IoT Best Practices For Home Appliance Manufacturers

Ayla Networks

As home appliance manufacturers consider adding smart appliances to their product lines, they need to ask themselves an important question: “Do we have the specialized technical expertise in house to successfully connect, scale and secure versions of our appliances for the Internet of Things (IoT)?”
Watch Now

Spotlight

Moore’s Law is running out of steam and faster processing will no longer conceal the problems inherent in today’s networks. Router tables are getting too large and the Scope, Scale and Speed of Networks must increase dramatically. Internet Protocols and Architecture were designed in the era of narrowband networks. In 1978 when TCP was first modified to accommodate “all kinds of network interconnections” data rates on modems were generally 9.6 Kbps and widespread use of Ethernet was several years away. Many problems that have emerged over the last 30 years must now be addressed to deliver the promise of broadband networks for 2017, 5G and beyond.


OTHER ON-DEMAND WEBINARS

The Internet of Things lacks the security Healthcare needs

CI Security

Security is an afterthought as IoT companies rush to market with the latest and the greatest device. Your healthcare environment likely includes devices with simple vulnerabilities you don't know about.
Watch Now

How To Visually Develop IoT Applications with AWS IoT Things Graph

AWS

AWS IoT Things Graph is a service which enables non-developers to visually create workflows between physical sensors, physical assets and web services to build intelligent networked solutions spanning physical and virtual things. In this tech talk, you will learn how to use prebuilt device abstractions and protocol translators to easily enable interactions between devices, even if they weren’t designed to work together. You'll see how built-in visual editing tools in Things Graph can be used to quickly arrange abstractions and deploy them in the cloud or on edge devices. Things Graph has powerful workflow management to automatically coordinate and track each step of the flow, and we will show you how you can take advantage of this and more.
Watch Now

Cloud-based Security in IoT

NEXCOM

On NEXCOM’s webinar, we will deliver a complete solution designated for the implementation of cloud-based security mechanisms under the IoT architecture to help you thrive in next decade. We will also elaborate how a right hardware platform, such as NEXCOM’s NSA 7130 or NSA 7135 based on Intel Xeon processor E5-2600 v3 product family (formerly codenamed Grantley), allows diverse communication players to decouple network functions from dedicated hardware devices and drive the implement of new network services and functionalities.
Watch Now

IoT Panel Webcast - Biggest IoT Security Threats and How to Address Them

RTI

Internet of Things applications are advancing past prototypes and proof of concepts into commercial use. As these systems get deployed, the security architecture enters a new danger zone with high stakes if a security breach occurs. What is the biggest security threat that needs to be addressed? What’s the most effective approach to addressing security for IoT.
Watch Now

Spotlight

Moore’s Law is running out of steam and faster processing will no longer conceal the problems inherent in today’s networks. Router tables are getting too large and the Scope, Scale and Speed of Networks must increase dramatically. Internet Protocols and Architecture were designed in the era of narrowband networks. In 1978 when TCP was first modified to accommodate “all kinds of network interconnections” data rates on modems were generally 9.6 Kbps and widespread use of Ethernet was several years away. Many problems that have emerged over the last 30 years must now be addressed to deliver the promise of broadband networks for 2017, 5G and beyond.

resources