The moment you switch on a device, the expectation is there is absolutely no lag in display and output. Is this too much to ask for? Not anymore say experts. Many engineering companies, spending their valuable time and resources to develop solutions with shorter bootup time. With IoT being the center of all operations and various devices being operated simultaneously by one person at any given point of time, it becomes all the more imperative that all the devices and thus all the systems boot together and faster.

Read More

When the first publicly available web page was accessed on August 23, 1991, Tim Burners Lee’s greatest contribution to mankind triggered an avalanche of possibilities which after 26 years has become an indispensable part of our lives. Internet can be a synonym for connectivity but nothing justifies that proposition as much as Internet of Things (IoT).

Read More

Designing products and services to be frictionless will lead to more compelling user experiences and greater affinity with the customer. For example, biometric chip in Apple iPhone helps establish seamless user identity & trust to unlock screen, make one-step secure payment to buy apps from app store etc. In this case, there is a 1:1 relationship between user-device and manufacturer of a device enabling frictionless experience for user. But it is not the same in the case of an upscale hotel that has IoT devices (smart bulbs, digital key locks, smart thermostat, connected vending machines etc.) to enhance guest experience i.e., hotel first needs to secure different manufacturer’s IoT devices procured & installed in its premises and rooms. Then establish a temporary trust relationship between guest checking into the hotel & devices in room and when guest checks out remove the temporary trust established at the time of check-in to avoid misuse of devices by guests etc.

Read More

The S of IoT networks
The assumption about big data analytics is that if you capture more data and analyze, the more accurate your results will be. But it doesn’t matter how big your data volume is and how optimized and efficient your analytics algorithms are, if the analyzed data is inaccurate from the sources, then it will surely result into inaccurate analytics.

Read More

Smarter, cheaper and always-on devices keep us connected. This includes everything from tiny, low-power sensors to video cameras, actuators and industrial machinery. The sensors and microchips that define Internet of Things (IoT) capture, monitor and share myriad types of data. As the numbers of these smart sensors increase, the amount of information they produce explodes.

Read More

An eventful week
There has been a lot of security news in the couple of weeks between the RSA Conference in San Francisco and Mobile World Congress in Barcelona. First, Google Security revealed a practical approach for generating collisions for the hashing algorithm SHA-1. While long considered vulnerable, SHA-1 has now been rendered all but useless. Second, security vulnerabilities reportedly cost Super Micro Computer to lose Apple as a client, leading to an 8% drop in the company’s market value. And third, the disclosure of a bug in CloudFlare’s services rendered consumers of web-based services from Uber, OkCupid and other companies potentially vulnerable.

Read More