alerting to expiring certificates and fully automating renewals and revocation to eliminate outages and security weaknesses across machines, applications, services, and security infrastructure. About AppViewX AppViewX is trusted by the world’s leading organizations to reduce risk, ensure compliance, and increase visibility through automated machine identity management and application infrastructure security and orchestration. The AppViewX platform provides complete certificate lifecycle management and PKI-as-a-Service using streamlined workflows to prevent outages, reduce security incidents and enable crypto-agility. Fortune 1000 companies, including six of the top ten global commercial banks, five of the top ten global media companies, and five of the top ten managed healthcare providers rely on AppViewX to automate NetOps, SecOps, and DevOps. AppViewX is headquartered in New York with offices in the U.K., Australia and three development centers of excellence in India. For more information, visit https://www.appviewx.com and follow us on LinkedIn and Twitter.

Read More

Software and Tools

ATEL® Unveils the WB550 Apex by ATEL™: The Ultimate 5G Indoor Router with Unmatched Connectivity, Security, and Value

PR Newswire | October 25, 2023

ATEL®, a leader in telecommunications technology, is excited to announce the launch of its latest innovation, the WB550 Apex by ATEL™ 5G Indoor Router. Designed to meet the most demanding Internet connectivity needs, the WB550 Apex by ATEL™ offers unparalleled data speeds, robust security features, and the power to connect up to 32 users. As more of our lives shift to the cloud, having a real-time connection to the Internet is no longer an option, explains Terence "TC" Caston VP of Product Marketing: "Our businesses and homes rely on low-latency applications that perform best with networks that have the power to support them. ATEL® has ensured the network's edge devices have the power to deliver!" The WB-550 FWA (Fixed Wireless Access) device gives your business or home the reliability and power to connect to the things that move you. Key highlights of the WB-550 include: Support for NSA or SA 5G networks C-Band 5G and LTE Cat-19 fallback for lightning-fast speeds in areas without 5G Connections for up to 32 devices on its powerful Wi-Fi 6 network For managing your deployment of devices, ATEL® has also included its premiere device remote management solution called ATRACS™. Our remote management portal has been designed to bring the best-of-breed features to every ATEL® device we launch with two years of free service! About ATEL Asiatelco Technologies Co. (ATEL®) was established in 2003. Since its inception, ATEL® has been growing steadily with its sales covering more than 50 countries. ATEL's business model is JDM/ODM for serving wireless operators and branded customers. With 20 years of accumulated experience, ATEL® has built a strong, effective, and efficient team in R&D and manufacturing. Customers can always rely on the ATEL® team's performance. Quality, flexibility, on-time delivery and lower cost, are just some of the key factors of success at ATEL® and the key to customer satisfaction. ATEL-USA was established in 2017, with its headquarters in Newport Beach, California. We have invested in the industry's top talent for hardware, software, marketing, quality, and operations. This has allowed us to continue the transition from a 3rd Party ODM to a full-service OEM supplier of quality wireless products. Our products include FWA (Fixed Wireless Access), POTs replacement devices, mobile broadband routers, hot spots, home phone connect, OBD, CPE, IoT, safety devices, and smart devices for the US market. A strong, effective, and efficient R&D team, along with the manufacturing team, has positioned ATEL-USA to enter into the OEM space.

Read More

Enterprise Iot

Nokia, BT Group and MediaTek trial 5G RedCap technology to accelerate the Internet of Things

MarketScreener | October 18, 2023

Nokia, together with BT Group and MediaTek today announced that they have successfully completed trials of 5G Reduced Capability (RedCap) technology with RedCap devices. The trial, which took place at BT Group's Adastral Park site, utilized Nokia's AirScale RAN portfolio, EE's 5G Standalone (SA) network, and MediaTek's RedCap testing platform. RedCap is a technology introduced in 3GPP Release 17 that brings 5G to devices that do not require its full capabilities. It has the potential to expand the IoT ecosystem and accelerate its deployment within the industry. BT Group is evaluating RedCap to support new 5G use cases which could benefit both EE's business and consumer customer bases. 5G devices such as smartphones often have complex hardware and power-hungry features which leads to higher cost, size, and power consumption. RedCap technology focuses on simplifying 5G devices, particularly small IoT devices such as wearables or health trackers for consumers as well as ruggedized routers, and environmental or other condition-based monitoring sensors. These devices have less demand for battery life and lower bandwidth requirements. RedCap ensures they maintain performance and optimizes their power efficiency. Nokia has played a pivotal role in advancing RedCap IoT functionality together with the telecommunications industry. Greg McCall, Chief Networks Officer at BT Group said: 'This trial with Nokia demonstrates the potential of RedCap technology in unlocking a new wave of innovation within the 5G services ecosystem. This is especially the case as we move towards the arrival of 5G SA, bringing with it enhanced reliability, responsiveness, security, and speed which - through 5G RedCap - promises to benefit a host of new IoT devices and use cases.' Robert Moffat, Deputy Director Europe Mobile Business Development at MediaTek, said: 'Our collaboration with Nokia and BT Group for this trial of 5G RedCap technology aligns with MediaTek's commitment to driving innovation and expanding the potential of 5G SA to include a wider ecosystem of devices and use cases.' Phil Siveter, CEO, UK and Ireland at Nokia, commented: 'The introduction of RedCap will unlock new 5G opportunities for many industries, with potentially billions of new devices connected with 5G. Our field tests with BT Group show that Nokia 5G Standalone networks are ready to support RedCap devices.'

Read More

Events