WELCOME TO The THE INTERNET OF THINGS REPORT
Newsletter | Member Login | Signup
Home > Resources > Whitepapers > Understanding the Internet of Things (IoT), a complete project perspective
March 1, 2016
I'm For Real
Enter your details once to access all our information and resources
Crowsnest Crowsnest is an ecosystem: Device integrations are handled by our open-source plugin system, so anyone can use or create them for any device.
whitePaper | May 14, 2021
The purpose of this draft paper is to start a conversation about what it means to have confidence in the cybersecurity of IoT devices used by individuals and organizations and the various ways of gaining that confidence. This paper describes the landscape of confidence mechanisms that are currently available for establishing the security of IoT devices in the marketplace. In preparing this paper, NIST conducted extensive research on initiatives that can help to instill confidence in IoT device security and held a series of meetings with government and industry experts to glean information on the unique aspects and challenges in this space.
whitePaper | December 1, 2019
Much is being made of the Industrial Internet of Things (IoT) and the associated need for wireless connectivity for industrial sensors. But the networking needs of industrial devices and applications are distinct from the consumer world, with reliability and security high on the list. This white paper highlights some of the key network requirements specific to industrial wireless sensor networks.
whitePaper | June 17, 2022
The implementation of fifth generation mobile communication systems in society has been in full swing since around 2020. Mobile communication systems have evolved into a communication infrastructure (1G-3G) and a living infrastructure (4G), becoming an indispensable element in the lives of individuals. It has become a social infrastructure that connects not only people but also things like the Internet of Things (IoT).
whitePaper | May 18, 2022
Networking and security teams have historically relied on protections at the network perimeter to secure the entire enterprise. The internal network was deemed trusted and secure. While everything outside was considered “dirty,” everything on the internal network was considered “clean,” and application traffic would flow unrestricted. However, recent and developing shifts in enterprise working models are having a far-reaching effect on the traditionally managed network perimeter for security.
whitePaper | January 2, 2020
The brief report provides a positioning of developments in the area referred to as Industrial Internet of Things (IIoT) – loosely interpreting this as the industrial developments associated with the Internet of Things (IoT). IoT in turn describes the extension of the application of internet communications beyond computers and networked devices to also include the networking of everyday objects. In the context of industrial operations these objects are typically equipment, products and raw materials.
whitePaper | December 25, 2019
The AWS Well-Architected Framework helps you understand the pros and cons of the decisions you make when building systems on AWS. Using the Framework allows you to learn architectural best practices for designing and operating reliable, secure, efficient, and cost-effective systems in the cloud. The Framework provides a way for you to consistently measure your architectures against best practices and identify areas for improvement. We believe that having well-architected systems greatly increases the likelihood of business success.
Conference
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE