Releasing the Value Within the Industrial Internet of Things

Consumers are very familiar with the “Internet of Things,” ranging from activity trackers to “smart” appliances, home metering devices for water and electricity, “smart” parking meters, and more. The Internet of Things has also extended into the enterprise. In business-to-business settings, sensors collect data and that information can reduce unplanned downtime, optimize business processes, and support new product and service offerings.

Spotlight

Uber

Uber is evolving the way the world moves. By seamlessly connecting riders to drivers through our apps, we make cities more accessible, opening up more possibilities for riders and more business for drivers. From our founding in 2009 to our launches in over 400+ cities today, Uber's rapidly expanding global presence continues to bring people and their cities closer.

OTHER WHITEPAPERS
news image

Connected Cars – Architecture,Challenges and Way Forward

whitePaper | January 2, 2020

The global automotive industry has been witnessing a transformation over the last decade with digital communication technologies making rapid inroads in vehicles. The world is moving towards the concept of connected transportation that focuses on providing enhanced connectivity like vehicles communicating with each other to know their presence, real-time communication facility to the occupants of the vehicle. This functionality is enabled by variety of technologies like vehicle to vehicle.

Read More
news image

Establishing Confidence in IoT Device Security: How do we get there?

whitePaper | May 14, 2021

The purpose of this draft paper is to start a conversation about what it means to have confidence in the cybersecurity of IoT devices used by individuals and organizations and the various ways of gaining that confidence. This paper describes the landscape of confidence mechanisms that are currently available for establishing the security of IoT devices in the marketplace. In preparing this paper, NIST conducted extensive research on initiatives that can help to instill confidence in IoT device security and held a series of meetings with government and industry experts to glean information on the unique aspects and challenges in this space.

Read More
news image

WI-FI 6E AND FUTURE-PROOFING WIRELESS INFRASTRUCTURE

whitePaper | May 23, 2023

The future of wireless networking needs will continue to grow. Location based services, sensors, and IoT devices will continue to be added to wireless networks. Expanding and new uses of Wi-Fi that require high performing connections like AR/VR, AI/ML, and new technologies we don’t even know about yet will compete for wireless network resources. Finally, all the standard uses we currently associate with Wi-Fi like video and voice calls, streaming services and cloud hosted applications will continue to bring more devices to wireless networks with increasing traffic demands.

Read More
news image

The Disruptions of 5G on Data-driven Technologies and Applications

whitePaper | December 18, 2019

With 5G on the verge of being adopted as the next mobile network, there is a need to analyze its impact on the landscape of computing and data management. In this paper, we analyze the impact of 5G on both traditional and emerging technologies and project our view on future research challenges and opportunities. With a predicted increase of 10-100x in bandwidth and 5-10x decrease in latency, 5G is expected to be the main enabler for smart cities, smart IoT and efficient healthcare, where machine learning is conducted at the edge.

Read More
news image

Satellite based LoRa unlocks Europe-wide IoT

whitePaper | April 27, 2022

Big data is the dominant economic currency in a changing world moving at an increasingly accelerated pace. The speed and frequency with which data is collected, processed, and actioned is crucial to delivering the core promise of the Internet of Things (IoT) – either saving money through optimized operations or enabling new business models to generate new revenue streams.

Read More
news image

Zero Trust Maturity Model

whitePaper | June 13, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More

Spotlight

Uber

Uber is evolving the way the world moves. By seamlessly connecting riders to drivers through our apps, we make cities more accessible, opening up more possibilities for riders and more business for drivers. From our founding in 2009 to our launches in over 400+ cities today, Uber's rapidly expanding global presence continues to bring people and their cities closer.

Events