WELCOME TO The THE INTERNET OF THINGS REPORT
Newsletter | Member Login | Signup
Home > Resources > Whitepapers > Doing more with your IoT data
March 10, 2022
I'm For Real
Enter your details once to access all our information and resources
FormFactor, Inc. enables semiconductor manufacturers test the integrated circuits (ICs) that power consumer mobile devices...
whitePaper | June 8, 2022
The smart home continues to evolve in available functions and complexity as several different connectivity protocols from numerous suppliers target a variety of products for use in smart homes. However, many consumers (71% according to incontrol) acknowledge fear of their personal information being stolen while using smart home products. At the same time, ease of use for user-installed products has often been elusive.
whitePaper | December 1, 2019
Much is being made of the Industrial Internet of Things (IoT) and the associated need for wireless connectivity for industrial sensors. But the networking needs of industrial devices and applications are distinct from the consumer world, with reliability and security high on the list. This white paper highlights some of the key network requirements specific to industrial wireless sensor networks.
whitePaper | March 28, 2022
This document introduces the main aspects and decisions you need to consider before and during your development phase of a low-power cellular Internet of Things (IoT) product. The sections are structured and ordered chronologically to follow a natural way of designing a cellular IoT device. The first sections cover the initial design decisions you might need to make to get the best possible baseline of your design. This includes overviews about the nRF9160 System in Package (SiP), modem radio, and radio technologies. The importance of network coverage and access is also discussed.
whitePaper | March 17, 2022
Among security best practices, system partitioning separates and isolates security-related hardware, software, and data in a “trusted zone” and tightly limits all attempts to access trusted content from outside the zone. Non-secure software cannot directly access secure resources. The Trusted Zone isolates security-related Microcontroller Unit (MCU) hardware, software, and external devices.
whitePaper | March 22, 2022
There is no denying that the COVID-19 pandemic accelerated innovation and changed the way institutions now approach teaching, learning, working and research. While technology has played a growing and supporting role in student engagement and enabling teachers and administrative staff to take advantage of the very latest resources, it has now taken the lead role and provided many more opportunities for students, teachers and staff to succeed.
whitePaper | May 18, 2022
Networking and security teams have historically relied on protections at the network perimeter to secure the entire enterprise. The internal network was deemed trusted and secure. While everything outside was considered “dirty,” everything on the internal network was considered “clean,” and application traffic would flow unrestricted. However, recent and developing shifts in enterprise working models are having a far-reaching effect on the traditionally managed network perimeter for security.
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE