New & Notable
Evaluate
IoT brings resource gains, sustainability to agriculture
Sensors, LoRa and LoRaWAN bring benefits to famers across the globe -- and in a variety of use cases. Read about how this technology can optimize resources and improve crop yield.
Evaluate
A look at smart energy security measures
IoT energy meters and sensors make buildings and power grids more efficient and cost-effective but require encryption, network security and access control for safe operation.
Manage
Effective IoT security requires collaboration and clarity
IoT brings benefits to business, government and consumers. But those features shouldn't come at the cost of security or less privacy for its users.
Manage
Polyglot developers can tackle all IoT code issues
IoT code and romance languages are similar: Once you know one, you can pick up parts of others. Development teams can benefit from code generalists and specialists.
Trending Topics
-
Business Manage
IoT data collection: When time is of the essence
Data collection is an essential part of IoT deployments, but it must also be useful and accurate to operations. Using nanoseconds for events ensures no anomaly is undetected.
-
Platform Manage
Polyglot developers can tackle all IoT code issues
IoT code and romance languages are similar: Once you know one, you can pick up parts of others. Development teams can benefit from code generalists and specialists.
-
Security Evaluate
A look at smart energy security measures
IoT energy meters and sensors make buildings and power grids more efficient and cost-effective but require encryption, network security and access control for safe operation.
-
Network Evaluate
Demystifying the unspoken plurality of edge
If you ask different people, you'll receive different answers about edge technology. Acquaint yourself with the different use cases and deployment options that fall under the edge umbrella.
-
Industry and Verticals Evaluate
IoT brings resource gains, sustainability to agriculture
Sensors, LoRa and LoRaWAN bring benefits to famers across the globe -- and in a variety of use cases. Read about how this technology can optimize resources and improve crop yield.
-
Enterprise applications of AI Get Started
Weighing quantum AI's business potential
Quantum AI has the potential to revolutionize business computing, but logistic complexities create sizeable obstacles for near-term adoption and success.
IoT Basics
-
Get Started
5 embedded system terms IoT admins must know
IoT devices require technology to bring software, hardware and signal processing components together. Embedded systems combine these three elements to streamline IoT product design.
-
Get Started
Get acquainted with the types of actuators in IoT
Actuators are an essential hardware component of IoT products. Familiarize yourself with how actuators work, the different types of energy sources and the use cases for them.
-
Get Started
man-in-the-middle attack
A man-in-the-middle (MiTM) attack is a type of cyber attack in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.
-
News
View All -
Enterprise Internet of Things
Cisco updates IoT management, go-to-market private 5G plans
Cisco has updated the IoT Control Center to support low-cost, low-bandwidth IoT. The company also released details for its private 5G go-to-market strategy.
-
Internet of Things security
Ripple20 vulnerabilities affect millions of IoT devices
Organizations that use IoT devices at risk from the Ripple20 vulnerabilities must secure them through patching, network segmentation and zero trust.
-
Internet of Things security
Nozomi Networks unveils free cybersecurity platform edition
The free edition is aimed at helping OT operators and IT security teams take the first step to finding the organization's assets that they need to secure within their OT and IoT networks.
IoT Agenda Definitions
- man-in-the-middle attack (MitM)
- artificial intelligence of things (AIoT)
- IoT security (internet of things security)
- IoT gateway