Many Faces of IoT Connectivity & How to Deal With Them - IoT Panel Discussion

RTI

IoT encompasses a wide range of embedded, network, and cloud systems where the value is unlocked by the data gathered from sensor and edge devices that can be used by gateways, cloud applications, and analytics to drive significant value. However, communications are not as simple as one protocol, one service, one language. And the connectivity is multi-dimensional involving data transfer, authentication/security, and manageability from application to sensor.
Watch Now

Spotlight

You've heard of smart homes and fitness trackers, but have you heard of the Internet of Things? The latest video in our Mashable Explains series takes a look at these cool gadgets.


OTHER ON-DEMAND WEBINARS

EXPLORING NEW KAA 0.9

KaaIoT

The Kaa engineering team is working hard to continually improve Kaa with new features and capabilities requested by our community. On this webinar, we will introduce you to our upcoming, feature-packed release – Kaa 0.9.0. This release greatly enhances the device management capabilities of the Kaa IoT Platform. Now you have an ability to generate, provision and revoke endpoint credentials outside the SDK as well as verify them on the server side.
Watch Now

Time Series Data, Why NoSQL and Best Practices on IOT Data Modelling

Over 90% of all the data in the world was created in the past two years and the flood of new data points generating, even more is increasing daily. Gartner says 26 billion connected devices by 2020. Cisco says 50 to 200 billion, Intel say over 200 billion will be connected. And the IDC says 212 billion.
Watch Now

SDN Strategies for IoT Security

Cradlepoint

The potential for widely distributed IoT devices to streamline operations is vast, but so are the security implications. From branch sites and vehicles to M2M and IoT deployments in the wild, IoT is creating the biggest attack surfaces that IT teams have ever seen. Mirai botnets, WannaCry, and other well-publicized incidents illustrate the breadth of today’s IoT threats, which are too prevalent and advanced to address with traditional security tools. Many organizations are recognizing the need for software-defined, policy-based security solutions that isolate IoT devices and protect organizations' most valuable data regardless of the WAN source.
Watch Now

Secure Smart Lighting: Unlocking a Building's IoT Potential

Arm Ltd

Arm technology is at the heart of a computing and connectivity revolution that is transforming the way people live and businesses operate. Our advanced, energy-efficient processor designs are enabling the intelligence in more than 125 billion silicon chips and securely powering products from the sensor to the smartphone to the supercomputer. With more than 1,000 technology partners, including the world's largest consumer brands, we are driving Arm innovation into all areas compute is happening inside the chip, the network and the cloud.
Watch Now

Spotlight

You've heard of smart homes and fitness trackers, but have you heard of the Internet of Things? The latest video in our Mashable Explains series takes a look at these cool gadgets.

resources