Segmenting the Internet of Things (IoT)

March 1, 2016

People across a variety of industries have been looking for a useful, functional model of the Internet of Things (IoT) to frame their technology and product investments. This paper presents our vendor-neutral and technology-neutral segmentation, with as little jargon as possible. It is both simple to understand and comprehensive.
All systems exhibit behavior: identifiable, predictable, operational patterns. We define “behavior” a little differently when talking about consciousness (human and otherwise), but behavior is defined by predictable patterns at its core.

Spotlight

Inmarsat

Inmarsat is at the forefront of innovation. We invest in new capabilities and space technology to ensure we always meet the demands of our global mobility, government and IoT customers now and well into the future.

OTHER WHITEPAPERS
news image

Forecasting the Future of Genomic Data Management

whitePaper | August 14, 2023

Genomics is the study of the complete set of DNA in a person or other organism. DNA underpins a large proportion of an individual's health and disease status, therefore a genomic medicine approach is increasingly being applied in clinical settings.

Read More
news image

IoT Redefines Brand Experience and Customer Engagement

whitePaper | February 8, 2023

The Internet of Things (IoT), with its ability to connect devices and enable data exchange through embedded sensors, is garnering much interest across industries. TCS Global Trend 1 Study 2015 , highlights some of the major business model changes that are taking place across industries due to the adoption of the IoT. For the Consumer Packaged Goods (CPG) industry, the IoT offers widespread applicability across the value chain. CPG companies are likely to benefit the most by embedding sensors in products or services that touch end users directly, helping them drive consumer engagement throughout the consumption lifecycle. The IoT will also enable CPG companies to understand consumer needs better, thereby improving product designs or service models, leading to better brand loyalty and top-line growth.

Read More
news image

NICT Beyond 5G/6G White Paper English version 2.0

whitePaper | June 17, 2022

The implementation of fifth generation mobile communication systems in society has been in full swing since around 2020. Mobile communication systems have evolved into a communication infrastructure (1G-3G) and a living infrastructure (4G), becoming an indispensable element in the lives of individuals. It has become a social infrastructure that connects not only people but also things like the Internet of Things (IoT).

Read More
news image

Improving the Reliability of the Internet of Things

whitePaper | May 24, 2022

Despite the best efforts of developers, embedded and IoT systems are usually deployed with bugs remaining in their code. A development team introduces an average of 120 bugs per 1,000 lines of code during development. Approximately 5 percent, or 6 bugs per 1,000 lines of code, typically remain in the shipped software.

Read More
news image

Power-efficient positioning for THE Internet of Things

whitePaper | February 23, 2022

The world is embracing Internet of Things (IoT) applications. Billions of internet-connected devices are capable of sensing, communicating, interacting, computing and actuating, and are set to become even more integrated into our daily lives. By 2022

Read More
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | August 16, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More

Spotlight

Inmarsat

Inmarsat is at the forefront of innovation. We invest in new capabilities and space technology to ensure we always meet the demands of our global mobility, government and IoT customers now and well into the future.

Events