With data from billions of connected devices and trillions of sensors, supply chain and device manufacturing operators are taking advantage of new benefits. Think improved efficiency and greater flexibility among potential business models. But as the IoT assumes a bigger role across industries, security needs to take top priority. Here’s a look at four key challenges that must be taken care of before realizing the rewards of increased connectivity.... Read more →
04/11/2018
Securing the Internet of Things: Devices & Networks
Posted at 8:04 am in Uncategorized, | Permalink
Tags: IOT IOTRUST INDUSTRIAL DEVICES NETWORKS MANUFACTURING DATA,
04/05/2018
How Fog Computing is Driving Industrial IoT Systems Evolution
In the last century, transportation, medical, power, and industrial systems were built from individual devices, usually programmed one at a time. The Industrial Internet of Things (IIoT) is changing all of that, transforming isolated programmable devices into intelligent networks of connected machines, such as autonomous cars, intelligent drone delivery systems, smart grid power systems, automated air traffic control, connected medical devices, robotic oil drilling, and more. As a result, these systems have unique computing requirements including real-time processing, complex data interconnectivity, integrated security, high performance, reliability, and scalability. ... Read more →
Posted at 8:04 am in Adopting the Industrial Internet,Industrial Internet Innovation,OpenFog, | Permalink
Tags: AUTONOMY, FOG, IIOT, IOT, MONITORING, OPENFOG, OPTIMIZATION,
03/12/2018
IIoT Innovation and our Search for a Better Way
By Christopher Arthmann, New Business Creation Lead, NEC’s Innovation Division Have we really changed that much? If you look at the basics, maybe not. We still eat, we still sleep, we still want to get from one place from another, we all want shelter and clothing; we want to be... Read more →
Posted at 8:04 am in Uncategorized, | Permalink
03/01/2018
IIoT Monetization Concepts
Businesses are starting to look at new monetization opportunities beyond first-generation, IIoT applications. For the industrial sector, the IIC hosted a brainstorming discussion on this topic during the Q4-2017 IIC Member meeting in Burlingame, CA.Here are a few ideas stemming from our corporate experience in supporting multi-user, multi-application IIoT systems.... Read more →
Posted at 8:16 am in Uncategorized, | Permalink
02/27/2018
Send in the Drones: Enabling Operational Efficiencies through Fog Computing
Through advances in control and robotics research, we can reliably deploy drones on manual or pre-planned trajectories. In the near future, we will even be able to anticipate collision avoidance and formation flights in commercial drones. A fleet of drones will be able to self-pilot itself to capture video several hours a day in smart cities and industrial sites, thereby collecting massive amounts of video data. To manage this volume of video data in real-time, drones need fog networks.... Read more →
Posted at 8:16 am in Adopting the Industrial Internet,Industrial Internet Innovation,OpenFog, | Permalink
Tags: DRONES, FOG, IIOT, IOT, OPENFOG,
01/28/2018
Powering Clinical Trials with IoT
Although technology has been largely viewed as a cost driver by the pharmaceutical industry, IoT is being widely implemented to turn this scenario around. Particularly, digital solutions, as well as increasing access to smartphones and social media can play a vital role in pairing patients with the right study at the right time.... Read more →
Posted at 8:16 am in Uncategorized, | Permalink
Tags: IIOT, INDUSTRIAL INTERNET, IOT, LIFE SCIENCES,
01/16/2018
The Human Attack Surface: The Weakest Link in Your ICS Security
Like many specialized disciplines, the world of cyber security is filled with technical jargon that can hamper communication. In this blog, we’ll demystify some cyber security best practices and terms, as we focus on an often-overlooked factor in ICS and corporate security known as the “attack surface.” We’ll take an in-depth look at what attack surfaces are, how to keep them safe and how the human element plays a critical role in their security.... Read more →
Posted at 8:16 am in Uncategorized, | Permalink