IoT Agenda:

IoT applications


December 13, 2018  2:53 PM

Car lot operators benefit from IoT device that locates cars without a search party

Alex Koepsel Alex Koepsel Profile: Alex Koepsel
Asset management, asset tracking, Internet of Things, inventory tracking, iot, IoT applications, IoT devices, IoT hardware, IoT software, IoT wireless

Until recently, if a car dealer, auctioneer or manufacturer needed to find a car on their property for transport, test drives or sales, someone had the daunting task of figuring out where the car was located. Seems simple, yet many of these campuses encompass multiple lots and decks across hundreds...

December 12, 2018  2:55 PM

No smart security without IoT protocols

Ohad Amir Ohad Amir Profile: Ohad Amir
device interoperability, Internet of Things, iot, IoT applications, IoT cybersecurity, IoT devices, IoT protocols, Protocols, smart home

Modern smart home security owes much of its success to advances in IoT protocols. These communication channels enhance interoperability and enable thousands of devices to "speak" and interact with each other -- a critical requirement for any smart system. The adoption of a


December 11, 2018  4:01 PM

IoT cybersecurity: A major concern for agriculture

Karina Popova Profile: Karina Popova
farms, Internet of Things, iot, IoT applications, IoT devices, iot security, precision farming, smart farming, smartag

During the few last years, people have been creating complex connected machines. The whole network of IoT reveals incredible opportunities, but at the same time, we have been informed about negligence in IoT cybersecurity.

New technology = new IoT cybersecurity

Whenever you


December 11, 2018  12:05 PM

5G to provide advanced connectivity for fourth Industrial Revolution

Vicki Livingston Profile: Vicki Livingston
3GPP, 5G, 5G and IoT, 5G applications, 5G security, 5G technology, fourth Industrial Revolution, IIoT, Industrial IoT, Industry 4.0, Internet of Things, iot, IoT applications, IoT communications, IoT connectivity, iot security, IoT wireless, LTE, smart manufacturing

The rationale for the development of the fifth generation of mobile communications (5G) was not only to expand the broadband capabilities of mobile networks, but unlike previous communications technology generations (2G, 3G and 4G LTE), also to provide advanced wireless connectivity for a wide...


December 10, 2018  12:58 PM

Pros and cons of connecting industrial sites to the cloud

Scott Berg Profile: Scott Berg
cloud access, Cloud Security, IIoT, IIoT cloud, IIoT data, Industrial IoT, Internet of Things, IoT applications, IoT cloud, Private Cloud, Public Cloud

Scott Berg is the chief executive officer of ServiceMax, an operating unit of GE Digital. In his daily work, Scott and his team receive questions from customers around implementing industrial and manufacturing IoT systems. This column serves to share some of those questions from the field and...


December 6, 2018  1:31 PM

How rapid experimentation can improve IoT in insurance

Nick Ford Profile: Nick Ford
"car insurance", Insurance, insurance industry, insurers, Internet of Things, iot, IoT applications, IoT in insurance, IoT services, IoT verticals, rapid experimentation, telematics

As one of the world's oldest industries, insurance is often seen as a traditional or even old-fashioned industry. But insurance is one of the many industries that is being redefined by IoT. But insurers need a shift in mindset if they want to advance into the modern era and stay relevant to their...


December 5, 2018  10:23 AM

Building the predictive maintenance 4.0 era with cognitive-first models

Ruban Phukan Profile: Ruban Phukan
anomaly detection, Artificial intelligence, Cognitive computing, cognitive machine learning, Data Analytics, Data Science, Enterprise IoT, Internet of Things, iot, IoT analytics, IoT applications, IoT verticals, Machine learning, Predictive maintenance

Predictive maintenance has come a long way since the '90s. Over the past decade, IIoT and the evolution of analyzing sensor information has pushed organizations to look at new ways to use data to understand machine health. A new wave of data sets is being generated by and collected through a new...


December 3, 2018  3:17 PM

New business opportunities for using WebRTC and IoT

Serge Koba Profile: Serge Koba
augmented reality, Authentication, Consumer IoT, Enterprise IoT, IIoT security, Industrial IoT, Internet of Things, Interoperability, iot, IoT applications, IoT data, iot security, WebRTC, WebRTC applications

By the year 2020, Gartner projects that devices connected to the internet of things will surpass 20 billion. IoT devices are increasingly being used as smart household devices, beacons and wearables, and in industrial applications. Businesses are discovering new opportunities to engage their...


December 3, 2018  12:42 PM

Commercial IoT environments require shared edge infrastructure

Justin Rigling Profile: Justin Rigling
Edge computing, Internet of Things, iot, IoT applications, IoT data, IoT design, IoT edge, IoT hardware, IoT infrastructure, iot security, IoT software, IoT strategy, Silo, siloes

As enterprises continue to implement IoT for customer experiences, smart building systems, automation and more, we see that the workflow from the sensor to the cloud often exists within its own, individual silo. The result of this is that many businesses today are operating multiple, siloed, IoT...


November 29, 2018  10:54 AM

How will decentralized apps influence the future of IoT?

Juned Ghanchi Profile: Juned Ghanchi
Blockchain, dApps, decentralized applications, Internet of Things, iot, IoT applications, IoT connectivity, IoT interoperability, iot security

IoT is here to stay, and the influence is already visible across the spectrum thanks to an array of gadgets and powerful applications. But as a whole, IoT has remained mostly disjointed, scattered and multifaceted without a strong protocol ruling it entirely. This is why so-called


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: