Zatar is an Internet of Things Cloud Service

Zatar is an Internet of Things cloud service that connects IoT devices securely, quickly and seamlessly for rapid commercial service to power business solutions. Go to Market Fast: Available now to use with IoT reference designs reducing risk and time to market. Open Standards: ARM(R) mbedTM 3.0 cloud service for commercial deployment and prototyping.

Spotlight

Veea Inc.

Veea Inc. (veea.com) is headquartered in New York City (Manhattan) with offices in the UK, Geneva, Paris, Seoul, Atlanta and San Diego. The core of the engineering team out of the current team of 80+ highly experienced engineers, many with PhDs and Master Degrees in electrical engineering and computer science, have worked together on many breakthrough products, services and standards for over 20+ years.

OTHER ARTICLES
IoT Security

IoT Standards and Protocols Explained

Article | July 17, 2023

For businesses, the transformative power of IoT is increasingly significant with the promise of improving operational efficiency and visibility, while reducing costs. However, IoT does not come without risks and challenges. While concerns over security and data privacy continue to rise, the lack of IoT standards remains one of the biggest hurdles. The increasing number of legacy, single-vendor, and proprietary solutions cause problems with disparate systems, data silos and security gaps. As IoT successes become more dependent on seamless interoperability and data-sharing among different systems, we want to avoid the scenario of a fragmented market with numerous solutions that simply don’t work with each other.

Read More
Enterprise Iot

Importance of Big Data for IoT in Businesses

Article | May 11, 2023

Discover the crucial role of big data capabilities in unlocking the potential of IoT for businesses. This article covers their synergy, challenges, and value in decision-making and revenue generation. Contents 1 Why Big Data and IoT Matter for Businesses 2 Understanding Synergy of Big Data and IoT 2.1 How IoT generates Big Data 2.2 Challenges of Processing Big Data from IoT Devices 2.3 Importance of Big Data in IoT Applications 3 The Value of Big Data and IoT for Businesses 3.1 Improved Decision-making for Businesses 3.2 Generate New Revenue Streams 4 Final Thoughts 1. Why Big Data and IoT Matter for Businesses The internet of things (IoT) is connecting all types of physical assets to the internet, from smart wearables that track wearer’s vitals to connected industrial units that can report any malfunctions automatically. Big data in IoT is a natural outcome with the growth of IoT devices, with an immense surge in the amount of data being generated. There are currently over 13 billion connected IoT devices worldwide. (Source – Techjury) This data is extremely valuable to businesses as it can help streamline operations, predict trends, and diagnose device issues. Certain functions of IoT devices that are crucial for modern businesses, such as enabling predictive maintenance, depend on the analysis of the data generated every second. However, to maximize the ROI from their IoT ecosystem, businesses must first manage and process the vast amounts of unstructured data they produce. This is where big data capabilities come in. 2. Understanding Synergy of Big Data and IoT Big data and the IoT are fundamentally different concepts, but are closely connected. Big data is a term that is used for a great amount of data that is characterized by volume, velocity, variety and veracity (or the ‘trustworthiness’ of data). The IoT is a term for physical devices or objects linked to the internet using an assortment of technologies. Understanding the synergy between these two technologies will be critical for businesses looking to leverage their full potential. 2.1 How IoT generates Big Data IoT is one of the primary drivers of big data growth. The vast number of interconnected devices in the IoT ecosystem generates a massive amount of data every second. This data includes information on user behavior, device performance, and environmental conditions, among others. The nature of this data makes it challenging to store, process, and analyze using traditional data management tools. This is where big data technologies such as Hadoop, Spark, and NoSQL databases come in, providing the ability to manage massive amounts of data in near-real-time, enabling critical applications of big data in IoT. For businesses, processing IoT data is synonymous with processing big data, due to the nature of the data generated by an IoT ecosystem. 2.2 Challenges of Processing Big Data from IoT Devices IoT data processing is a complex and challenging task due to several reasons. Firstly, the sheer volume of data generated by these devices is enormous and is only increasing. This requires a robust infrastructure and specialized tools to store, manage, and analyze the data efficiently. This data is also generally unstructured, heterogeneous, and complex, making it difficult to process using traditional data management and analysis techniques. Moreover, it is often noisy and may contain errors or outliers, which can impact the accuracy of data analysis. Businesses also face a challenge when securing such vast amounts of data. Since IoT devices collect sensitive information such as personal and financial data at scale, it is critical to ensure that data is encrypted, transmitted securely, and stored safely. Additionally, IoT devices often operate in remote locations with limited connectivity, making it challenging to transmit data to the cloud for storage and analysis. As IoT devices continue to proliferate and generate increasingly large amounts of data, businesses must adopt big data technologies to gain actionable insights from this data. 2.3 Importance of Big Data in IoT Applications There are several use cases of the IoT where processing large amounts of data is essential. It plays a critical role in IoT applications, providing businesses with valuable insights that can be used to optimize processes, reduce costs, and improve overall efficiency. By collecting and analyzing large amounts of data from IoT devices, businesses can gain a better understanding of customer behavior, machine performance, and other critical metrics. For example, big data in IoT can be used to identify patterns in customer behavior, allowing businesses to tailor their marketing efforts and improve customer engagement. Additionally, IoT devices can be used to collect data on machine performance, allowing businesses to identify potential problems before they occur, minimize downtime, and optimize maintenance schedules. The value of big data in IoT applications lies in its ability to provide businesses with real-time insights that can be used to drive growth, reduce costs, and improve overall efficiency. 3. The Value of Big Data and IoT for Businesses Businesses looking to integrate big data in IoT must first consider their data storage and analytics capabilities. By understanding the value of big data technology in capturing and analyzing IoT-generated data, businesses can unlock insights that can help them make better decisions, optimize processes, and create new business opportunities. 3.1 Improved Decision-making for Businesses IoT and big data technologies offer businesses a wealth of data that can be used to make better-informed decisions. By integrating IoT sensors and devices with their operations, businesses can collect real-time data on customer behavior, operational performance, and market trends. This data can then be analyzed using big data analytics tools to generate valuable insights that can inform decision-making. For example, operational data can be analyzed to identify inefficiencies and areas for optimization, helping businesses reduce costs and improve efficiency. With the right data storage and analytics capabilities, businesses can leverage the power of IoT and big data to gain a competitive advantage and make better-informed decisions that drive growth and success. 3.2 Generate New Revenue Streams By leveraging the vast amount of data generated by IoT devices and analyzing it with big data analytics tools, businesses can gain insights into customer behavior, market trends, and operational performance. These insights can be used to create new revenue streams and business models, such as subscription-based services, pay-per-use models, and predictive maintenance services. For example, IoT sensors can be used to collect data on equipment performance, allowing businesses to offer predictive maintenance services that help prevent equipment breakdowns and reduce downtime. Similarly, customer data can be analyzed to identify new revenue opportunities, such as personalized product recommendations and targeted advertising. With the right strategy and investment in IoT and big data technologies, businesses can unlock new revenue streams and create innovative business models that drive growth and success. 4. Final Thoughts Big data in IoT is becoming increasingly important for businesses, and the future prospects are bright. As IoT continues to grow and generate more data, businesses that can effectively analyze it will gain a competitive advantage, leading to increased efficiency, reduced costs, and higher ROI. To fully realize the benefits of IoT, businesses must develop big data analytics and IoT devices in tandem, creating a feedback loop that drives continuous improvement and growth. By embracing these technologies, businesses can make data-driven decisions and unlock new insights that will help them thrive in the years ahead.

Read More
Industrial IoT, IoT Security

Top Technologies in IoT Network Security for Network Resilience

Article | July 12, 2023

Building resilient IoT networks: Exploring the top technologies for enhancing IoT security and protecting as well as safeguarding against evolving cyber threats in the interconnected era of Industry 4.0. Contents 1. What is Network Resilience and Why is it Needed? 1.1 Continuous Operation 1.2 Mitigating Security Threats 1.3 Data Protection 1.4 System Availability 1.5 Risk Management 1.6 Regulatory Compliance 2. Factors to Consider for Network Resilience 3. Top Trends in IoT Security 3.1 Zero Trust and AI 3.2 Supply Chain Security 3.3 Network Segmentation and Segregation 3.4 Over-the-Air (OTA) Updates 3.5 Device Authentication and Authorization 3.6 Software-defined Networking (SDN) Security 3.7 Identity and Access Management (IAM) 4. Conclusion 1. What is Network Resilience and Why is it Needed? Network resilience refers to the ability of an IoT network to withstand and recover from disruptions, attacks, or failures while maintaining its essential functions. It involves implementing measures to ensure the network remains available, reliable, and secure, even during security threats or unexpected events. Ensuring network resilience is a critical aspect of IoT network security. Network resilience refers to the ability of an IoT network to withstand and recover from disruptions, attacks, or failures while maintaining its essential functions. Ensuring network resilience in IoT network security is crucial for the following reasons: 1.1 Continuous Operation IoT networks often support critical applications and services that require uninterrupted operation. Network resilience ensures that these applications can continue functioning even during disruptions, such as network failures or security incidents. It minimizes downtime and ensures business continuity. 1.2 Mitigating Security Threats IoT networks are susceptible to various cybersecurity threats, including malware, unauthorized access, or Distributed Denial of Service (DDoS) attacks. Network resilience measures help mitigate these threats by implementing security controls, monitoring network traffic, and enabling prompt detection and response to security incidents. 1.3 Data Protection IoT devices generate and transmit vast amounts of sensitive data. Network resilience safeguards data integrity, confidentiality, and availability by implementing secure communication protocols, encryption mechanisms, and access controls. It ensures that data remains protected even during network disruptions or security breaches. 1.4 System Availability IoT systems often rely on real-time data processing and communication. Network resilience ensures that data flows seamlessly, allowing IoT devices to exchange information and execute tasks without interruptions. It supports critical functions such as monitoring, control, and decision-making processes. 1.5 Risk Management Building network resilience helps organizations effectively manage risks associated with IoT deployments. By identifying vulnerabilities, implementing protective measures, and having response plans in place, organizations can minimize the impact of security incidents, reduce financial losses, and maintain the trust of stakeholders. 1.6 Regulatory Compliance Many industries have specific regulations and standards governing the security and resilience of IoT networks. By ensuring network resilience, organizations can demonstrate compliance with these requirements, avoiding penalties, legal issues, and reputational damage. 2. Factors to Consider for Network Resilience Implementing redundancy and failover mechanisms within the network infrastructure helps mitigate the impact of single points of failure. This involves deploying backup systems, redundant network paths, and failover mechanisms to ensure continuous operation despite a failure or attack. Traffic Monitoring and Anomaly Detection for Continuous network traffic monitoring helps identify abnormal patterns or behaviours that may indicate security threats or attacks. By leveraging intrusion detection and prevention systems (IDPS) and traffic analysis tools, organizations can promptly detect and respond to network anomalies, safeguarding network resilience. Moreover, segmentation and Isolation: Dividing the IoT network into segments or zones and isolating critical devices or systems from less secure ones enhances network resilience. Implementing proper network segmentation, VLANs (Virtual Local Area Networks), or software-defined networking (SDN) enables effective control, containment, and mitigation of security incidents. DDoS attacks significantly threaten network resilience by overwhelming the network's resources and causing service disruption. Deploying robust DDoS protection measures, such as traffic filtering, rate limiting, and traffic diversion, helps mitigate the impact of such attacks and ensures network availability. Incident Response and Establishing comprehensive incident response and recovery plans specific to IoT network security incidents is crucial. These plans should outline clear procedures, roles, and responsibilities to efficiently respond to and recover from security breaches or disruptions, minimizing downtime and maintaining network resilience. In addition, regular penetration testing, vulnerability assessments, and network audits help identify weaknesses and vulnerabilities in the IoT network infrastructure. Promptly addressing these issues through patches, updates, and security configuration adjustments strengthens network resilience by proactively addressing potential security risks. By implementing these measures, organizations can enhance the resilience of their IoT networks, ensuring continuous operation, prompt threat detection, and effective response to security incidents. Network resilience plays a vital role in maintaining IoT systems' integrity, availability, and reliability in the face of evolving security challenges. 3. Top Trends in IoT Security 3.1 Zero Trust and AI Zero Trust is an emerging security concept that assumes no implicit trust towards devices or users, even if they are already inside the network perimeter. Implementing Zero Trust principles in IoT networks can help mitigate the risks associated with compromised devices and unauthorized access for IoT security. In order to bolster cybersecurity measures, adopting a zero trust approach. Effectively addressing cybersecurity challenges entails not merely technological solutions but a comprehensive organizational strategy rooted in cultural and policy frameworks. Emphasizing the zero trust concept underscores the importance of policy implementation throughout the entire organization, complementing technological measures. 3.2 Supply Chain Security The complex and interconnected nature of IoT supply chains introduces security risks. The supply chain for IoT devices involves multiple stages, including device manufacturing, software development, distribution, and deployment. Each stage presents potential security risks that can compromise the integrity and security of the IoT network. This includes adopting secure supply chain management practices, such as verifying the security practices of suppliers and manufacturers, and establishing clear security requirements and standards for the entire supply chain. Conducting third-party risk assessments helps evaluate the security posture of suppliers and vendors to identify any potential vulnerabilities or weaknesses. 3.3 Network Segmentation and Segregation In IoT security, minimizing the potential impact of a compromised IoT device is crucial, and network segmentation and segregation play a vital role in achieving this goal. Network segmentation involves dividing the network into separate zones or segments, based on factors such as device type, functionality, or security requirements. The containment strategy helps minimize the impact of a security breach by isolating compromised devices and preventing lateral movement within the network. 3.4 Over-the-Air (OTA) Updates Software updates play a critical role in maintaining the integrity and security of IoT devices. IoT devices frequently require updates to address software bugs, patch vulnerabilities, or introduce new features. Over-the-Air (OTA) update mechanisms are being enhanced with robust security measures to ensure the secure delivery and installation of updates. Code signing is a prevalent practice where updates are digitally signed with cryptographic keys to verify the authenticity and integrity of the software. Secure boot is another important mechanism that establishes a chain of trust during the device boot-up process, ensuring that only authorized and tamper-free software is loaded onto the device. 3.5 Device Authentication and Authorization The increasing number of IoT devices poses a significant challenge in ensuring secure and trusted authentication and authorization. Two-factor authentication (2FA), for example, adds an extra layer of protection by requiring users or devices to provide two separate forms of authentication, such as a password and a unique code sent to a mobile device. Digital certificates, on the other hand, enable secure and trusted device authentication by leveraging public key infrastructure (PKI) technology. Each IoT device is issued a unique digital certificate, which serves as a digital identity, allowing for secure communication and verification of device authenticity. 3.6 Software-defined Networking (SDN) Security Securing Software-defined Networking (SDN) environments is paramount to protect IoT deployments. SDN offers centralized control and management of network resources, providing flexibility and scalability. This ensures that only authorized entities can access and make changes to the SDN infrastructure, preventing unauthorized access and configuration changes. Additionally, continuous traffic monitoring and analysis enable the detection of suspicious activities and potential security breaches. Encryption IoT standards and protocols should be employed to secure communication between the SDN controller, switches, and IoT devices, safeguarding data privacy and integrity. Network segmentation within the SDN environment helps limit the impact of security breaches, reducing the attack surface. 3.7 Identity and Access Management (IAM) Implementing IAM solutions, such as role-based access control (RBAC) and multi-factor authentication (MFA), within IoT networks significantly enhances network security. IAM ensures that only authorized individuals can access and interact with IoT devices and systems. RBAC enables administrators to assign specific access privileges based on user roles and responsibilities, reducing the risk of unauthorized access. Additionally, incorporating MFA adds an extra layer of security by requiring users to provide multiple forms of authentication, such as a password and a unique token or biometric verification. This significantly reduces the risk of unauthorized access even if a user's credentials are compromised. 4. Conclusion The technologies discussed in this article play a crucial role in enhancing IoT network security and resilience. By leveraging these technologies, organizations can mitigate the risks associated with IoT deployments, protect against cyber threats, and ensure the reliability and continuity of their IoT networks. As the IoT landscape evolves, staying up-to-date with these top technologies will be essential for organizations to maintain a robust and secure IoT infrastructure. The transformative landscape of Industry 4.0 demands strong network security in IoT environments. The top technologies discussed in this article empower organizations to enhance network resilience, protect against cyber threats, and ensure the uninterrupted functioning of IoT networks. Embracing these technologies and staying ahead of emerging threats, helps organizations build a secure foundation for their IoT deployments and capitalize on the vast opportunities offered by the IoT ecosystem.

Read More
Enterprise Iot

Security Implications of Cloud-based IoT Software

Article | July 15, 2022

Physical and digital security are changing due to cloud-based IoT software, which makes it possible to combine them and use them to utilize data better. In almost every sector, data is essential to success, and security is no exception. To better understand what's going on in your business, you can combine cloud-based solutions that contain all the information on a single interface. For instance, integrating security camera feeds with cloud-based access control systems enables real-time visual identification verification. Utilizing cloud-based IoT technology also enhances productivity and enables quick replies. Combining digital and physical security, often known as security convergence, is another technique to optimize IoT and cloud-based security solutions. To guard against internet flaws and intrusions, a cloud-based physical security system needs cybersecurity software. In a similar vein, physical security measures prevent sensitive data from getting into the wrong hands. Teams for physical and cyber security might combine to provide a more comprehensive plan of action. Maintaining current versions of the technology you are using in your security plan is necessary for future-proofing your technology. To ensure that your cloud-based system has no vulnerabilities that could expose your company to cybersecurity risks, it is crucial to keep all software updated. Updates can be automated and carried out remotely with cloud-based software, requiring little effort on your part to keep your software current. You have the chance to develop a security system that is future-proof when a firm adopts cloud-based IoT technologies as part of your security plan. When organizations use IoT technology, cybersecurity is a significant concern. However, combining physical and digital security lets you ensure your cloud-based system is well-protected from vulnerabilities. In addition, your security and IT teams will be better able to manage the evolving security landscape if you combine physical and digital security ideas.

Read More

Spotlight

Veea Inc.

Veea Inc. (veea.com) is headquartered in New York City (Manhattan) with offices in the UK, Geneva, Paris, Seoul, Atlanta and San Diego. The core of the engineering team out of the current team of 80+ highly experienced engineers, many with PhDs and Master Degrees in electrical engineering and computer science, have worked together on many breakthrough products, services and standards for over 20+ years.

Related News

Platforms

Quectel Expands Its IoT Antenna Portfolio With Six New 4G and 5G Antennas

Business Wire | October 26, 2023

Quectel, a global IoT solutions provider, has unveiled six new antennas designed to provide robust connectivity performance for IoT devices. The new antennas cover a wide range of use cases from 5G to non-terrestrial networks (NTNs) bringing new capabilities to customers. We’re delighted to further augment our comprehensive range of antennas with the addition of these new antennas and evaluation boards, said Norbert Muhrer, President and CSO, Quectel Wireless Solutions. “Internet of Things applications increasingly demand high-performance antennas that meet their specific needs whether that’s for competitive cost, access to specific network technologies in particular frequency bands or for robust, safe characteristics such as IP ratings and RoHS and REACH compliance. The expanded Quectel antenna range is sure to meet the needs of your device and deployment and is backed by our design support and deployment experience, alongside, of course, our widely deployed and comprehensive range of modules.” The Quectel YC0001CA is a 4G surface-mount design (SMD) antenna that is optimized for LTE, LTE-M and Narrow Band-IoT (NB-IoT) networks. This low-profile antenna, which measures just 35.0 x 8.5 x 3.0mm, operates in the 700-960MHz and 1710-2700MHz and is both RoHS and REACH compliant for use in sensitive environments. In addition, the antenna can be supplied on tape and reel for high-volume applications and is compatible with all of Quectel’s 4G, 3G, 2G and LPWA IoT modules. The Quectel YC0018CA is a 5G SMD antenna that covers 5G New Radio (NR) Sub-6GHz frequency bands. Depending on the ground plane, the antenna is designed to be mounted directly to the printed circuit board (PCB) using a conventional PCB reflow process. Measuring 40.0 x 7.0 x 3.0mm, the antenna operates between -40 °C to +85 °C and weighs 15g. The antenna can be tuned specifically for the final device environment with a simple, PI matching circuit and, when used with other 5G antennas, it can achieve multiple input, multiple output (MIMO) performance. Also available on tape and reel, the antenna can also be supplied with the YC0018CAEVB evaluation board. The Quectel YECN028AA is a 5G or NTN external antenna that supports the 410-470MHz, 617-960MHz and 1425-6000MHz frequency bands. With dimensions of 225 x 54.5 x 13.0mm, the antenna is IP66, RoHS and REACH compliant so it has wide applicability to use cases in sensitive environments. Featuring high efficiency and gain, the antenna offers omni-directional high-speed data transmission and can be used in a wide range of wireless devices such as access points, outdoor equipment, real-time monitoring devices and many others. The Quectel YEMX223J1A is a 5G x 2 combo antenna that is IP67, RoHS and REACH compliant. Measuring 186.0 x 176.0 x 100.5mm, the combo antenna supports the 410-470MHz, 617-960MHz, 1420-1520MHz, 1710-2690MHz, 3300-3800MHz and 4000-6000MHz frequency bands. The ultra-wideband antenna box is also backward compatible supporting 2G and 3G networks as well as Cat-M and NB-IoT. Designed for ease of integration with connection via two cable lengths from 450-5000mm, the pole, wall suction mount omni-directional antenna offers ease of installation and durability thanks to its IP67 and IP69K compliant enclosure. Quectel offers flexible installation option with custom cable length and connector options The Quectel YEMX425J1A is a 5G x 4 combo antenna that measures 186.0 x 176.0 x 150mm. The combo antenna supports the 410-470MHz, 617-2690 MHZ and 3300-6000MHz frequency bands and both RoHS and REACH compliant. Offering backward compatibility with 2G, 3G, Cat-M and NB-IoT, the antenna is, in common with the YEMX223J1A, compatible with Quectel’s RM520x Series of IoT modules. In addition, durability is assured thanks to the combo antenna’s IP67 and IP69K ASA enclosure. Rounding out the latest wave of Quectel antenna introductions, the Quectel YSIS001AA, metal spring antenna operates in the 412-427MHz band, the 433-435 MHz band and the 450-470MHz band which is compatible with LTE B31 plus EU433 applications. Measuring 29.0 x 7.0 x 7.90mm, the RoHS and REACH compliant antenna is mounted to the host device PCB using the conventional SMD reflow process, offering high efficiency. In common with all Quectel antennas, these new additions to the range also gain Quectel’s comprehensive antenna design support including simulation, testing and manufacturing for custom antenna solutions to meet customers’ specific application needs. About Quectel Quectel’s passion for a smarter world drives us to accelerate IoT innovation. A highly customer-centric organization, we are a global IoT solutions provider backed by outstanding support and services. Our growing global team of 5,900 professionals sets the pace for innovation in cellular, GNSS, Wi-Fi and Bluetooth modules as well as antennas and services. With regional offices and support across the globe, our international leadership is devoted to advancing IoT and helping build a smarter world.

Read More

Enterprise Iot

Microchip Introduces New PolarFire FPGA and SoC Solution Stacks

Microchip Technology Inc. | October 09, 2023

Microchip Technology introduced nine new FPGA and SoC solution stacks designed for vertical markets. These solution stacks enable rapid deployment of intelligent edge solutions without requiring specialized expertise. Customers have praised PolarFire FPGAs for their small footprint, energy efficiency, and high performance. Microchip Technology has introduced nine new FPGA and SoC solution stacks, each tailored to meet specific requirements in vertical markets such as industrial edge, smart embedded vision, and edge communications. Microchip aims to simplify the creation of industrial and communications designs by offering solution stacks that leverage the power efficiency, security, and reliability of PolarFire FPGAs. Companies like Xenics and KAYA Instruments have cited benefits such as small form factor, power efficiency, and energy efficiency in utilizing Microchip's FPGA solution stacks for their products. In addition to the launch of its industrial edge stack and related tools earlier this year for Open Platform Communications/Unified Architecture (OPC/UA)-based IIoT applications, this increases the total number of PolarFire and SoC solution stacks to ten. For Smart Embedded Vision: H.264 compression CoaXpress among others For Industrial Edge: OPC/UA Motor control For Edge Communications: Small Form-factor pluggable optical module Software-defined radios and others Customers mentioned several factors for choosing Microchip's FPGA solution stacks. Federic Aubrun, Chief Commercial Officer (CCO) of Xenics, a developer of infrared imaging sensors with products for short-, mid-, and long-wave IR imagers, cores, and cameras, emphasized the significance of size, weight, and power considerations in thermal imaging system design. He stated that Microchip's SmartFusion and PolarFire FPGAs offered the optimal combination of a compact form factor, power efficiency, and processing capabilities while operating within a highly efficient power budget in their current and future product lines. These solution stacks provide detailed IP, reference designs, development kits, application notes, and demo guides, enabling the deployment of intelligent edge solutions. It stacks cater to the growing demand for quick deployment of intelligent edge solutions without the need for specialized technology knowledge. The solution stacks cover various areas, including H.264 compression, HDMI, serial digital interface, CoaXpress, motor control, OPC/UA, software-defined radios, USXGMII, SFP+ optical modules, and 5G ORAN, providing versatile options for different vertical markets. Another company, KAYA Instruments, designs industrial-grade imaging equipment, such as small-form-factor, low-power cameras and frame grabbers that deliver high-quality video under ordinary to extreme ambient light conditions. Michael Yampolsky, Founder and CEO at KAYA, stated, We use PolarFire FPGAs due to their compact footprint and energy efficiency. Utilizing the most up-to-date CMOS sensor technology, they enable cameras to fit in tight spaces while maintaining high quality, low noise, exceptional dynamic range, and a large feature set. FPGAs on our platform enables us to rapidly bring the most advanced vision technology to market to meet the needs of our customers. [Source: embedded]

Read More

IoT Security

Ordr Partners with ServiceNow Vulnerability Response with Now Platform

Ordr | October 09, 2023

Ordr, a leader in connected device security, has announced its integration with ServiceNow Vulnerability Response, expanding its existing integrations with ServiceNow's Service Graph Connector, CMDB, and ITSM. This integration enhances Ordr's insights into all connected devices, enabling more efficient vulnerability management for IoT, IoMT, and OT devices. The integration extends Ordr's device vulnerability and risk insights into ServiceNow Vulnerability Response, creating a comprehensive solution for managing device security. It helps bridge visibility gaps in vulnerability management for all managed and unmanaged devices, including IoT, IoMT, and OT devices. It provides a centralized view of vulnerabilities and accelerates vulnerability management tasks. Integrating Ordr with ServiceNow Vulnerability Response enables customers to: Closing visibility gaps for vulnerabilities and risks Maintaining a centralized and comprehensive view of all device vulnerabilities and risk Accelerating vulnerability management duties and reducing risk Tracking vulnerability management efforts Ordr's integration with ServiceNow addresses the need for managing devices not covered by traditional scanning or agent-based solutions, ensuring a more comprehensive and accurate assessment of device vulnerabilities and risks. Its integration with ServiceNow Vulnerability Response is available in the ServiceNow Store and enables organizations to leverage Ordr's device insights seamlessly with ServiceNow's capabilities to enhance their digital security posture. The $220 billion Now Platform business opportunity relies on ServiceNow's extensive partner network and program. The revised ServiceNow Partner Program rewards partners for their diverse knowledge and experience to drive opportunities, develop new markets, and help customers digitally transform. Senior Vice President of Global Partnerships at ServiceNow, Erica Volini, stated, Partnerships succeed best when we lean into our unique skills and expertise and have a clear view into the problem we’re trying to solve. Ordr’s integration extends our reach well beyond where we can go alone, and represents the legacy and goals of the Now Platform. I am thrilled to see the continued innovation we will achieve together to help organizations succeed in the era of digital business. [Source: Cision PR Newswire] About Ordr Ordr simplifies the task of safeguarding all connected devices, encompassing traditional IT devices as well as newer, more susceptible entities like IoT, IoMT, and OT. The Ordr Systems Control Engine employs deep packet inspection and advanced machine learning to achieve comprehensive device discovery, risk profiling, behavior analysis, communication mapping, and automated policy-based protection. Globally recognized, organizations rely on Ordr to provide real-time asset inventory, address risk and compliance concerns, and expedite IT initiatives.

Read More

Platforms

Quectel Expands Its IoT Antenna Portfolio With Six New 4G and 5G Antennas

Business Wire | October 26, 2023

Quectel, a global IoT solutions provider, has unveiled six new antennas designed to provide robust connectivity performance for IoT devices. The new antennas cover a wide range of use cases from 5G to non-terrestrial networks (NTNs) bringing new capabilities to customers. We’re delighted to further augment our comprehensive range of antennas with the addition of these new antennas and evaluation boards, said Norbert Muhrer, President and CSO, Quectel Wireless Solutions. “Internet of Things applications increasingly demand high-performance antennas that meet their specific needs whether that’s for competitive cost, access to specific network technologies in particular frequency bands or for robust, safe characteristics such as IP ratings and RoHS and REACH compliance. The expanded Quectel antenna range is sure to meet the needs of your device and deployment and is backed by our design support and deployment experience, alongside, of course, our widely deployed and comprehensive range of modules.” The Quectel YC0001CA is a 4G surface-mount design (SMD) antenna that is optimized for LTE, LTE-M and Narrow Band-IoT (NB-IoT) networks. This low-profile antenna, which measures just 35.0 x 8.5 x 3.0mm, operates in the 700-960MHz and 1710-2700MHz and is both RoHS and REACH compliant for use in sensitive environments. In addition, the antenna can be supplied on tape and reel for high-volume applications and is compatible with all of Quectel’s 4G, 3G, 2G and LPWA IoT modules. The Quectel YC0018CA is a 5G SMD antenna that covers 5G New Radio (NR) Sub-6GHz frequency bands. Depending on the ground plane, the antenna is designed to be mounted directly to the printed circuit board (PCB) using a conventional PCB reflow process. Measuring 40.0 x 7.0 x 3.0mm, the antenna operates between -40 °C to +85 °C and weighs 15g. The antenna can be tuned specifically for the final device environment with a simple, PI matching circuit and, when used with other 5G antennas, it can achieve multiple input, multiple output (MIMO) performance. Also available on tape and reel, the antenna can also be supplied with the YC0018CAEVB evaluation board. The Quectel YECN028AA is a 5G or NTN external antenna that supports the 410-470MHz, 617-960MHz and 1425-6000MHz frequency bands. With dimensions of 225 x 54.5 x 13.0mm, the antenna is IP66, RoHS and REACH compliant so it has wide applicability to use cases in sensitive environments. Featuring high efficiency and gain, the antenna offers omni-directional high-speed data transmission and can be used in a wide range of wireless devices such as access points, outdoor equipment, real-time monitoring devices and many others. The Quectel YEMX223J1A is a 5G x 2 combo antenna that is IP67, RoHS and REACH compliant. Measuring 186.0 x 176.0 x 100.5mm, the combo antenna supports the 410-470MHz, 617-960MHz, 1420-1520MHz, 1710-2690MHz, 3300-3800MHz and 4000-6000MHz frequency bands. The ultra-wideband antenna box is also backward compatible supporting 2G and 3G networks as well as Cat-M and NB-IoT. Designed for ease of integration with connection via two cable lengths from 450-5000mm, the pole, wall suction mount omni-directional antenna offers ease of installation and durability thanks to its IP67 and IP69K compliant enclosure. Quectel offers flexible installation option with custom cable length and connector options The Quectel YEMX425J1A is a 5G x 4 combo antenna that measures 186.0 x 176.0 x 150mm. The combo antenna supports the 410-470MHz, 617-2690 MHZ and 3300-6000MHz frequency bands and both RoHS and REACH compliant. Offering backward compatibility with 2G, 3G, Cat-M and NB-IoT, the antenna is, in common with the YEMX223J1A, compatible with Quectel’s RM520x Series of IoT modules. In addition, durability is assured thanks to the combo antenna’s IP67 and IP69K ASA enclosure. Rounding out the latest wave of Quectel antenna introductions, the Quectel YSIS001AA, metal spring antenna operates in the 412-427MHz band, the 433-435 MHz band and the 450-470MHz band which is compatible with LTE B31 plus EU433 applications. Measuring 29.0 x 7.0 x 7.90mm, the RoHS and REACH compliant antenna is mounted to the host device PCB using the conventional SMD reflow process, offering high efficiency. In common with all Quectel antennas, these new additions to the range also gain Quectel’s comprehensive antenna design support including simulation, testing and manufacturing for custom antenna solutions to meet customers’ specific application needs. About Quectel Quectel’s passion for a smarter world drives us to accelerate IoT innovation. A highly customer-centric organization, we are a global IoT solutions provider backed by outstanding support and services. Our growing global team of 5,900 professionals sets the pace for innovation in cellular, GNSS, Wi-Fi and Bluetooth modules as well as antennas and services. With regional offices and support across the globe, our international leadership is devoted to advancing IoT and helping build a smarter world.

Read More

Enterprise Iot

Microchip Introduces New PolarFire FPGA and SoC Solution Stacks

Microchip Technology Inc. | October 09, 2023

Microchip Technology introduced nine new FPGA and SoC solution stacks designed for vertical markets. These solution stacks enable rapid deployment of intelligent edge solutions without requiring specialized expertise. Customers have praised PolarFire FPGAs for their small footprint, energy efficiency, and high performance. Microchip Technology has introduced nine new FPGA and SoC solution stacks, each tailored to meet specific requirements in vertical markets such as industrial edge, smart embedded vision, and edge communications. Microchip aims to simplify the creation of industrial and communications designs by offering solution stacks that leverage the power efficiency, security, and reliability of PolarFire FPGAs. Companies like Xenics and KAYA Instruments have cited benefits such as small form factor, power efficiency, and energy efficiency in utilizing Microchip's FPGA solution stacks for their products. In addition to the launch of its industrial edge stack and related tools earlier this year for Open Platform Communications/Unified Architecture (OPC/UA)-based IIoT applications, this increases the total number of PolarFire and SoC solution stacks to ten. For Smart Embedded Vision: H.264 compression CoaXpress among others For Industrial Edge: OPC/UA Motor control For Edge Communications: Small Form-factor pluggable optical module Software-defined radios and others Customers mentioned several factors for choosing Microchip's FPGA solution stacks. Federic Aubrun, Chief Commercial Officer (CCO) of Xenics, a developer of infrared imaging sensors with products for short-, mid-, and long-wave IR imagers, cores, and cameras, emphasized the significance of size, weight, and power considerations in thermal imaging system design. He stated that Microchip's SmartFusion and PolarFire FPGAs offered the optimal combination of a compact form factor, power efficiency, and processing capabilities while operating within a highly efficient power budget in their current and future product lines. These solution stacks provide detailed IP, reference designs, development kits, application notes, and demo guides, enabling the deployment of intelligent edge solutions. It stacks cater to the growing demand for quick deployment of intelligent edge solutions without the need for specialized technology knowledge. The solution stacks cover various areas, including H.264 compression, HDMI, serial digital interface, CoaXpress, motor control, OPC/UA, software-defined radios, USXGMII, SFP+ optical modules, and 5G ORAN, providing versatile options for different vertical markets. Another company, KAYA Instruments, designs industrial-grade imaging equipment, such as small-form-factor, low-power cameras and frame grabbers that deliver high-quality video under ordinary to extreme ambient light conditions. Michael Yampolsky, Founder and CEO at KAYA, stated, We use PolarFire FPGAs due to their compact footprint and energy efficiency. Utilizing the most up-to-date CMOS sensor technology, they enable cameras to fit in tight spaces while maintaining high quality, low noise, exceptional dynamic range, and a large feature set. FPGAs on our platform enables us to rapidly bring the most advanced vision technology to market to meet the needs of our customers. [Source: embedded]

Read More

IoT Security

Ordr Partners with ServiceNow Vulnerability Response with Now Platform

Ordr | October 09, 2023

Ordr, a leader in connected device security, has announced its integration with ServiceNow Vulnerability Response, expanding its existing integrations with ServiceNow's Service Graph Connector, CMDB, and ITSM. This integration enhances Ordr's insights into all connected devices, enabling more efficient vulnerability management for IoT, IoMT, and OT devices. The integration extends Ordr's device vulnerability and risk insights into ServiceNow Vulnerability Response, creating a comprehensive solution for managing device security. It helps bridge visibility gaps in vulnerability management for all managed and unmanaged devices, including IoT, IoMT, and OT devices. It provides a centralized view of vulnerabilities and accelerates vulnerability management tasks. Integrating Ordr with ServiceNow Vulnerability Response enables customers to: Closing visibility gaps for vulnerabilities and risks Maintaining a centralized and comprehensive view of all device vulnerabilities and risk Accelerating vulnerability management duties and reducing risk Tracking vulnerability management efforts Ordr's integration with ServiceNow addresses the need for managing devices not covered by traditional scanning or agent-based solutions, ensuring a more comprehensive and accurate assessment of device vulnerabilities and risks. Its integration with ServiceNow Vulnerability Response is available in the ServiceNow Store and enables organizations to leverage Ordr's device insights seamlessly with ServiceNow's capabilities to enhance their digital security posture. The $220 billion Now Platform business opportunity relies on ServiceNow's extensive partner network and program. The revised ServiceNow Partner Program rewards partners for their diverse knowledge and experience to drive opportunities, develop new markets, and help customers digitally transform. Senior Vice President of Global Partnerships at ServiceNow, Erica Volini, stated, Partnerships succeed best when we lean into our unique skills and expertise and have a clear view into the problem we’re trying to solve. Ordr’s integration extends our reach well beyond where we can go alone, and represents the legacy and goals of the Now Platform. I am thrilled to see the continued innovation we will achieve together to help organizations succeed in the era of digital business. [Source: Cision PR Newswire] About Ordr Ordr simplifies the task of safeguarding all connected devices, encompassing traditional IT devices as well as newer, more susceptible entities like IoT, IoMT, and OT. The Ordr Systems Control Engine employs deep packet inspection and advanced machine learning to achieve comprehensive device discovery, risk profiling, behavior analysis, communication mapping, and automated policy-based protection. Globally recognized, organizations rely on Ordr to provide real-time asset inventory, address risk and compliance concerns, and expedite IT initiatives.

Read More

Events