ENTERPRISE IOT

Best practices for cellular IoT development

March 28, 2022

infocenter
This document introduces the main aspects and decisions you need to consider before and during your development phase of a low-power cellular Internet of Things (IoT) product. The sections are structured and ordered chronologically to follow a natural way of designing a cellular IoT device. The first sections cover the initial design decisions you might need to make to get the best possible baseline of your design. This includes overviews about the nRF9160 System in Package (SiP), modem radio, and radio technologies. The importance of network coverage and access is also discussed.

Spotlight

temperature @lert

Temperature is a significant threat to companies around the world, especially in data centers, server and telecommunications rooms, biotechnology/pharmaceutical/medical facilities and companies requiring commercial refrigeration. A temperature change can cost thousands, if not millions of dollars in damage and lost productivity. Temperature@lert’s cloud-based temperature monitoring solutions provide real-time alerts and historic records to allow customers to immediately react to potentially disastrous temperature fluctuations and provide logs for regulatory requirements. Temperature@lert has more than 40,000 devices installed in over 50 countries around the globe. Temperature@lert systems are protecting over $1,000,000,000 of customer assets.

OTHER WHITEPAPERS
news image

Technology Efficiencies and Opportunities for Universities

whitePaper | March 22, 2022

There is no denying that the COVID-19 pandemic accelerated innovation and changed the way institutions now approach teaching, learning, working and research. While technology has played a growing and supporting role in student engagement and enabling teachers and administrative staff to take advantage of the very latest resources, it has now taken the lead role and provided many more opportunities for students, teachers and staff to succeed.

Read More
news image

Creating secure IoT device identities

whitePaper | December 5, 2022

IoT applications are extremely vulnerable to cybersecurity attacks as they control both data access (often personal or sensitive) and connected devices. Without proper security, IoT technology will not grow as projected nor live up to its true potential in the marketplace. This paper focuses on how to create secure IoT device and sensor identities, fostering data access and interaction across devices in a trusted ecosystem.

Read More
news image

Advancing the Industrial Internet of Things

whitePaper | December 6, 2019

This white paper demonstrates how two leading organizations in the Internet of Things (IoT) can work together towards a common purpose of a robust, interoperable, flexible and efficient Industrial Internet of Things (IIoT). We first introduce the two organizations, the Industrial Internet Consortium (IIC) and oneM2MTM, then illustrate their technical approach to IoT solutions, demonstrating how both organizations’ thought leaders envision the growth of IoT through collaboration.

Read More
news image

Unlock the Power of Private 5G: Top Applications and Key Business Outcomes

whitePaper | February 23, 2023

The private 5G market is at an early stage of development, but activity in the market is increasing. 5G accounted for over 50% of all publicly disclosed private network announcements at the end of 2022, according to Analysys Mason’s Private LTE/5G networks tracker.1 5G’s share is lower when non-public announcements are included, but it is expected that most private networks will eventually use 5G.

Read More
news image

The Work Ahead in IoT: The Gap Widens Between IoT ‘Haves’ and ‘Have-nots

whitePaper | May 9, 2022

The current task with IoT is to drive performance outcomes by combining it with other advanced technologies and gaining buy-in from the employees essential to making digital initiatives possible.

Read More
news image

Improving the Reliability of the Internet of Things

whitePaper | May 24, 2022

Despite the best efforts of developers, embedded and IoT systems are usually deployed with bugs remaining in their code. A development team introduces an average of 120 bugs per 1,000 lines of code during development. Approximately 5 percent, or 6 bugs per 1,000 lines of code, typically remain in the shipped software.

Read More

Spotlight

temperature @lert

Temperature is a significant threat to companies around the world, especially in data centers, server and telecommunications rooms, biotechnology/pharmaceutical/medical facilities and companies requiring commercial refrigeration. A temperature change can cost thousands, if not millions of dollars in damage and lost productivity. Temperature@lert’s cloud-based temperature monitoring solutions provide real-time alerts and historic records to allow customers to immediately react to potentially disastrous temperature fluctuations and provide logs for regulatory requirements. Temperature@lert has more than 40,000 devices installed in over 50 countries around the globe. Temperature@lert systems are protecting over $1,000,000,000 of customer assets.

Events