The Entry Path to Your Next IoT Application Design

Renesas

Have you been challenged by your management to design a state-of-the-art IOT solution? Are you searching for the right microcontroller to be used? You don’t want to make any trade-offs, but enjoy large memory, high security, and easy use?
Watch Now

Spotlight

This is the first video of our "ESTI M2M Video Tutorial series". In this video we will give you an introduction to ETSI M2M and why do people need it. It is targeted to audience who want a system level architecture. It also caters to individuals who want to know the rise of ETSI M2M and its global partnership. We also give a short glimpse of ETSI REST functionality in this videos. Most of these topics are further illustrated in details in the upcoming videos.


OTHER ON-DEMAND WEBINARS

IoT is Smart for Your Buildings - How to Revolutionize Building Performance

Microsoft

Join Microsoft’s IoT In Action Smart Building Webinar to learn about Azure Digital Twins, the new Azure IoT platform for any spatial intelligence scenario, including Smart Buildings. You’ll see the many exciting possibilities when IoT is applied to buildings and gain insights into how existing data from existing equipment can make buildings operate better, save you money and find new business opportunities. You won’t want to miss learning about how Microsoft and Datahoist are leading the smart building and digital transformation initiatives with Azure IoT!
Watch Now

The Internet of Things lacks the security Healthcare needs

CI Security

Security is an afterthought as IoT companies rush to market with the latest and the greatest device. Your healthcare environment likely includes devices with simple vulnerabilities you don't know about.
Watch Now

Securing the Internet of Unnecessary Things

Infosecurity Magazine

At the beginning of January, the annual CES show demonstrated the internet-connected capabilities of devices as diverse as hairbrushes, beds and massage chairs. While it is fun to live in the space age, it remains the case that security and encryption capabilities are rarely considered during the development of such products.
Watch Now

Securing the Internet of Things: An Impossible Task?

Ayla Networks

With more and more devices being connected daily, the Internet of Things is continuing to accelerate and is showing no signs of letting up, in fact, its just heating up. But for every new connected product that is announced, there seems to be yet another report of a high profile security breach, effecting millions of users; compromising everything from personal data to allowing remote access and control of your connected systems to unauthorized parties.
Watch Now

Spotlight

This is the first video of our "ESTI M2M Video Tutorial series". In this video we will give you an introduction to ETSI M2M and why do people need it. It is targeted to audience who want a system level architecture. It also caters to individuals who want to know the rise of ETSI M2M and its global partnership. We also give a short glimpse of ETSI REST functionality in this videos. Most of these topics are further illustrated in details in the upcoming videos.

resources