IOT CATEGORIES
MOST POPULAR TAGS

COMMERCIAL IOT


This interview was from the gogoNET LIVE! 4 conference. Joachim keynoted with the presentation, “IoT needs IP and IPv6 will drive IoT”, making the argument that for IoT to grow and reach its full potential it has to move away from proprietary siloed technologies and rest on IPv6.
Watch this video (or read the transcript) to hear Joachim Lindborg’s perspective on how he believes IPv6 will be the killer app in the connected home by enabling interconnectivity between all devices ...




Episode 17

Because of the technology and data available, the biggest and most interesting challenge in designing an IoT product is to make it feel more like a service or experience, than a piece of hardware. Only after you understand the customer and what the opportunities really are can product design begin.
Listen to this podcast (or read the transcript) with Gordon Hui to get an uber designer’s perspective on how to find that ideal product experience and the business that must be developed to support it ...


Timeslotted Channel Hopping (TSCH), via IEEE 802.15.4e, is an emerging standard in industrial automation and process control (via Wireless HART and ISA 100.11a) that defines a communication schedule between neighbor nodes in Low-power and Lossy Networks (LLNs). In an effort to bridge the worlds of operational technology (OT) with information technology (IT), the 6TSCH working group has been established to define how to use IPv6 over the 15.4e.
Watch this video (or read the transcript) to hear Xavi Villajosana explain how 15.4e operates and what’s still missing in the complete OT/IT stack ...




Episode 16

When starting down the path toward your IoT product, it’s tempting to jump into the tech and get started with your PoC… but don’t fall into that trap. Of course there are benefits to getting the minimally viable product out the door but these benefits don’t go away if you back up first and start with a business strategy and defined user experience – in fact they’re accelerated when you have a clear path from the start.
Listen to this podcast (or read the transcript) with Erik Ljung about the importance of starting at the top when beginning your product design process ...


Internet of Things enterprise security needs to be approached holistically across the IoT cloud, network and end devices. Make security part of the plan from the start of the project. Divide responsibilities among the internal team and external partners and hold everyone accountable. Just a few pieces of advice from this video.
Watch this video (or read the transcript) to hear Justin Buchanan’s top 3 enterprise security risks today ...




Episode 15

Getting an IoT project off the ground isn’t easy. It’s not just about launching a new product based on new technology, it’s the changes the organization must make to reach escape velocity.
Listen to this podcast (or read the transcript) with Asaf Sadowski about the importance of creating an IoT proof of concept and the steps involved to get there ...


The biggest shift for traditional companies becoming IoT companies is transitioning into an Information Technology company. IoT technology isn’t plug ‘n’ play but it can be built. More difficult is changing a company’s culture to revolve around the information.
Watch this video (or read the transcript) for a primer on big data and the interplay between analytics, databases and cloud services ...




Episode 14

After going through each of the major consortia, we are heading back to tech, but not as deep a dive as usual. Having left the edge behind, we are now moving on to the network fabric that holds everything together.
Listen to this podcast (or read the transcript) with Bryan Kester of SeeControl, Steve Jennis of PrismTech, Justin Buchanan of Cisco and Brandon Harris of Electric Imp as we talk about some of the most important issues surrounding IoT Platforms today ...


Although these are still early days in IoT deployments, the benefits of fog computing are already coming into focus. As deployment scale goes up, so too does the amount of data captured and the volume can quickly become overwhelming. Depending on the scale, running security, local analytics and data optimization closer to the sensors can be beneficial.
Watch this video (or read the transcript) to get an overview on fog computing ...