Internet of Things in Manufacturing: Driving Revenue and Improving Operations

March 1, 2016

The hype dial seems to be turned all the way up on the concept of the Internet of Things (IoT). Many of our clients view this chatter with a bemused cynicism. Sensors,"machine to machine" (M2M) communication, and streaming intelligence have been standard operating practices for some time. One client termed IoT as "the overnight sensation that took 20 years to develop." Companies do recognize, however, that advances in technology — both capabilities and cost — open new avenues of investment to deliver significant value.

Spotlight

Vidsys, Inc.

Vidsys provides transformational Physical Security Information Management (PSIM) and Converged Security and Information Management (CSIM) software platform that has been adopted by some of the world’s leading brands and technology partners within key verticals, including Transportation, Energy, Utility, Healthcare, and Government. Vidsys software has obtained highest levels of information security and assurance from both top-tier global corporations and the US federal government.

OTHER WHITEPAPERS
news image

Consumer IoT Device Cybersecurity Standards, Policies, and Certification Schemes

whitePaper | February 23, 2023

There are three key elements in the world of Internet of Things cyber security. Standards are created in order to harmonize a common set of requirements. Regulations are created in order to incentivize manufacturers to adopt cybersecurity hygiene practices so as to protect societies and increase their cyber-resilience. Labels are created in order to provide visibility to consumers.

Read More
news image

IXON Whitepaper Security 2022

whitePaper | April 25, 2022

IXON provides a fully integrated cloud-based Industrial IoT solution for machine builders, building automation integrators and system integrators. The IXON Cloud platform together with a connectivity gateway, the IXrouter or third party devices with the IXagent software installed, o¬ers an all-in-one solution for safely and easily setting up remote access to your machines, monitoring or logging machine status and receiving alerts about important machine events — all within your own branded IXON Cloud portal.

Read More
news image

Accelerating the Impact of Industrial IoT in Small and Medium‑Sized Enterprises

whitePaper | February 12, 2020

Small and medium sized enterprises (SMEs) in the manufacturing sector are being left behind in the Fourth Industrial Revolution. This worrying trend is exacerbating economic inequality, stifling opportunities for social mobility and dragging down global industrial productivity. To benefit from the technological advancements of the Fourth Industrial Revolution, SMEs will need to overcome a range of challenges including a dearth of skilled employees, lack of access to capital and unclear returns on investment, a need to revamp their firm’s infrastructure and processes, a need to update information technology and operational technology, and navigate a nascent technology landscape that is currently poised to serve larger companies.

Read More
news image

IoT white paper

whitePaper | January 22, 2022

This white paper has been prepared for distribution for informational purposes only. No regulatory authority has examined or approved any of the information set out in this white paper. The white paper may not be exhaustive and does not imply any elements of a contractual relationship or obligations.

Read More
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | August 16, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More
news image

NICT Beyond 5G/6G White Paper English version 2.0

whitePaper | June 17, 2022

The implementation of fifth generation mobile communication systems in society has been in full swing since around 2020. Mobile communication systems have evolved into a communication infrastructure (1G-3G) and a living infrastructure (4G), becoming an indispensable element in the lives of individuals. It has become a social infrastructure that connects not only people but also things like the Internet of Things (IoT).

Read More

Spotlight

Vidsys, Inc.

Vidsys provides transformational Physical Security Information Management (PSIM) and Converged Security and Information Management (CSIM) software platform that has been adopted by some of the world’s leading brands and technology partners within key verticals, including Transportation, Energy, Utility, Healthcare, and Government. Vidsys software has obtained highest levels of information security and assurance from both top-tier global corporations and the US federal government.

Events