Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
What is a microcomputer?
A microcomputer is a complete computer on a small scale, designed for use by one person at a time. Continue Reading
What is a unique identifier (UID)?
A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system. Continue Reading
What is Google Glass?
Google Glass was a wearable, voice and motion-controlled Android device that resembled a pair of eyeglasses and displayed information directly in the user's field of vision. It was discontinued in March 2023. Continue Reading
-
What is an embedded system?
An embedded system is a combination of computer hardware and software designed for a specific function. Continue Reading
What is a microcontroller (MCU)?
A microcontroller is a compact integrated circuit designed to govern a specific operation in an embedded system. Continue Reading
What is a drone (UAV)?
A drone is an unmanned aircraft. Drones are more formally known as 'unmanned aerial vehicles' (UAVs) or 'unmanned aircraft systems.'Continue Reading
9 IoT training certifications to take your next career step
IoT training certifications offering skills in IoT development, networking and security can give tech experts an advantage, especially when IoT skills are in high demand.Continue Reading
internet of things (IoT)
The internet of things, or IoT, is a network of interrelated devices that connect and exchange data with other IoT devices and the cloud.Continue Reading
How to approach IT/OT convergence training and certification
IT/OT convergence training involves rethinking existing processes and acquiring new skills to bridge the knowledge gap in areas like business process engineering and project management.Continue Reading
What is a smart home?
Smart home and building technology enables users to control lighting, thermostats, locks and security cameras remotely but faces challenges of security and complexity.Continue Reading
-
How to build a functional network for rugged IoT
Rugged IoT networks are cropping up everywhere. Understanding the necessary edge computing and network requirements is crucial for deploying a successful rugged IoT network.Continue Reading
An introduction to IoT penetration testing
IoT systems are complex, and that makes checking for vulnerabilities a challenge. Penetration testing is one way to ensure your IoT architecture is safe from cyber attacks.Continue Reading
How IoT helps support sustainable manufacturing
Implementing IoT can help manufacturers with sustainability goals stay on track through monitoring and automation. IoT can also help with compliance.Continue Reading
decentralized application (DApp)
A decentralized application (DApp) is a type of distributed, open source software application that runs on a peer-to-peer (P2P) blockchain network rather than on a single computer.Continue Reading
IoT devices (internet of things devices)
Internet of things (IoT) devices are nonstandard computing hardware -- such as sensors, actuators or appliances -- that connect wirelessly to a network and can transmit data.Continue Reading
IoT gateway
An internet of things (IoT) gateway is a physical device or software program that serves as the connection point between the cloud and controllers, sensors and intelligent devices.Continue Reading
IoT security (internet of things security)
IoT security (internet of things security) is the technology segment focused on safeguarding connected devices and networks in IoT.Continue Reading
industrial internet of things (IIoT)
The industrial internet of things (IIoT) is the use of smart sensors, actuators and other devices, such as RFID tags, to enhance manufacturing and industrial processes.Continue Reading
virtual reality sickness (VR motion sickness)
Virtual reality sickness (VR motion sickness) is the physical discomfort that occurs when an end user's brain receives conflicting signals about self-movement in a digital environment.Continue Reading
smart home
A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.Continue Reading
internet of things privacy (IoT privacy)
Internet of things privacy is the special considerations required to protect the information of individuals from exposure in the IoT environment.Continue Reading
artificial intelligence of things (AIoT)
Artificial intelligence of things (AIoT) is the combination of artificial intelligence (AI) technologies and the internet of things (IoT) infrastructure.Continue Reading
smart sensor
A smart sensor is a device that takes input from the physical environment and uses built-in compute resources to perform predefined functions upon detection of specific input and then processes data before passing it on.Continue Reading
AI and IoT: How do the internet of things and AI work together?
AI can compound the benefits of IoT by adding human-like awareness and decision-making to the environment at hand to ultimately increase efficiency and improve processes.Continue Reading
6 IoT architecture layers and components explained
Having a clearly defined IoT architecture framework greatly improves the chances for success of an enterprise's connected deployment.Continue Reading
internet of things device management (IoT device management)
Internet of things device management (IoT device management) involves remotely registering, configuring, provisioning, maintaining and monitoring connected devices from a centralized platform that IT administrators can access with an internet ...Continue Reading
Best practices for strong IoT design SLAs
Companies that hire designers to develop their IoT systems should shop around first and ensure that they have strong and comprehensive SLAs.Continue Reading
internet of medical things (IoMT) or healthcare IoT
The internet of medical things (IoMT) is the collection of medical devices and applications that connect to healthcare IT systems through online computer networks.Continue Reading
embedded systems programming
Embedded systems programming, also known as embedded programming, facilitates the development of consumer-facing devices that don't use conventional operating systems the way that desktop computers and mobile devices do.Continue Reading
transponder
A transponder is a wireless communication, monitoring or control device that picks up and automatically responds to an incoming signal.Continue Reading
thing (in the internet of things)
A thing, in the context of the internet of things (IoT), refers to any entity or physical object such as a device that forms a network and has the ability to transfer data with other devices over the network.Continue Reading
sensor data
Sensor data is the output of a device that detects and responds to some type of input from the physical environment.Continue Reading
An introduction to IoT logging types and practices
Collecting IoT data logs can help IT teams spot deployment issues and security alerts. For smooth operations, admins should identify what data they need and use the right hardware.Continue Reading
A look at how IoT and embedded systems work together
Embedded systems are a necessary part of IoT devices. Read more about how they work, their components and how to select the right type for an IoT device.Continue Reading
5 embedded system terms IoT admins must know
IoT devices require technology to bring software, hardware and signal processing components together. Embedded systems combine these three elements to streamline IoT product design.Continue Reading
Get acquainted with the types of actuators in IoT
Actuators are an essential hardware component of IoT products. Familiarize yourself with how actuators work, the different types of energy sources and the use cases for them.Continue Reading
man-in-the-middle attack (MitM)
A man-in-the-middle (MitM) attack is a type of cyber attack in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.Continue Reading
A look at the top 5 IoT device types
You can find IoT products in the home, factories, vehicles and hospitals. Familiarize yourself with specific devices for each of these sectors and their pros and cons.Continue Reading
smartwatch
A smartwatch is a wearable computing device that closely resembles a wristwatch or other time-keeping device.Continue Reading
embedded operating system
An embedded operating system is a specialized operating system (OS) designed to perform a specific task for a device that is not a computer.Continue Reading
What is fog computing?
Fog computing is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source and the cloud.Continue Reading
Get started programming the internet of things
To build IoT systems, IT pros must understand the complexities of programming IoT, including integration. In this excerpt, discover the first step to design full-stack IoT.Continue Reading
How to approach programming IoT for full stack development
Learn what challenges organizations must tackle when developing end-to-end IoT systems from 'Programming the Internet of Things' author Andy King.Continue Reading
How to secure IoT devices and protect them from cyber attacks
With just a handful of security measures, organizations and workers can prevent hackers from infiltrating IoT devices and protect user privacy.Continue Reading
Ace your wireless regulatory compliance tests today
With the growing use of wireless IoT technology, device designers must take care to navigate the complexity of regulatory compliance testing and certification.Continue Reading
Achieve IoT interoperability with market knowledge, strategy
Organizations embarking on IoT projects will find it easier to say 'IoT interoperability' than to ensure it; they must consider tools and partners to overcome compatibility issues.Continue Reading
mesh network topology (mesh network)
A mesh network is a network in which devices -- or nodes -- are linked together, branching off other devices or nodes.Continue Reading
meet-in-the-middle attack
Meet-in-the-middle is a known plaintext attack that can greatly reduce the number of brute-force permutations required to decrypt text that has been encrypted by more than one key.Continue Reading
Protecting your IoT devices protects your business
Organizations use IoT security standards and frameworks to secure IoT applications, data and devices, even for a fully remote workforce going forward. IoT security is more than a technology ...Continue Reading
Design your IoT device battery life
IoT engineers have several tactics they can use to extend the battery life of devices, such as energy harvesting, power saver mode and efficient hardware design.Continue Reading
Open source IoT tools to choose in 2021
Open source platforms can make developing IoT deployments easier, but organizations have multiple options to choose from, including these seven.Continue Reading
Prove your expertise with this IoT security quiz
Think you know all there is to know about securing IoT devices on an enterprise network? Test your grasp of IoT security threats with this quiz.Continue Reading
Democratizing machine learning will transform IoT
For the smart home to succeed, what happens in the home, will have to stay in the home and become smarter without the infinite compute capability of the cloud and with features such as voice ...Continue Reading
IoT interoperability standards complicate IoT adoption
IoT interoperability has complicated IoT adoption, but organizations must navigate the selection of competing standards, such as IP or MQTT, to get the most from IoT deployments.Continue Reading
RFID (radio frequency identification)
RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or...Continue Reading
AI and IoT convergence could herald a new era of technological change
With the right planning, tools and expertise, organizations that combine AI and IoT into AIoT will deliver benefits that only AI can help predict.Continue Reading
Use a zero trust approach to combat IoT security risks
Cyber attacks on IoT and CMS have grown throughout 2020 and organizations must step up their network security measures with tactics such as zero-trust.Continue Reading
Operation IoT interoperability: Testing device compatibility
Organizations can't just connect IoT devices to their network and assume everything will work. They must test and confirm that each part can connect and cooperate.Continue Reading
Returning to live events in smart arenas
With increased precautions and IoT technology in place, consumers can find comfort in returning to in-person events at arenas or stadiums with better safety precautions to reduce the spread of germs.Continue Reading
Why IoT technology is the game changer of the transportation industry
IoT technology reshapes the possibilities of the transportation industry with real-time monitoring, a data-driven approach, advanced analytics and predictive analysis.Continue Reading
Comprehend control loops to unlock analytics for IoT
Applying analytics to IoT quickly becomes a convoluted task. Architects must master the control loop to direct its design and deliver rapid business insights.Continue Reading
5 components of IoT streaming architecture
Software architects must create the basic IoT streaming architecture model for event flows before they can add unique features to their IoT applications.Continue Reading
Command tech conversations with IoT terminology you must know
Tech professionals should learn this IoT terminology to put the technology into context, start their journey and join emerging discussions with the same knowledge base.Continue Reading
MQTT (MQ Telemetry Transport)
MQTT (MQ Telemetry Transport) is a lightweight open messaging protocol that provides resource-constrained network clients with a simple way to distribute telemetry information in low-bandwidth environments.Continue Reading
Gain an edge on IoT storage
IoT storage on the edge is growing exponentially, so it's important companies prepare for and meet all its challenges.Continue Reading
Take lessons from the best 5 IoT blogs of 2020
IT administrators can catch up on the most popular topics of 2020 with IoT blogs on remote security, healthcare IoT and open source analytics platforms.Continue Reading
Prepare for IoT's role in U.S. CMMC compliance
CMMC compliance does not directly focus on IoT, but organizations must treat IoT as its own security challenge when admins try to meet the certification's requirements.Continue Reading
Understand how the edge and IoT intertwine
With the right edge IoT architecture and an understanding of the challenges that a glut of IoT data creates, organizations can reap benefits from real-time insights.Continue Reading
What IoT security certifications can level up your career?
No matter what motivates an IT professional to expand their security knowledge, they have a variety of IoT security certifications to choose from to achieve their career goals.Continue Reading
6 steps to prioritize IoT gateway security
IoT gateways serve as essential components in building effective IoT deployments and greater security, but admins should secure them with regular software updates and audits.Continue Reading
Cybersecurity 2.0 and the future of the IIoT landscape
With greater IIoT adoption and more security breaches, organizations must prioritize and update their security practices to match the new paradigms of current times.Continue Reading
3 machine learning best practices to use in IoT projects
IoT machine learning takes a whole team of experts that can approach the project with the right mindset, effectively communicate, and facilitate user feedback and testing.Continue Reading
4 strategies for scaling IoT to overcome technical challenges
IoT adoption alone can overwhelm an organization, but IoT leaders must also plan ahead to scale IoT deployments and avoid operational and technical pitfalls.Continue Reading
Don't forget IoT physical security when planning protection
Organizations must take steps to ensure the physical security of IoT devices, including preventing access to hardware components and ensuring only authenticated access.Continue Reading
How to develop a mobile app for IoT
As the IoT sector continues to grow at a rapid pace, organizations can take advantage of its success as well as the adoption of smartphones to develop an IoT app.Continue Reading
Tips to select the right microcontrollers for IoT
Microcontrollers offer advantages over other processors for IoT deployments, including efficient energy use. Understand the market and criteria for microcontroller selection.Continue Reading
3 ways a reliable network helps digitize supply chains
IoT technology increases operational efficiency, tracks assets and improves inventory visibility throughout the supply chain and prepares organizations for future disruptions.Continue Reading
Why healthcare providers must take action to eliminate cybersecurity risks
Healthcare organizations must prioritize cybersecurity even in the rush to adopt new technologies to cope with the pandemic because security threats have also increased.Continue Reading
Build a data streaming, AI and machine learning platform for IoT
As pressure mounts to scale more complex IoT use cases, an open source streaming, analytics and machine learning stack can enable businesses to develop reliable, production-ready infrastructure.Continue Reading
smart home hub (home automation hub)
A smart home hub is hardware or software that connects devices on a home automation network and controls communications among them.Continue Reading
Focus on IoT ROI, not potential, during economic uncertainty
During challenging economic times, organizations must carefully plan IoT investments, whether that is to build the technology up or delay any major additions.Continue Reading
Create the right approach to IoT adoption and scalability
Organizations can approach IoT adoption in three different ways, but all departments must be involved in the process to derive its value and build effective capabilities.Continue Reading
ICIP IoT training: Get started with IoT risk management
Organizations must assess and prioritize risk management in their IoT investment to ensure their data and information assets are protected without overspending.Continue Reading
smart city
A smart city is a municipality that uses information and communication technologies (ICT) to increase operational efficiency, share information with the public and improve both the quality of government services and citizen welfare.Continue Reading
The social distancing equivalent for medical devices
Healthcare organizations must follow these five clinical network segmentation steps -- including assigning responsibility for security and keeping up with industry guidelines -- to thwart cyberattacks.Continue Reading
IoT innovation culture powers business success
What do organizations need to drive innovation in their IoT teams? Tech leaders can start by creating a culture of innovation to encourage creativity and growth in IoT deployments.Continue Reading
10 steps to IoT deployment success
Business outcomes should take center stage when planning to deploy IoT. Address these 10 areas to smooth your project plan and guarantee quality and revenue.Continue Reading
5 steps to select the best IoT database
Organizations should begin their search for the right IoT database by understanding their data, functional requirements and how the database will fit into their business strategy.Continue Reading
TinyML accelerates the shift to modern edge data management
TinyML can help target low power IoT applications and determine when to power up or power down more complex, power hungry devices.Continue Reading
SaaS IoT platforms jumpstart IoT app development
Starting an IoT deployment from scratch can be prohibitive, but an IoT SaaS platform can make the endeavor more realistic for organizations that want a competitive edge.Continue Reading
Get on the fast path to success with the ABCs of IoT
When designing IoT products, following the ABC's of IoT is the quickest and easiest way for design engineers and manufacturers to get on the right path to success.Continue Reading
How to design IoT infrastructure in 7 parts
Organizations can prepare their IoT deployments for success by understanding each IoT infrastructure component and how they all work together.Continue Reading
5G private networks to help expand IoT
Private 5G networks, separate from wider public networks, can help expand IoT into new geographies and use cases.Continue Reading
IoT edge cloud balances the best of cloud and edge computing
Organizations are shifting IoT deployments from cloud computing to edge computing, but a newer option -- the edge cloud -- has emerged to bring the cloud to the edge.Continue Reading
Discover realistic 5G IoT use cases that add value
When looking to apply 5G in IoT use cases, IoT leaders must think more about the combination of new edge devices and applications than about the new version of wireless.Continue Reading
How to create a workflow for IoT software updates
Instead of scrambling to create an IoT update workflow when the need becomes pressing, IT experts should create a plan specifically to update IoT devices using these best practices.Continue Reading
Learn the IoT botnets basics every IT expert should know
The threat of IoT botnets continues to grow with the number of deployed IoT devices. IT experts must understand and guard against the inherent risk of an expanding attack surface.Continue Reading
How to plan for data storage in IoT deployments
Business objectives, data retention needs and cost all factor into where organizations should store endpoint-generated data in growing IoT deployments.Continue Reading
Q&A: Remote care trend spotlights IoT security in healthcare
Healthcare IT professionals and medical device manufacturers must bolster IoT security with the growing number of connected devices, regulations and the future of remote care.Continue Reading
Start your IoT strategy on the right foot
Developmental teams can minimize the risk of an IoT project failing by outlining each step of the plan, identifying problems early and maintaining realistic expectations.Continue Reading