ipv6 linksys router

Sengled Partners with Baidu to Introduce China’s First Voice-Activated Smart Lamp Speaker

By IoT – Internet of Things

Sengled is partnering with leading AI company, Baidu, to introduce the Sengled Smart Lamp Speaker, a new voice-enabled lighting concept. Both companies will showcase Sengled Smart Lamp Speaker at the annual CES in Las Vegas, NV, January 9-12, 2018, with the official reveal commencing at the Baidu World @ Las Vegas on January 8, 2018. The […]

The post Sengled Partners with Baidu to Introduce China’s First Voice-Activated Smart Lamp Speaker appeared first on IoT – Internet of Things.

Read more here:: iot.do/feed

Major Breakthroughs in Smart Devices and IoT from Taiwan to be Unveiled at CES 2018

By IoT – Internet of Things

CesKicking the new year off with a bang, the Taiwan External Trade Development Council (TAITRA), Taiwan’s foremost trade promotion organization, will provide a first look at brand new “smart” innovations from ITRI, AEON Motor, GEOSAT, Robotelf, and Taiwan Main Orthopedics at a January 8 press conference at CES 2018. The companies will showcase products poised […]

The post Major Breakthroughs in Smart Devices and IoT from Taiwan to be Unveiled at CES 2018 appeared first on IoT – Internet of Things.

Read more here:: iot.do/feed

Predicting the maintenance

By Zenobia Hegde

It happens at the worst of times – late for a meeting, on the way to the rugby and even when you’re desperate for the bathroom. When your car breaks down, you can moan in retrospect, acknowledging the signs that it needed urgent maintenance. Thanks to technology, more specifically the evolution and application of cognitive learning, these frustrating occurrences will become a thing of the past.

Connecting the things

Analyst house Gartner forecasts that there will be 20.8 billion connected ‘things’ worldwide by 2020. Enterprises that stick to an old ‘preventive’ data methodology, says Mark Armstrong, managing director and vice-president International Operations, EMEA & APJ at Progress, are going to be left behind, as this approach accounts for a mere 20% of failures.

Predictive maintenance brings a proactive and resource saving opportunity. Predictive software can alert the manufacturer or user when equipment failure is imminent, but also carry out the maintenance process automatically ahead of time. This is calculated based on real time data, via metrics including pressure, noise, temperature, lubrication and corrosion to name a few.

Considering degradation patterns to illustrate the wear and tear of the vehicle in question, the production process is not subject to as high levels of interruption without the technology. By monitoring systems ‘as live’, breakdowns can be avoided prior to them happening.

It’s no longer a technological fantasy. Due to data in cars being collected for decades, researchers and manufacturers can gather insights that could be used to prepare predictive analytics. This will assist in predicting which individual cars will break down and need maintenance.

Now that the Internet of Things (IoT) is a reality, car manufacturers can use this information to offer timely and relevant additional customer services based on sophisticated software that can truly interrogate, interpret and use data. So who is going to be responsible for taking advantage of this technology?

Bolts and screws

Key management figures in the transport industry must commit to a maintenance management approach to implement a long-term technological solution. As described by R.Mobley, run-to-failure management sees an organisation refrain from spending money in advance, only reacting to machine or system failure. This reactive method may result in high overtime labour costs, high machine downtime and low productivity.

Similarly reactive, preventive maintenance monitors the mean-time-to-failure (MTTF), based on the principle that new equipment will be at its most vulnerable during the first few weeks of operation, as well as the longer it is used for. This can manifest itself in various guises, such as engine lubrication or major structural adjustments. However, predicting the time frame in which a machine will need to be reconditioned may be unnecessary and costly.

As an alternative option, predictive maintenance allows proactivity, ensuring lengthier time between scheduled repairs, whilst reducing the significant amount of crises that will have to be addressed due to mechanical faults. With a cognitive predictive model, meaning applications are able to teach themselves as they function, organisations will be able to foresee exactly why and when a machine will break down, allowing them to act […]

The post Predicting the maintenance appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Cloud Competition Intensifies – Rapid Growth Ahead for Microsoft Azure and Google Cloud Platform

By A.R. Guess

by Angela Guess According to a recent press release, “A new LogicMonitor® survey of nearly 300 industry influencers predicts that enterprises will migrate the majority of their IT workloads from the data center to the cloud by 2020. Fueling this transition will be the 20.8 billion IoT devices Gartner predicts will come online, and the […]

The post Cloud Competition Intensifies – Rapid Growth Ahead for Microsoft Azure and Google Cloud Platform appeared first on DATAVERSITY.

Read more here:: www.dataversity.net/feed/

Face authentication and the future of security

By Zenobia Hegde

Apple’s iPhone X has given us a glimpse into the future of personal data security. By 2020 we’ll see billions of smart devices being used as mobile face authentication systems, albeit with varying degrees of security. The stuff of science fiction for years, face recognition will surpass other legacy biometric login solutions,such as fingerprint and iris scans, because of a new generation of AI-driven algorithms, says Kevin Alan Tussy, CEO of FaceTec.

The face recognition space had never received more attention than after the launch of Face ID, but with the internet now home to dozens of spoof videos fooling Face ID with twins, relatives and even olives for eyes, the expensive hardware solution has left many questioning if this is just another missed opportunity to replace passwords.

Face Recognition is a biometric method of identifying an authorised user by comparing the user’s face to the biometric data stored in the original enrolment. Once a positive match is made and the user’s liveness is confirmed the system grants account access.

A step up in security, Face Authentication (Identification + Liveness Detection), offers important and distinct security benefits: no PIN or password memorisation is required, there is no shared secret that can be stolen from a server, and the certainty the correct user is logging in is very high.

Apple’s embrace of Face ID has elevated face recognition into the public consciousness, and when compared to mobile fingerprint recognition, face recognition is far superior in terms of accuracy. According to Apple, their new face scanning technology is 20-times more secure than the fingerprint recognition currently used in the iPhone 8 (Touch ID) and Samsung S8. Using your face to unlock your phone is, of course, a great step forward, but is that all a face biometric can do? Not by a long shot.

While the goal of every new biometric has been to replace passwords, none have succeeded because most rely on special hardware that lacks liveness detection. Liveness detection, the key attribute of Authentication, verifies the correct user is actually present and alive at the time of login.

True 3D face authentication requires: identity verification plus depth sensing plus liveness detection. This means photos or videos cannot spoof the system, nor animated images like those created by CrazyTalk; and even 3D representations of a user like projections on foam heads, custom masks, and wax figures are rebuffed.

With the average price of a smartphone hovering around £150 (€170.58), expensive hardware-based solutions, no matter how good they get, won’t ever see widespread adoption. For a face authentication solution to be universally adopted it must be a 100% software solution that runs on the billions of devices with standard cameras that are already in use, and it must be be more secure than current legacy options (like fingerprint and 2D face).

A software solution like ZoOm from FaceTec can be quickly and easily integrated into nearly any app on just about any existing smart device. ZoOm can be deployed to millions of mobile users literally overnight, and provides […]

The post Face authentication and the future of security appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Information Builders helps companies leverage blockchain’s potential with launch of iWay 8

By Zenobia Hegde

At Blockchain Expo North America, Information Builders, a provider in business intelligence (BI), analytics, and data management solutions, announced the launch of iWay 8, its suite of solutions for data application creation and business-to-business (B2B) integration.

The latest version enhances usability, facilitates IoT data for big data insights, and offers integrated support for permissioned blockchain applications, enabling companies to speed up implementations and capitalise on the technology’s potential.

The launch of iWay 8 includes a new version of iWay Service Manager (iSM), which provides support for permissioned blockchain applications, enabling organisations to efficiently realise the benefits of blockchain. The technology lays the foundation for a quickly deployable, easily maintainable, service- and event-oriented blockchain architecture, as well as a mechanism to make configuration more intuitive.

iSM can acquire messages from external entities, existing applications, or other sources, process them and share the results into another application through Information Builders’ blockchain integration.

Unique blockchain benefits include:

Reduced development time and cost by incorporating iSM into the blockchain workflow
Integration with peers on the network and the ability to transfer posts and queries between peers and iSM
Enhanced workflow process visibility with real-time exchange of events and documents

In addition, when coupled with Information Builders’ WebFOCUS BI and analytics platform, iWay simplifies and accelerates the integration of enterprise blockchain applications, allowing companies to act on information more effectively.

Along with blockchain support, iWay 8 offers new functionality for integrating IoT and big data and making this information available for consumption and analytics. With data management technology that natively ingests, cleanses, unifies, and integrates big data from IoT, the solutions ensure high-quality data that users can quickly act on to drive the business forward.

Additional features of iWay 8 include:

Intuitive design time: A modern and user-friendly design time environment that expedites development and enhances usability
Collaborative team development: Multiple team members can collaborate on application development, regardless of physical location, while ensuring the integrity and control of the artifacts
Microservices: iWay provides all the capabilities companies need to support a microservices architecture, enabling them to reduce costs and increase agility

Gerald Cohen, president and CEO, Information Builders, said: “iWay 8 provides the functionality organizations need to make large amounts of information available for consumption and analytics – a critical capability given the growing volume of data generated on a daily basis.

Its modern, user-friendly design time environment and collaboration features empower users to be more efficient and effective and reduce the time involved in turning raw data into insights. These capabilities, paired with iWay’s blockchain support, position companies for success as we enter the next frontier of information management.”

Visit our website for more information on how iWay handles blockchain integration.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Information Builders helps companies leverage blockchain’s potential with launch of iWay 8 appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Wuxi DSP Technologies will officially release China’s first Internet of Things (IoT) embedded artificial intelligence (AI) chip

By IoT – Internet of Things

The “2018 IoT and Embedded AI Chip Platform and Eco Strategy Conference” will be held on December 8, 2017 at Intercontinental Hotel Beijing Beichen as one of the sub-forums at the “2017 IoT Developers Conference”. As the leading provider of IoT chipset platforms, Wuxi DSP Technologies will release its latest IoT embedded AI chip at […]

The post Wuxi DSP Technologies will officially release China’s first Internet of Things (IoT) embedded artificial intelligence (AI) chip appeared first on IoT – Internet of Things.

Read more here:: iot.do/feed

Information Builders launches iWay 8 to help companies harness blockchain potential

By Zenobia Hegde

At Blockchain Expo North America, Information Builders, a provider in business intelligence (BI), analytics, and data management solutions, announced the launch of iWay 8, its suite of solutions for data application creation and business-to-business (B2B) integration.

The latest version enhances usability, facilitates IoT data for big data insights, and offers integrated support for permissioned blockchain applications, enabling companies to speed up implementations and capitalise on the technology’s potential.

The launch of iWay 8 includes a new version of iWay Service Manager (iSM), which provides support for permissioned blockchain applications, enabling organisations to efficiently realise the benefits of blockchain. The technology lays the foundation for a quickly deployable, easily maintainable, service- and event-oriented blockchain architecture, as well as a mechanism to make configuration more intuitive. iSM can acquire messages from external entities, existing applications, or other sources, process them and share the results into another application through Information Builders’ blockchain integration.

Unique blockchain benefits include:

Reduced development time and cost by incorporating iSM into the blockchain workflow
Integration with peers on the network and the ability to transfer posts and queries between peers and iSM
Enhanced workflow process visibility with real-time exchange of events and documents

In addition, when coupled with Information Builders’ WebFOCUS BI and analytics platform, iWay simplifies and accelerates the integration of enterprise blockchain applications, allowing companies to act on information more effectively.

Along with blockchain support, iWay 8 offers new functionality for integrating IoT and big data and making this information available for consumption and analytics. With data management technology that natively ingests, cleanses, unifies, and integrates big data from IoT, the solutions ensure high-quality data that users can quickly act on to drive the business forward.

Additional features of iWay 8 include:

Intuitive design time: A modern and user-friendly design time environment that expedites development and enhances usability
Collaborative team development: Multiple team members can collaborate on application development, regardless of physical location, while ensuring the integrity and control of the artifacts
Microservices: iWay provides all the capabilities companies need to support a microservices architecture, enabling them to reduce costs and increase agility

Gerald Cohen, president and CEO, Information Builders said, “iWay 8 provides the functionality organisations need to make large amounts of information available for consumption and analytics – a critical capability given the growing volume of data generated on a daily basis.

Its modern, user-friendly design time environment and collaboration features empower users to be more efficient and effective and reduce the time involved in turning raw data into insights. These capabilities, paired with iWay’s blockchain support, position companies for success as we enter the next frontier of information management.”

Visit our website for more information on how iWay handles blockchain integration.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Information Builders launches iWay 8 to help companies harness blockchain potential appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

How to handle the vanishing radio spectrum: Share frequencies

By Patrick Nelson

With the billions of Internet of Things (IoT) devices projected to come on-stream over the next few years, questions are arising as to just where the bandwidth and radio channels are going to come from to make it all work.

The sensors need to send their likely increasingly voluminous data back to networks wirelessly to be processed.

But there’s a finite amount of radio spectrum available, and much of it is already allocated to incumbent primary users, such as public safety agencies. Other spectrum is dedicated to mobile network operators who have licensed chunks of it. Some is leftover in the millimeter frequencies, which is thus far pretty much untested in the real world — it’s going to be used for 5G in the future.

To read this article in full, please click here

Read more here:: www.networkworld.com/category/lan-wan/index.rss

With Amazon Key’s launch, customers and lawyers have lots of questions

By Cyrus Farivar

Enlarge / IoT products like Amazon Key come with a whole set of risks that consumers aren’t equipped to assess themselves. (credit: Amazon)

Last week, Amazon announced a new voluntary service that allows its own contracted delivery personnel to temporarily access customers’ homes through a new service dubbed “Amazon Key” which begins Wednesday, November 8.

Privacy experts wonder what kind of avenue putting such a camera in the home could mean for law enforcement, particularly given last year’s episode when Amazon refused to help law enforcement in a murder case in Arkansas. There, investigators attempted to get the company to hand over data collected by a nearby Alexa. If that instance is any indication, Amazon may resist a legal demand to open up an Amazon Key lock.

Beyond concerns about the police, many on Twitter are fundamentally uncomfortable with Amazon Key.

Read 20 remaining paragraphs | Comments

Read more here:: feeds.arstechnica.com/arstechnica/index?format=xml