Accelerating the Industrial Internet of Things
Log In
Number of Case Studies252
5 Myths About IoT Analytics
5 Myths About IoT Analytics
Splunk Partnership Ties Together Big Data & IoT Services
Splunk Partnership Ties Together Big Data & IoT Services
Splunk was faced with the need to meet emerging customer demands for interfacing IoT projects to its suite of services. The company required an IoT partner that would be able to easily and quickly integrate with its Splunk Enterprise platform, rather than allocating development resources and time to building out an IoT interface and application platform.
An IoT Software Suite to Connect Products to Customers' Business
An IoT Software Suite to Connect Products to Customers' Business
Solair started in Italy in 2011 with the observation that enterprise software severely lagged behind consumer software in affordability and simplicity. They have worked with customers in many industries including smart cities, manufacturing, industrial machinery and retail. Solair has recently begun to expand to do business mainly in Japan, Germany and the United States.“There are still many companies that don’t completely understand how to benefit from the potential advantages of connected products and they are looking for ready to use solutions that are quick to implement and bring measurable economic results,” said Martina Casani, Marketing Director, Solair. With a background in enterprise software, Solair now focuses on addressing business needs through end-to-end IoT solutions including an IoT Platform, a suite of IoT software modules and an IoT Gateway. “We started on the software side of IoT, but our customers were asking us for help on the hardware side,” said Casani. “We began to integrate an IoT Gateway in addition to software to help our customers from start to finish as they build an IoT application that collects data from the edge and brings it to the cloud.”
Number of Hardware16
IoT Gateway: ARK-2120L
IoT Gateway: ARK-2120L
GROOV-AR1-BASE - IoT & Operator Interface
GROOV-AR1-BASE - IoT & Operator Interface
The groov Box edge appliance (groov) is Opto 22’s Internet of Things (IoT) and operator interface appliance that provides visualization, data handling, and connectivity to automation systems, software, databases, and devices of all kinds—all in a compact, industrially hardened box suited to the edge of the network.
IoT LoRaWAN Transceiver- SiP Module
IoT LoRaWAN Transceiver- SiP Module
AcSiP CW1276SL-915 transceivers feature the LoRaTM long range modem that provides ultra-long range spread spectrum communication and high interference immunity whilst minimizing current consumption.
Number of Software184
VeriFlux
VeriFlux
VeriFlux is an automatic static code analysis tool for use in complete applications, as well as custom program parts. Nothing needs to be changed in the application to carry out the analysis. Error sources such as run-time errors or thread-related errors are highlighted in the source code.Early detection of bugs at the source code level reduces the need for dynamic testing, and helps prevent bugs from making it into the field, resulting in a substantial reduction in development costs and time.
People Power IoT Suite
A comprehensive IoT solution for service providers and manufacturers.The People Power IoT Suite enables rapid connection, engagement, delivery and management of IoT projects for forward-thinking business partners who understand the opportunity of delivering connected lifestyle improvements to their customers.
MIx Core
MIx Core
MIx Core provides a comprehensive end-to-end approach to data integration – an approach that is purpose-built for the IIoT. The platform leverages methodology and algorithms applied in a highly structured manner to automate the data integration process.
Number of Suppliers614
Collabera TACT | Certification & Trainings
Collabera TACT – Technology Academy for Competency Training is an initiative started by Collabera, a $550 mn U.S. based IT Staff Augmentation Company. It aims at providing training to qualifying professionals and students on emerging technologies like Big Data, Analytics, Cloud, Mobility, Digital Marketing and many more. It has been established to bridge the demand-supply gap of professionals on SMAC technologies and aims at upgrading individual’s skills and making them future-ready for jobs that will require them to be well versed with the emerging technologies.
ZKS IOT
Minsait IoT Sofia2 (Indra)
Minsait IoT Sofia2 (Indra)
Number of Organizations32
Eclipse IoT
Eclipse IoT
Eclipse IoT provides a set of services and frameworks that application developers can use for building M2M and IoT applications. These services will enable features such as device management, wired/wireless communication, and vertical solutions.The Eclipse IoT Working Group is a collaboration of industry and academic partners who are building a set of open source technology that will be the foundation for the Internet of Things (IoT). The focus of the collaboration is on building:1) open source implementations of IoT standards and protocols, 2) open source frameworks and services that will be used by IoT solutions, and 3) tools for IoT developers. The iot.eclipse.org web site is intended to be the source of information for people who want to use the Eclipse IoT technology.
Techstars IoT
Techstars IoT
Techstars is excited to announce a new accelerator program focused on the IoT (Internet of Things) market. The program will bring industry leaders in the IoT market together with the most innovative emerging startups in the industry for our three month, mentorship-driven accelerator program. The Techstars IoT program is located in NYC.
HyperCat
HyperCat
The Hypercat Consortium aims to create an inclusive one-stop shop of best practice IoT implementation through the sharing of knowledge of processes and applications. The Hypercat Consortium supports adoption of IoT technologies by: - Developing a new standard for secure IoT interoperability. - Exposing information about IoT assets over the web.- Helping innovators turn ideas into global businesses.
Number of Use Cases16
Tamper Detection
Tamper Detection
Tamper detection is the ability of a device to sense that an active attempt to compromise the device integrity or the data associated with the device is in progress; the detection of the threat may enable the device to initiate appropriate defensive actions. The tamper detection design can be implemented to sense different types, techniques, and sophistication of tampering, depending on the perceived threats and risks. The methods used for tamper detection are typically designed as a suite of sensors each specialized on a single threat type, some of which may be physical penetration, hot or cold temperature extremes, input voltage variations, input frequency variations, x-rays, and gamma rays. Examples of techniques used to detect tampering may include any or all of the following: switches to detect the opening of doors or access covers, etc. Many IoT devices use WiFi for communication and Channel State Information (CSI) based tamper detection is a valid option. Each 802.11n WiFi frame contains a preamble allows a receiver to estimate the impact of the wireless channel, the transmitter and the receiver on the signal. The estimation result - the CSI - is used by a receiver to extract the transmitted information. However, as the CSI depends on the communication environment and the transmitter hardware, it can be used as well for security purposes. It is through this channel that IoT can be utilized to prevent device tampering. The utility of this technology goes without saying; preventing the theft or damage of assets is obviously critical, and businesses should take appropriate steps to ensure that their assets remain is good condition. Benefits: -OT CAPEX Reduction -IT CAPEX Reduction -OPEX Reduction
Security Claims Evaluation
Security Claims Evaluation
Security Claims Evaluation is an open and easily configurable cybersecurity platform for the evaluation of endpoint, gateway, and other networked components’ security capabilities.In an industrial environment setting, monitoring of sensors provides a window into system and operational efficiencies. Specifically, monitoring key parameters such as temperature, vibration, currents and voltage provide the operator with insights into whether operations are normal, within normal failure mode, or whether there is indication of a cybersecurity / security breach.Security Claims Evaluation provides a platform for users to evaluate whether data from the sensors under test is indicative of normal operation or abnormal operation in a non-invasive and non-intrusive manner. Furthermore, using machine learning in combination with real-time analytics capabilities, the sensor operation can be monitored and analyzed 24/7. Logging of abnormal events can be performed for further assessment and future remediation actions. Through running a pre-defined security test suite that encompasses pen testing, known vulnerabilities and other testing methodologies, testbed users’ security claims can be evaluated at a single or multiple connection points – encompassing an endpoint to gateway to cloud assessment. A report based on the test results can be provided to users describing potential security weaknesses and proposed recommendations and remediation methods.
Predictive Maintenance (PdM)
Predictive Maintenance (PdM)
The aim of predictive maintenance (PdM) is first to predict when equipment failure might occur, and secondly, to prevent the occurrence of the failure by performing maintenance. Monitoring for future failure allows maintenance to be planned before the failure occurs. Ideally, predictive maintenance allows the maintenance frequency to be as low as possible to prevent unplanned reactive maintenance, without incurring costs associated with doing too much preventive maintenance.Predictive maintenance uses condition-monitoring equipment to evaluate an asset’s performance in real-time. A key element in this process is the Internet of Things (IoT). IoT allows for different assets and systems to connect, work together, and share, analyze and action data. 
Number of Terms92
deviceWISE IoT Platform for Factories
deviceWISE IoT Platform for Factories
An IoT platform for factories developed by TELIT.
Windows 10 IoT Core
Windows 10 IoT Core
An embedded windows controller for IoT developed by Microsoft.
IoT Security
IoT Security
IoT security is the area of endeavor concerned with safeguarding connected devices and networks in the Internet of things.
252 Case Studies
16 Hardware
184 Software
614 Suppliers
208 Events
32 Organizations
16 Use Cases
92 Terms
532 Guides
test test