Transforma Insights Study Provides a Reality Check on the SGP.32 Standard
Transforma Insights has published its free Transition Topic Position Paper, sponsored by Eseye, ‘Key considerations for Enterprises looking to adopt SGP.32’. The SGP.32 (IoT) standard for Remote SIM Provisioning was unveiled in May 2023, promising a more streamlined and user-friendly mechanism for enterprises to manage the connectivity on their cellular devices. However, as explained in […]
Read MoreKubernetes shows the way forward for AI
The term “inflection point” is overused, but it certainly applies to the current state of artificial intelligence. Technology providers—and the companies that depend on them—can choose one of two roads to AI development: proprietary or open source. This dichotomy has existed for decades, with both sides achieving great levels of success. However, I would argue […]
Read MoreLPWAN and the IoT Market
In this episode of the IoT For All Podcast, Wienke Giezeman, co-founder and CEO of The Things Industries, joins Ryan Chacon to discuss LPWAN and the IoT market, specifically focusing on LoRaWAN. The conversation covers the benefits of LoRaWAN in enterprise IoT solutions, the IoT industry’s journey from high expectations for LoRaWAN to the current […]
Read MoreC++ language rises in Tiobe popularity index
Developers apparently did not listen to a recent White House advisory to move away from C++ and C over memory safety concerns, as C++ has climbed to second place in the Tiobe index of programming language popularity, trailing only Python. The C language dropped to third place. C++ is the number two language in the […]
Read MoreThe 4 Pillars of a Strong IoT Security Program
The past few years have seen a sharp rise in cyber-attacks targeting vital infrastructure and security products worldwide, focusing on Industrial Internet of Things (IIoT) devices like security cameras. An IoT security program is essential to improving cybersecurity. A recent analysis by Kaspersky, based on data from honeypots shared with Threatpost, revealed an alarming figure: […]
Read More9 command-line jewels for your developer toolkit
Some developers use the command line because we have no choice; others use it because we kind of love it. Either way, you know who you are. Whether you are a lover of the CLI or just using it for work, here are nine command-line tools that will help make you more efficient, on or off the […]
Read Moreindustrial control system (ICS)
What is an industrial control system (ICS)? In industrial settings, industrial control system (ICS) is a term used to describe the integration of hardware and software with network connectivity to support production processes in manufacturing or critical infrastructure. ICS is a general term for any system used to control and manage industrial processes, including manufacturing, […]
Read MoreA Beginner’s Guide to Unified Namespace for IIoT
Industrial IoT allows manufacturers to track data points that simply weren’t available in the past. This unprecedented visibility creates huge opportunities for data-driven operations. Unfortunately, it also introduces new challenges for old IT infrastructures. Traditional industrial computing architecture—such as the ISA 95 functional model, which dates back to the 1990s—relies on point-to-point, hierarchical data connections. […]
Read MoreHow a data exchange platform eases data integration
What has always fascinated me about Moore’s law is that for more than half a century, the technological computing innovations we take for granted—from the PC to smart watches to self-driving cars—hinged on solving one small, specific problem: the distance between transistors on a chip. As our software-powered world becomes more and more data-driven, unlocking […]
Read MoreWhat are vector embeddings?
Vector embeddings are numerical representations that capture the relationships and meaning of words, phrases and other data types. Through vector embeddings, essential characteristics or features of an object are translated into a concise and organized array of numbers, helping computers rapidly retrieve information. Similar data points are clustered closer together after being translated into points […]
Read More