Blog
What is the problem with IoT security?
You have probably heard the term 'the Internet of Things' (IoT) being thrown about, according to some it is the next big revolution after mobile, for others it is more hype than reality. The truth is somewhere in between. However one thing is sure the number of computing devices connected to the internet is growing, and growing fast, Gary Sims explains.
Getting things right first time with PLM and BoM
A fundamental part of product development is the creation of a Bill of Materials (BOM).However, manufacturers are often unsure at what stage of the product development the BOM comes in. Best practice dictates that the BOM needs to travel fluently through the different development stages, evolving and changing as products are designed, built and eventually, circulated.
The connected industry and the Internet of Things that really matter - Part II
Enabling the “Where and When” of IoT For many designers of IoT devices that will be communicating over a range of about 100m, the options are many and somewhat confusing. There’s Bluetooth IEEE 802.15.4 (ZigBee, Thread, Wireless Hart and others), Z‑Wave, and of course WiFi, with all its various flavours.
The connected industry and the Internet of Things that really matter - Part I
Whether it’s called the Industrial Internet of Things (IIoT) or Industry 4.0, the sensing, communication and analysis of data toward improving processes and outcomes is transforming industries from manufacturing and healthcare to transportation, fleet management, mining and agriculture.
Software-defined infrastructure in industrial IoT: How it works
Previously the idea of a software-defined infrastructure approach driving and accelerating digital transformation in industrial automation had been mentioned and introduced. Guest blog by Gareth Noyes.
When is an IoT Botnet not an IoT Botnet?
IoT botnets continue to make news, with new strains of malware infecting a range of internet-connected devices and then using those devices to participate in historically large distributed denial of service (DDoS) attacks. Guest blog by Mychal McCabe.
Hello Dave: Are you human or machine?
Cybersecurity continues to evolve but with the Internet of Things (IoT), security is not just about the safety of the device but also the network. In light of the recent massive Botnet attack on 80 major websites in the US, the ability to exploit one weak point in a network of connected things has made it easier for a hacker to steal an identity to gain access to a corporate network.
What does Pokémon Go reveal about the future of Augmented Reality?
The lifecycles of breakthrough technologies such as Augmented Reality (AR) are heavily reliant on mainstream take up. Many believed AR would initially be used by architects to visualise buildings and design companies for 3D graphic imagery. Yet its first major adoption saw more than 100 million people take to the streets to hunt Pokémon.
IoT is a business problem first
Living in the bay area, I get to see plenty of technology solutions and platforms emerge almost every single month. And with IoT as the current buzzword, a lot of platforms are aimed towards it. Guest blog by Amar Parmar.
Wind River titanium server brings telco reliability to Dell EMC NFV infrastructure platform
Wind River Titanium Server network virtualisation software ensures that Dell EMC’s new NFV infrastructure platform meets the demanding reliability requirements of Communications Service Providers (CSPs). Guest blog by Charlie Ashton.