IoT, M2M, BIG DATA: looking beyond the hype

IoT (Internet of Things) and M2M (Machine-to-Machine) are really just neat terms for the capability of devices, systems or machines to communicate bi-directionally with each other on a much larger scale and more rapidly than was possible in the pre-networked era. Taking measurements, analyzing machine efficiencies, improving operating processes and systems are nothing new. Doing so always was (and remains) simply good business practices. What’s new is the sudden surge in both the amount of information recorded, and the level of access to it.

Spotlight

Geli

Geli, short for Growing Energy Labs, Inc., provides software and business solutions to design, integrate, network, and economically operate energy storage and microgrid systems. At its core, the Geli EOS (Energy Operating System) is a software platform that brings together energy storage, distributed generation, EV charging, and building controls as part of the Internet of Energy. Geli works with hardware OEMs, project developers, EPCs, and financiers to design, deploy, and operate advanced energy systems, including behind-the-meter, grid-scale, and microgrid applications.

OTHER WHITEPAPERS
news image

The Industrial IoT Landscape

whitePaper | December 30, 2019

Our mission is to design and demonstrate an Industrial Internet of Things (IIoT). We will develop the guidance needed to securely connect and profitably deploy intelligent systems across devices, edge, and cloud.

Read More
news image

SK Telecom 6G White Paper

whitePaper | June 13, 2023

6G requires setting achievable goals and continuous communication with the market and consumers.  Efforts of all participants in the new 6G ecosystem are required, such as expanding of 6G usage scenarios, selecting candidate spectrums, vitalizing open interfaces, e.g., Open RAN, and simple architecture options, etc.

Read More
news image

Establishing Confidence in IoT Device Security: How do we get there?

whitePaper | May 14, 2021

The purpose of this draft paper is to start a conversation about what it means to have confidence in the cybersecurity of IoT devices used by individuals and organizations and the various ways of gaining that confidence. This paper describes the landscape of confidence mechanisms that are currently available for establishing the security of IoT devices in the marketplace. In preparing this paper, NIST conducted extensive research on initiatives that can help to instill confidence in IoT device security and held a series of meetings with government and industry experts to glean information on the unique aspects and challenges in this space.

Read More
news image

Threat detection and response in cloud environments

whitePaper | August 1, 2022

Cloud environments change fundamental assumptions in how to perform threat detection and response. The highly dynamic inventory of cloud workloads means systems come and go in seconds. When system configuration errors are introduced during a build, they can be exacerbated and amplified when automation replicates the errors across many workloads. Shared responsibility with the cloud service provider (CSP) creates potential threat detection gaps in the attack lifecycle.

Read More
news image

Accelerating the Impact of Industrial IoT in Small and Medium‑Sized Enterprises

whitePaper | February 12, 2020

Small and medium sized enterprises (SMEs) in the manufacturing sector are being left behind in the Fourth Industrial Revolution. This worrying trend is exacerbating economic inequality, stifling opportunities for social mobility and dragging down global industrial productivity. To benefit from the technological advancements of the Fourth Industrial Revolution, SMEs will need to overcome a range of challenges including a dearth of skilled employees, lack of access to capital and unclear returns on investment, a need to revamp their firm’s infrastructure and processes, a need to update information technology and operational technology, and navigate a nascent technology landscape that is currently poised to serve larger companies.

Read More
news image

Different Dimensions of IOT Security

whitePaper | December 20, 2019

IOT is wirelessly connecting things to the internet using sensors, RFID’s and remotely accessing and managing them over our phone or through our voice. IOT uses various communication protocols such as Zigbee, 6LowPan, Bluetooth and has bi directional communication for exchange of information. The database for IOT is cloud which is also vulnerable to security threats. The increasing amount of popularity of IoT and its pervasive usage has made it more recurrent to prominent cyber-attacks such as botnet attack, IoT ransom ware, DOS attack, RFID hack.

Read More

Spotlight

Geli

Geli, short for Growing Energy Labs, Inc., provides software and business solutions to design, integrate, network, and economically operate energy storage and microgrid systems. At its core, the Geli EOS (Energy Operating System) is a software platform that brings together energy storage, distributed generation, EV charging, and building controls as part of the Internet of Energy. Geli works with hardware OEMs, project developers, EPCs, and financiers to design, deploy, and operate advanced energy systems, including behind-the-meter, grid-scale, and microgrid applications.

Events