The way IoT and M2M data really works - IoT Innovation Episode 16

| March 1, 2016

article image
Roaming is not all it needs to be, and the large operators are still making high data very expensive for younger commercial companies, we talk about the way Wireless Logic helps that process and some of the cross border challenges of handover, regulation and service that continue to make IOT and M2M complicated for all concerned.

Spotlight

Lean Apps GmbH

We are everything Digital and our value proposition is speed. We work with both startups and enterprise to build innovative technology products. From startups we learn ways of working that keep them agile and fast paced and apply those learnings at enterprise companies.

OTHER ARTICLES

WiFi for Enterprise IoT: Why You Shouldn’t Use It

Article | April 9, 2020

So you’re building an IoT solution and you’re ready to select your connectivity approach. Should you use Bluetooth? WiFi? LoRa? Cellular? Satellite? As I’ve explored in a previous post, the connectivity approach you choose ultimately comes down to the specific needs of your use case. Some use cases favor mobility and bandwidth, and power consumption doesn’t matter as much. Other use cases favor extensive battery life and broad coverage, and bandwidth doesn’t matter as much. In this post, I argue that for Enterprise IoT solutions, you shouldn’t use WiFi regardless of the use case. To build and implement a successful IoT solution, your connectivity needs to be reliable and consistent. When there’s an issue that needs troubleshooting, knowing that certain components of your IoT solution are reliable and consistent enables you to narrow your focus and address issues more effectively. There are many challenges in IoT, many of which stem from operational challenges and from having thousands of devices out in the real world where they’re subject to harsh, ever-changing environments.

Read More

Which IoT Applications will Benefit Most from Edge Computing?

Article | April 9, 2020

Edge computing refers to information being processed at the edge of the network, rather than being sent to a central cloud server. The benefits of edge computing include reduced latency, reduced costs, increased security and increased business efficiency. Transferring data from the edge of a network takes time, particularly if the data is being collected in a remote location. While the transfer may usually take less than a second, glitches in the network or an unreliable connection may increase the time required. For some IoT applications, for example, self-driving cars, even a second may be too long. Imagine a security camera that’s monitoring an empty hallway. There’s no need to send hours of large video files of an empty hallway to a cloud server (where you will need to pay to store them). With edge computing, the video could be sent to the cloud only if there is movement detected in the hallway.

Read More

How to Effectively Monitor Utility Usage With IoT for Maximum ROI

Article | April 9, 2020

Operating a utility business can be particularly difficult, especially when you’re trying to maximize ROI. In the water utility space, per capita water usage has decreased while the water itself has become more expensive to collect. Across utilities sectors, aging infrastructure takes a large cost to maintain and eventually update. Consumer expectations and regulations also can cut into ROI. As they should, people expect clean and safe water and a continuous supply of electricity. The driving factor in the utilities space is efficiency. Enter the smart water meter. For our IoT water management solution, we used Google Cloud Platform (GCP). GCP has various benefits for water management through its wide array of products. We will go over two important features of a water management IoT solution.

Read More

The road to industrial IoT security

Article | April 9, 2020

One of the main topics of this year’s RSA Conference is IT-OT cybersecurity convergence. But what are we talking about? Industrial IoT (IIoT) is all around us: in water, in gas, and electricity distribution networks, running power plants and critical infrastructure, in production lines and transportation networks, and more. In the traditional IT world, security risks involve threats that would undermine the confidentiality, integrity, and availability of data and systems. Given that in 2019, $3.5 billion was lost to known cyber-scams and ransomware according to the FBI’s Internet Crime Report, the impact is largely financial. IIoT drives the physical world where operational technologies (OT) are used. The risk in IIoT environments involves threats that would undermine the operational safety (physical security of goods and people, environmental impact) and the availability or even the physical integrity of the production process. Theft of intellectual property and trade secrets is a major concern, and the impact is not just financial, but also social, human, and ecological.

Read More

Spotlight

Lean Apps GmbH

We are everything Digital and our value proposition is speed. We work with both startups and enterprise to build innovative technology products. From startups we learn ways of working that keep them agile and fast paced and apply those learnings at enterprise companies.

Events