Welcome to the edge era: where a second lost on the network has insurmountable consequences

NORMAN RICE | August 22, 2018

article image
The next great leap forward in progress will be marked by an exponential growth in connection and connectivity. As sensors become smaller and more energy efficient, mobile devices become more capable and our networks become more robust, industries as disparate as healthcare, transportation, education, government and entertainment will find opportunities for new efficiencies, new ways of interacting with consumers and transformative approaches to serving their communities. In short, advancements in network technology are helping us achieve great things. We’re seeing the well documented benefits of agility, reliability and performance of networks in healthcare, where wireless networks are supporting complex EHR systems and M2M communications are delivering moment-to-moment information on patient status and improving health outcomes. There’s also been an emergence of new educational (and job) opportunities provided via emerging eSports programs in K-12 and higher education settings.

Spotlight

IoT Shaman LLC

IoT Shaman provides high quality website development for local businesses based out of Pittsburg, Kansas. The services provided are targeted towards local businesses that do not have a web presence or have an underdeveloped website. IoT Shaman provides a website that is fast, mobile friendly, and most importantly built to optimize searchability on search engines.

OTHER ARTICLES

5 Ways to Secure Your IoT Devices—Before They Get Hacked

Article | March 13, 2020

Internet of Things (IoT) devices make our lives more efficient and our day-to-day more convenient. They allow us to monitor our homes from afar, control our lights, thermostats, and locks and beef up the security of our homes—among a host of other things. But because smart devices have become so integrated into our lives, they leave us vulnerable to cybercrime too. In general, IoT devices have little to no built-in security, making them top targets for hackers. And since most IoT devices are interconnected, it puts your whole suite of devices at risk if even one gets hacked. Just as you lock your front door before you go to bed, you’ll want to make sure your IoT devices are secure before you start using them.

Read More

IoT developers to focus more on smart healthcare post-COVID-19

Article | March 13, 2020

Healthcare technologies will be a greater priority among IoT service providers once the disruptions caused by the COVID-19 die down, according to Forrester Research. Based on its latest figures, only 7% of the work that major IoT service providers deliver in APAC is on Smart Healthcare. The crisis has triggered a lot of ideas and solutions, however there was simply no time to look at a more strategic approach for both the technologies and the processes. This will be the focus of governments, health care providers, and others, once the acute crisis is behind us,” said Achim Granzen, principal analyst at Forrester, told FutureIoT. He added: “I expect this number to increase past Covid-19, as governments, healthcare providers, and others will seek to harden many of the ad-hoc systems and measures they have put into place during the crisis.”

Read More

Run-Time Provisioning of Security Credentials for IoT Devices

Article | March 13, 2020

To prevent counterfeit devices from joining a network or to limit the opportunity for network attacks, it’s important to authenticate devices attempting to join Internet of Things (IoT) networks and subsequently connect only authorized devices. The standard mechanism to securely authenticate clients connecting to a server is transport-layer-security (TLS) client-side authentication. To implement such authentication in an IoT network, the appropriate certificate authority (CA)—usually the IoT device provider—issues a unique X.509 certificate to each IoT device and the associated private key that functions as a unique security credential for the IoT device. Once the certificate and associated private key are stored on the IoT device, it may use them during the TLS client-authentication process to securely join the IoT network.

Read More

How Will IoT Revolutionize Pharmaceutical Manufacturing?

Article | March 13, 2020

Pharma is big business, but what it’s not generally recognized is, in large part, a manufacturing business with complex supply chains, finicky chemical processes and products that have to meet stringent quality controls. Few of those outside the industry think about how drugs are made safely, efficiently and at scale with reliable quality and in precisely measured doses. Even more interesting is the simple fact that pharma often produces sophisticated drugs using manufacturing processes that are decades out of date, and which are being phased out in comparable industries, such as chemical manufacturing.

Read More

Spotlight

IoT Shaman LLC

IoT Shaman provides high quality website development for local businesses based out of Pittsburg, Kansas. The services provided are targeted towards local businesses that do not have a web presence or have an underdeveloped website. IoT Shaman provides a website that is fast, mobile friendly, and most importantly built to optimize searchability on search engines.

Events