The Evolution of M2M and IoT

March 1, 2016

"The ideas of Machine-to-Machine (M2M) communications and the Internet of Things (IoT) have reached a new level of buzz across industries and may seem to be new concepts."

Spotlight

DUST Identity Inc.

DUST Identity is the creator of the Diamond Unclonable Security Tag (DUST), a proprietary technology utilizing nanoengineered diamonds to create an unclonable identity layer on any object. DUST Identity is the only supply-chain solution that ensures that trusted data and verifiable products are used and traced across their full lifecycle.

OTHER WHITEPAPERS
news image

The Right Approach to Zero Trust for IoT Devices

whitePaper | May 18, 2022

Networking and security teams have historically relied on protections at the network perimeter to secure the entire enterprise. The internal network was deemed trusted and secure. While everything outside was considered “dirty,” everything on the internal network was considered “clean,” and application traffic would flow unrestricted. However, recent and developing shifts in enterprise working models are having a far-reaching effect on the traditionally managed network perimeter for security.

Read More
news image

IoT in the TV White Space Spectrum

whitePaper | April 4, 2022

The deployment of Internet of Things (IoT) networks has rapidly increased over recent years – to connect homes, cities, farms, and many other industries. Today, these networks rely on connectivity solutions, such as LoRaWAN, operating in the ISM bands. Our experience from deployments in multiple countries has shown that such networks are bottlenecked by range and bandwidth.

Read More
news image

Creating secure IoT device identities

whitePaper | December 5, 2022

IoT applications are extremely vulnerable to cybersecurity attacks as they control both data access (often personal or sensitive) and connected devices. Without proper security, IoT technology will not grow as projected nor live up to its true potential in the marketplace. This paper focuses on how to create secure IoT device and sensor identities, fostering data access and interaction across devices in a trusted ecosystem.

Read More
news image

WI-FI 6/6E INDUSTRIAL IOT (IIOT)

whitePaper | July 4, 2022

Explore uses of WiFi (6/6E/7) capabilities for Industrial IOT (IIOT) applications. Define and validate critical KPIs (latency, reliability, mobility, etc). Field trials of WiFi6E IIOT use-cases in progress (stand-alone & 5G/Wi-Fi convergence) Formalization of relationships with complimentary industry groups.

Read More
news image

SK Telecom 6G White Paper

whitePaper | June 13, 2023

6G requires setting achievable goals and continuous communication with the market and consumers.  Efforts of all participants in the new 6G ecosystem are required, such as expanding of 6G usage scenarios, selecting candidate spectrums, vitalizing open interfaces, e.g., Open RAN, and simple architecture options, etc.

Read More
news image

IoT white paper

whitePaper | January 22, 2022

This white paper has been prepared for distribution for informational purposes only. No regulatory authority has examined or approved any of the information set out in this white paper. The white paper may not be exhaustive and does not imply any elements of a contractual relationship or obligations.

Read More

Spotlight

DUST Identity Inc.

DUST Identity is the creator of the Diamond Unclonable Security Tag (DUST), a proprietary technology utilizing nanoengineered diamonds to create an unclonable identity layer on any object. DUST Identity is the only supply-chain solution that ensures that trusted data and verifiable products are used and traced across their full lifecycle.

Events