European plan on internet of things regulations

DLA Piper

The DLA Piper Internet of Things Group are presenting a series of one hour webinars. The Internet of Things will dramatically change business and business models. We will also be including industry experts in many of the webinars.
Watch Now

Spotlight

The internet landscape is growing at an exponential rate. It’s not just about computers, laptops, tablets, and smartphones anymore. There is now a multitude of devices that are internet connected. Washing machines, robotic vacuum cleaners, door locks, toys and even toasters are now becoming “smart.” That crazy future we were promised in the science fiction stories is slowly starting to show up, and consumers are flocking to own a piece of that promise.


OTHER ON-DEMAND WEBINARS

Authentication for the Internet of Things

As IoT finds widespread applicability, organizations will need to carefully evaluate and streamline methods for device identity and authentication.
Watch Now

DISCOVERING BUSINESS VALUE OF THE INDUSTRIAL IOT WITH KAA

KaaIoT

This webinar explores the business story behind the Industrial IoT and Industry 4.0 concepts. We picked 12 essential IIoT use cases which drive significant value in terms of increased profit, reduced cost, and improved customer satisfaction. Using our substantial experience in the Industrial IoT implementation, we explained how the Kaa IoT Platform can be effectively used to enable these major use cases and pave the way for large-scale industrial transformation.
Watch Now

Building an IoT Cloud for the Healthcare Industry

Altoros

Imagine yourself building an IoT healthcare cloud solution that securely connects to hundreds of private hospital networks and exchanges data with 100,000+ devices via WebSocket, TCP, and HTTP. In this scenario, even private networks routing can become a challenge. Now, add the requirements to encrypt and store customer data separately, run the pool of shared applications in Cloud Foundry for customer multi-tenancy, and integrate authentication with customer directory services. What you will get is a very complex project that must thoroughly address all aspects of building a shared and secure private cloud.
Watch Now

PKI for IOT webinar

GlobalSign

Take advantage of PKI technology to identify devices, encrypt communications and ensure the integrity of information Is PKI the answer for Security on the Internet of Things? As Gartner and other industry experts have pointed out, PKI has been used to authenticate and secure machines and devices for decades. Beyond the identification of the devices, PKI offers both the encryption necessary for confidential communications and the integrity of the information
Watch Now

Spotlight

The internet landscape is growing at an exponential rate. It’s not just about computers, laptops, tablets, and smartphones anymore. There is now a multitude of devices that are internet connected. Washing machines, robotic vacuum cleaners, door locks, toys and even toasters are now becoming “smart.” That crazy future we were promised in the science fiction stories is slowly starting to show up, and consumers are flocking to own a piece of that promise.

resources