Getting software-defined radio (SDR) tools into the hands of the community has been great for the development and decoding of previously-cryptic, if not encrypted, radio signals the world over. As soon as there’s a new protocol or modulation method, it’s in everyone’s sights. A lot of people have been working on LoRa, and [bertrik] at RevSpace in The Hague has done some work of his own, and put together an amazing summary of the state of the art.
What is Machine Learning? Machine Learning can be described as “ the study and construction of algorithms that can learn from and make predictions on data, rather than follow programmed instructions. IoT and Machine Learning are said to go hand in hand. ”
IoT promotes the data that can help cities predict accidents, give doctors real-time insight into information from bio-chips and pacemakers, and enable optimized productivity across industries through predictive maintenance on equipment and machinery. The possibilities that IoT bring are endless.
This year’s Davos World Economic Forum (WEF) summit was held under the theme — The Fourth Industrial Revolution. According to the WEF, the first industrial revolution used water and steam power to mechanise production. The second used electric power to create mass production. The third revolution used electronics and information technology to automate production. Now a fourth industrial revolution is the digital revolution that has been occurring since the middle of the last century and has been characterised by the integration of the physical, digital, and biological spheres.
IBM has closed a deal to acquire The Weather Company’s B2B, mobile and cloud-based properties.
The combination of technology and expertise from the two companies will serve as the foundation for the Watson Iot Cloud platform, building on a US$3billion commitment IBM made in March last year to invest in the Internet of Things.
The acquisition includes weather.com, Weather Underground, The Weather Company brand and WSI, its global business to business brand.
The potential of the Internet of Things is fueling a lot of interest (and hype) all across media and industry. But we aren’t ready.
We are attracted to, and ready for, the insights that will likely come. But being ready for the benefits isn’t the same as being ready for the associated changes. Before the smoldering ingredients of IoT catch fire, preparation for the coming market power shifts, increasing complexity, pervasive security, and process change would help most organizations make the most of the IoT potential.
The rifle, called the DroneDefender, uses a radio pulse to disable a targeted drone within 400 meters. The gun causes the drone to think it's out of range and enter emergency protocol, either causing it to land, hover or return to its point of origin.
Most executives have high hopes for the so-called Internet of Things (IoT), which is still relatively new on the scene. Interestingly, close to one in four companies say IoT is already delivering some form of business value.
As technology continues to empower our ability to conduct analytics with “Big Data”, the “Internet of Things” has arisen as an area where devices themselves capture and transmit data albeit machine-level type data. Let’s discuss some of these devices.
Telematics is revolutionizing the auto insurance industry as devices are placed in cars which actually record the behavior of the driver.
The Internet of Things (IoT) is a burgeoning industry of its own caliber that is starting to become integral to many other industries in our day-to-day life. Everything ranging from cars, to networks, to appliances are beginning to explore the wonders and potential of the IoT, and our technologically inclined society is eager to have more.
This is the first article of a two article series in which we try to work from the abstract level of IoT reference architectures towards the concrete architecture and implementation for selected use cases. This first article will cover the definition of a more concrete and comprehensible architecture whereas the second part will then apply this architecture to actual use cases.
Lt. Gen. Edward Cardon said the vast array of devices connected to the Internet are blurring the lines between vulnerabilities.
More research is needed into the cybersecurity of the Internet of Things, said Lt. Gen. Edward Cardon, head of Army Cyber Command.
"People are connecting stuff to the Internet that we never thought would be connected," Cardon said Jan. 29 at the Institute of World Politics in Washington. "You know people are working on hacking your Fitbit."