Monetizing The Smart Home

May 10, 2016

Today’s smart home is one characterized by connected products that aim to bring simplicity to our lives through control and automation of home systems like lighting and access control.

Spotlight

Cloud of Things Ltd.

Cloud of Things makes it easy to make products smart. Our DeviceTone™ solution can be embedded into everyday products, enabling manufacturers and their distributors to offer management and maintenance services to consumers and businesses. Our embedded firmware package supports leading IoT standards, and our CloudSwitch™ technology stack enables smart products to communicate with any IoT cloud over any network protocol including LoRa, ULE, WiFi, Bluetooth and cellular. Cloud of Things was established in 2014 and is headquartered in Tel Aviv, Israel and Boston, MA, U.S.A.

OTHER WHITEPAPERS
news image

Why Wi-Fi 6 goeshand-in-hand with cellular to enable thehyper-connected enterprise future

whitePaper | August 22, 2022

Wi-Fi 6 is increasingly seen as a complementary to cellular technologies such as LTE-M and even 5G –when it becomes widely available. In private networks, the performance uplift of Wi-Fi 6 over Wi-Fi 5 is substantial and more than sufficient to support innovative use cases such as automated guided vehicles, industrial robots and many other applications.

Read More
news image

Data Fabric Its time has come

whitePaper | October 3, 2022

This paper is intended to introduce the definition of a Data Fabric solution from a business perspective, the technical capabilities required to instantiate the solution, and a reference architecture representative of the solution.

Read More
news image

Different Dimensions of IOT Security

whitePaper | December 20, 2019

IOT is wirelessly connecting things to the internet using sensors, RFID’s and remotely accessing and managing them over our phone or through our voice. IOT uses various communication protocols such as Zigbee, 6LowPan, Bluetooth and has bi directional communication for exchange of information. The database for IOT is cloud which is also vulnerable to security threats. The increasing amount of popularity of IoT and its pervasive usage has made it more recurrent to prominent cyber-attacks such as botnet attack, IoT ransom ware, DOS attack, RFID hack.

Read More
news image

Versa SD-WAN Solution Use Case for Satellite ISPs

whitePaper | July 19, 2022

Satellite networks offer their customers several advantages over other types of connectivity. They are easily deployed, reliable, and allow a wide degree of mobility, making them a perfect fit for Disaster Recovery Plans (DRP). They are an essential asset in places where other connectivity methods are not available, such as oil rigs, vessels, or even planes. However, they have several characteristics that make them harder to manage when compared to other kinds of networks. This document will discuss those challenges and explore how the Versa Operating System (VOS™) can help you extract better performance out of your Satellite links.

Read More
news image

Best Practice For End-To-End IoT Security

whitePaper | January 31, 2022

Security concerns remain a major barrier to IoT adoption for as many as 85% of IoT industry leaders1. Fraud is growing in this area, causing widespread agreement across the ecosystem that securing the IoT application is the only way to fully develop its business potential. The good news is the vast majority of attacks can be prevented – and the resilience of any IoT deployment significantly improved – with measures that are simple and cost-effective to implement.

Read More
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | August 16, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More

Spotlight

Cloud of Things Ltd.

Cloud of Things makes it easy to make products smart. Our DeviceTone™ solution can be embedded into everyday products, enabling manufacturers and their distributors to offer management and maintenance services to consumers and businesses. Our embedded firmware package supports leading IoT standards, and our CloudSwitch™ technology stack enables smart products to communicate with any IoT cloud over any network protocol including LoRa, ULE, WiFi, Bluetooth and cellular. Cloud of Things was established in 2014 and is headquartered in Tel Aviv, Israel and Boston, MA, U.S.A.

Events