AWS IoT Lens

December 25, 2019

The AWS Well-Architected Framework helps you understand the pros and cons of the decisions you make when building systems on AWS. Using the Framework allows you to learn architectural best practices for designing and operating reliable, secure, efficient, and cost-effective systems in the cloud. The Framework provides a way for you to consistently measure your architectures against best practices and identify areas for improvement. We believe that having well-architected systems greatly increases the likelihood of business success.

Spotlight

Dolphin Design

Founded in 1985, Dolphin Design currently employs 160 employees in their head office located in Meylan, France and operates subsidiaries in Canada and Israel. Dolphin Design develops semiconductor IPs mainly serving high volume fabless IC companies and offers integrated circuit design services to customers worldwide. Conscious of AI, IoT, mobile and automotive products’ explosive growth and potential environmental impact, Dolphin Design is committed to accelerating the development of energy-efficient System-on-Chip (SoC) for its customers.

OTHER WHITEPAPERS
news image

Satellite based LoRa unlocks Europe-wide IoT

whitePaper | April 27, 2022

Big data is the dominant economic currency in a changing world moving at an increasingly accelerated pace. The speed and frequency with which data is collected, processed, and actioned is crucial to delivering the core promise of the Internet of Things (IoT) – either saving money through optimized operations or enabling new business models to generate new revenue streams.

Read More
news image

Best practices for cellular IoT development

whitePaper | March 28, 2022

This document introduces the main aspects and decisions you need to consider before and during your development phase of a low-power cellular Internet of Things (IoT) product. The sections are structured and ordered chronologically to follow a natural way of designing a cellular IoT device. The first sections cover the initial design decisions you might need to make to get the best possible baseline of your design. This includes overviews about the nRF9160 System in Package (SiP), modem radio, and radio technologies. The importance of network coverage and access is also discussed.

Read More
news image

Different Dimensions of IOT Security

whitePaper | December 20, 2019

IOT is wirelessly connecting things to the internet using sensors, RFID’s and remotely accessing and managing them over our phone or through our voice. IOT uses various communication protocols such as Zigbee, 6LowPan, Bluetooth and has bi directional communication for exchange of information. The database for IOT is cloud which is also vulnerable to security threats. The increasing amount of popularity of IoT and its pervasive usage has made it more recurrent to prominent cyber-attacks such as botnet attack, IoT ransom ware, DOS attack, RFID hack.

Read More
news image

Next Generation Mission Critical Networks

whitePaper | May 31, 2023

In a society moving towards digital, where access to data in almost real time is key to every single industry sector, Public Safety (PS) services are seen as laggers when it comes to take most of the technology available to enable agencies and emergency services to benefit the best information available. By relying in voicecentric technologies, Public Safety services cannot support themselves for instance on simple video-based use cases, which would leverage decision making processes with insightful information that could for example make a difference between life and death.

Read More
news image

Wi-Fi 6: Leveling Up the Technology

whitePaper | October 17, 2022

The IEEE 802.11 working group, established in 1990, published its first Wi-Fi standard in 1997. Since that time, the rapid adoption of Wi-Fi-enabled devices, streaming services, and applications has provided users with innovative solutions to participate in nearly all facets of daily living—from anywhere and at any time.

Read More
news image

Consumer IoT Device Cybersecurity Standards, Policies, and Certification Schemes

whitePaper | February 23, 2023

There are three key elements in the world of Internet of Things cyber security. Standards are created in order to harmonize a common set of requirements. Regulations are created in order to incentivize manufacturers to adopt cybersecurity hygiene practices so as to protect societies and increase their cyber-resilience. Labels are created in order to provide visibility to consumers.

Read More

Spotlight

Dolphin Design

Founded in 1985, Dolphin Design currently employs 160 employees in their head office located in Meylan, France and operates subsidiaries in Canada and Israel. Dolphin Design develops semiconductor IPs mainly serving high volume fabless IC companies and offers integrated circuit design services to customers worldwide. Conscious of AI, IoT, mobile and automotive products’ explosive growth and potential environmental impact, Dolphin Design is committed to accelerating the development of energy-efficient System-on-Chip (SoC) for its customers.

Events