April 27, 2017 Sponsored by:
A strong foundation of hardware assisted security capabilities can be found below the OS in the hardware security layer which is shipped with each device processor. IoT presents a new set of demands where M2M or remote IoT management platforms need to attest software and identity running on the device. In this presentation, Intel delivers an overview of the core platform security capabilities and usage models for securing the IoT.
March 16, 2017 Sponsored by:
The energy market is undergoing a major transformation. In addition to growing demand, the world is moving away from the use of centrally generated nuclear and fossil fuel electricity and towards the use of distributed renewable energy resources, including solar, hydro, and wind.
Attend this webinar to learn how IoT can help utilities and energy stakeholders coordinate analysis and action among diverse grid devices and energy production equipment, as well as monitor and solve problems on the grid in real time.
December 15, 2016 Sponsored by:
Smart, connected devices are all the rage when it comes to IoT. Research firm Gartner says there will be 6.4 billion connected devices in use in 2016, an increase of 30% from 2015. As more components of your IoT infrastructure becomes connected, the demand for a solution that protects manufacturers and their end-customers from hackers, malware, and unsafe operations continues to increase. So how will you secure your existing IoT devices and prepare your infrastructure for the double-digit increases that are occurring year-over-year?
November 17, 2016 Sponsored by:
It’s becoming easier than ever to integrate higher-end satellite connectivity with cellular and other technologies, and in doing so, to instantly increase the footprint and reliability of your connectivity solution many fold. At the same time, new service offerings not only allow for improved data analytics, but also bring service prices down. Some analysts predict that the number of satellite-based connections for IoT will increase by 80% between 2016 and 2023, with much of the growth coming from cargo and transportation applications. Here’s what you need to know about space-based supply-chain management, and how it can help you business.
14 July, 2016 Sponsored by:
IoT has been dubbed the next tech revolution with the potential for over 100 billion connected objects in the next 4 years. Going from 100 to 10,000 to 100 billion connected devices in the field involves significant planning, however understanding the IoT stack that is best suited to fit mass deployment isn't always clear given the IoT market is still maturing. This webinar will provide today's IoT adopters with an IoT planning checklist to enable quick scale quickly and ease of deployment.
30 June, 2016 Sponsored by:
It’s becoming easier than ever to integrate higher-end satellite connectivity with cellular and other technologies, and in doing so, to instantly increase the footprint and reliability of your connectivity solution many fold. At the same time, new service offerings not only allow for improved data analytics, but also bring service prices down. Some analysts predict that the number of satellite-based connections for IoT will increase by 80% between 2016 and 2023. Here is how satellite can help your business.
28 April, 2016 Sponsored by:
An explosion in applications for RFID and telemetry has made cold-chain management, fleet management, and asset tracking commonplace. Now these basic technologies are being combined with Big Data analytics to give rise to supply mega-chains and direct-to-customer fulfillment. This webinar will highlight IoT/M2M case studies that stress ROI and other KPI’s to illustrate the state-of-the art in supply chain management.
28 January, 2016 | 11:00 AM EST | (16:00 GMT)
This webinar will cover the deployment of IoT/M2M technology in the plethora of applications commonly referred to as the Smart Grid, including…
- The home as gateway – integrating smart devices, including EVs with DC fast-charging.
- Demand Response encompassing distributed energy resources, cost recovery, energy storage, and renewables.
- Getting vulnerable, low-income consumers onto the grid.
- Updates on grid stability/security and the regulatory framework.
16 December, 2015 | 11:00 AM EST | (New York, GMT-05:00)
As more and more devices are connected, threats to data and cyber attacks are becoming more prevalent. This one hour webinar will provide an advanced discussion on key security topics for M2M and IoT programs. The speakers will also provide the necessary guidelines to assess your vulnerabilities and what you must to do protect your information. Topics covered include:
- The "risk points" for M2M and IoT applications.
- Unique security issues for M2M and IoT programs.
- How to assess what is "secure enough" for your M2M or IoT application.
- Understanding what you can and cannot secure and at what cost.
- How to plan for the future in terms of scaling and longevity of your program
19 NOVEMBER 2015 | 11:00 AM EST | (New York, GMT-05:00)
This webinar covered the cutting-edge issues surrounding systems implementation for IoT, including…
The Edge: the mass deployment of sensors (sensorization) has given birth to predictive analytics, sometimes known as “Pattern of Life” (PoL) analysis, which gather data on past and current performance of machines to predict future behavior.
The Cloud and Backbone: use of software as a service has greatly reduced – but not eliminated – the need for on-site IT resources. How can the Cloud alleviate computing needs at the edge, and how does data produced from devices tie into ERP and other backbone systems?
Buy vs. Build: there are M2M/IoT platforms available in shrink-wrap (figuratively) that are designed for specific vertical-market applications, and there is no doubt that, in the right circumstances, they can reduce costs and time-to-market, but are there drawbacks?