Introduction to IoT Agenda | TechTarget (original) (raw)

Get started

Bring yourself up to speed with our introductory content.

A microcomputer is a complete computer on a small scale, designed for use by one person at a time. Continue Reading

A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system. Continue Reading

Google Glass was a wearable, voice and motion-controlled Android device that resembled a pair of eyeglasses and displayed information directly in the user's field of vision. It was discontinued in March 2023. Continue Reading

An embedded system is a combination of computer hardware and software designed for a specific function. Continue Reading

A microcontroller is a compact integrated circuit designed to govern a specific operation in an embedded system. Continue Reading

A drone is an unmanned aircraft. Drones are more formally known as 'unmanned aerial vehicles' (UAVs) or 'unmanned aircraft systems.'Continue Reading

IoT training certifications offering skills in IoT development, networking and security can give tech experts an advantage, especially when IoT skills are in high demand.Continue Reading

The internet of things, or IoT, is a network of interrelated devices that connect and exchange data with other IoT devices and the cloud.Continue Reading

IT/OT convergence training involves rethinking existing processes and acquiring new skills to bridge the knowledge gap in areas like business process engineering and project management.Continue Reading

Smart home and building technology enables users to control lighting, thermostats, locks and security cameras remotely but faces challenges of security and complexity.Continue Reading

Rugged IoT networks are cropping up everywhere. Understanding the necessary edge computing and network requirements is crucial for deploying a successful rugged IoT network.Continue Reading

IoT systems are complex, and that makes checking for vulnerabilities a challenge. Penetration testing is one way to ensure your IoT architecture is safe from cyber attacks.Continue Reading

Implementing IoT can help manufacturers with sustainability goals stay on track through monitoring and automation. IoT can also help with compliance.Continue Reading

A decentralized application (DApp) is a type of distributed, open source software application that runs on a peer-to-peer (P2P) blockchain network rather than on a single computer.Continue Reading

Internet of things (IoT) devices are nonstandard computing hardware -- such as sensors, actuators or appliances -- that connect wirelessly to a network and can transmit data.Continue Reading

An internet of things (IoT) gateway is a physical device or software program that serves as the connection point between the cloud and controllers, sensors and intelligent devices.Continue Reading

IoT security (internet of things security) is the technology segment focused on safeguarding connected devices and networks in IoT.Continue Reading

The industrial internet of things (IIoT) is the use of smart sensors, actuators and other devices, such as RFID tags, to enhance manufacturing and industrial processes.Continue Reading

Virtual reality sickness (VR motion sickness) is the physical discomfort that occurs when an end user's brain receives conflicting signals about self-movement in a digital environment.Continue Reading

A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.Continue Reading

Internet of things privacy is the special considerations required to protect the information of individuals from exposure in the IoT environment.Continue Reading

Artificial intelligence of things (AIoT) is the combination of artificial intelligence (AI) technologies and the internet of things (IoT) infrastructure.Continue Reading

A smart sensor is a device that takes input from the physical environment and uses built-in compute resources to perform predefined functions upon detection of specific input and then processes data before passing it on.Continue Reading

AI can compound the benefits of IoT by adding human-like awareness and decision-making to the environment at hand to ultimately increase efficiency and improve processes.Continue Reading

Having a clearly defined IoT architecture framework greatly improves the chances for success of an enterprise's connected deployment.Continue Reading

Internet of things device management (IoT device management) involves remotely registering, configuring, provisioning, maintaining and monitoring connected devices from a centralized platform that IT administrators can access with an internet ...Continue Reading

Companies that hire designers to develop their IoT systems should shop around first and ensure that they have strong and comprehensive SLAs.Continue Reading

The internet of medical things (IoMT) is the collection of medical devices and applications that connect to healthcare IT systems through online computer networks.Continue Reading

Embedded systems programming, also known as embedded programming, facilitates the development of consumer-facing devices that don't use conventional operating systems the way that desktop computers and mobile devices do.Continue Reading

A transponder is a wireless communication, monitoring or control device that picks up and automatically responds to an incoming signal.Continue Reading

A thing, in the context of the internet of things (IoT), refers to any entity or physical object such as a device that forms a network and has the ability to transfer data with other devices over the network.Continue Reading

Sensor data is the output of a device that detects and responds to some type of input from the physical environment.Continue Reading

Collecting IoT data logs can help IT teams spot deployment issues and security alerts. For smooth operations, admins should identify what data they need and use the right hardware.Continue Reading

Embedded systems are a necessary part of IoT devices. Read more about how they work, their components and how to select the right type for an IoT device.Continue Reading

IoT devices require technology to bring software, hardware and signal processing components together. Embedded systems combine these three elements to streamline IoT product design.Continue Reading

Actuators are an essential hardware component of IoT products. Familiarize yourself with how actuators work, the different types of energy sources and the use cases for them.Continue Reading

A man-in-the-middle (MitM) attack is a type of cyber attack in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.Continue Reading

You can find IoT products in the home, factories, vehicles and hospitals. Familiarize yourself with specific devices for each of these sectors and their pros and cons.Continue Reading

A smartwatch is a wearable computing device that closely resembles a wristwatch or other time-keeping device.Continue Reading

An embedded operating system is a specialized operating system (OS) designed to perform a specific task for a device that is not a computer.Continue Reading

Fog computing is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source and the cloud.Continue Reading

To build IoT systems, IT pros must understand the complexities of programming IoT, including integration. In this excerpt, discover the first step to design full-stack IoT.Continue Reading

Learn what challenges organizations must tackle when developing end-to-end IoT systems from 'Programming the Internet of Things' author Andy King.Continue Reading

With just a handful of security measures, organizations and workers can prevent hackers from infiltrating IoT devices and protect user privacy.Continue Reading

With the growing use of wireless IoT technology, device designers must take care to navigate the complexity of regulatory compliance testing and certification.Continue Reading

Organizations embarking on IoT projects will find it easier to say 'IoT interoperability' than to ensure it; they must consider tools and partners to overcome compatibility issues.Continue Reading

A mesh network is a network in which devices -- or nodes -- are linked together, branching off other devices or nodes.Continue Reading

Meet-in-the-middle is a known plaintext attack that can greatly reduce the number of brute-force permutations required to decrypt text that has been encrypted by more than one key.Continue Reading

Organizations use IoT security standards and frameworks to secure IoT applications, data and devices, even for a fully remote workforce going forward. IoT security is more than a technology ...Continue Reading

IoT engineers have several tactics they can use to extend the battery life of devices, such as energy harvesting, power saver mode and efficient hardware design.Continue Reading

Open source platforms can make developing IoT deployments easier, but organizations have multiple options to choose from, including these seven.Continue Reading

Think you know all there is to know about securing IoT devices on an enterprise network? Test your grasp of IoT security threats with this quiz.Continue Reading

For the smart home to succeed, what happens in the home, will have to stay in the home and become smarter without the infinite compute capability of the cloud and with features such as voice ...Continue Reading

IoT interoperability has complicated IoT adoption, but organizations must navigate the selection of competing standards, such as IP or MQTT, to get the most from IoT deployments.Continue Reading

RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or...Continue Reading

With the right planning, tools and expertise, organizations that combine AI and IoT into AIoT will deliver benefits that only AI can help predict.Continue Reading

Cyber attacks on IoT and CMS have grown throughout 2020 and organizations must step up their network security measures with tactics such as zero-trust.Continue Reading

Organizations can't just connect IoT devices to their network and assume everything will work. They must test and confirm that each part can connect and cooperate.Continue Reading

With increased precautions and IoT technology in place, consumers can find comfort in returning to in-person events at arenas or stadiums with better safety precautions to reduce the spread of germs.Continue Reading

Applying analytics to IoT quickly becomes a convoluted task. Architects must master the control loop to direct its design and deliver rapid business insights.Continue Reading

Software architects must create the basic IoT streaming architecture model for event flows before they can add unique features to their IoT applications.Continue Reading

Tech professionals should learn this IoT terminology to put the technology into context, start their journey and join emerging discussions with the same knowledge base.Continue Reading

MQTT (MQ Telemetry Transport) is a lightweight open messaging protocol that provides resource-constrained network clients with a simple way to distribute telemetry information in low-bandwidth environments.Continue Reading

IoT storage on the edge is growing exponentially, so it's important companies prepare for and meet all its challenges.Continue Reading

IT administrators can catch up on the most popular topics of 2020 with IoT blogs on remote security, healthcare IoT and open source analytics platforms.Continue Reading

CMMC compliance does not directly focus on IoT, but organizations must treat IoT as its own security challenge when admins try to meet the certification's requirements.Continue Reading

With the right edge IoT architecture and an understanding of the challenges that a glut of IoT data creates, organizations can reap benefits from real-time insights.Continue Reading

No matter what motivates an IT professional to expand their security knowledge, they have a variety of IoT security certifications to choose from to achieve their career goals.Continue Reading

IoT gateways serve as essential components in building effective IoT deployments and greater security, but admins should secure them with regular software updates and audits.Continue Reading

With greater IIoT adoption and more security breaches, organizations must prioritize and update their security practices to match the new paradigms of current times.Continue Reading

IoT machine learning takes a whole team of experts that can approach the project with the right mindset, effectively communicate, and facilitate user feedback and testing.Continue Reading

IoT adoption alone can overwhelm an organization, but IoT leaders must also plan ahead to scale IoT deployments and avoid operational and technical pitfalls.Continue Reading

Organizations must take steps to ensure the physical security of IoT devices, including preventing access to hardware components and ensuring only authenticated access.Continue Reading

As the IoT sector continues to grow at a rapid pace, organizations can take advantage of its success as well as the adoption of smartphones to develop an IoT app.Continue Reading

Microcontrollers offer advantages over other processors for IoT deployments, including efficient energy use. Understand the market and criteria for microcontroller selection.Continue Reading

IoT technology increases operational efficiency, tracks assets and improves inventory visibility throughout the supply chain and prepares organizations for future disruptions.Continue Reading

Healthcare organizations must prioritize cybersecurity even in the rush to adopt new technologies to cope with the pandemic because security threats have also increased.Continue Reading

As pressure mounts to scale more complex IoT use cases, an open source streaming, analytics and machine learning stack can enable businesses to develop reliable, production-ready infrastructure.Continue Reading

A smart home hub is hardware or software that connects devices on a home automation network and controls communications among them.Continue Reading

During challenging economic times, organizations must carefully plan IoT investments, whether that is to build the technology up or delay any major additions.Continue Reading

Organizations can approach IoT adoption in three different ways, but all departments must be involved in the process to derive its value and build effective capabilities.Continue Reading

Organizations must assess and prioritize risk management in their IoT investment to ensure their data and information assets are protected without overspending.Continue Reading

A smart city is a municipality that uses information and communication technologies (ICT) to increase operational efficiency, share information with the public and improve both the quality of government services and citizen welfare.Continue Reading

Healthcare organizations must follow these five clinical network segmentation steps -- including assigning responsibility for security and keeping up with industry guidelines -- to thwart cyberattacks.Continue Reading

What do organizations need to drive innovation in their IoT teams? Tech leaders can start by creating a culture of innovation to encourage creativity and growth in IoT deployments.Continue Reading

Business outcomes should take center stage when planning to deploy IoT. Address these 10 areas to smooth your project plan and guarantee quality and revenue.Continue Reading

Organizations should begin their search for the right IoT database by understanding their data, functional requirements and how the database will fit into their business strategy.Continue Reading

TinyML can help target low power IoT applications and determine when to power up or power down more complex, power hungry devices.Continue Reading

Starting an IoT deployment from scratch can be prohibitive, but an IoT SaaS platform can make the endeavor more realistic for organizations that want a competitive edge.Continue Reading

Organizations can prepare their IoT deployments for success by understanding each IoT infrastructure component and how they all work together.Continue Reading

Private 5G networks, separate from wider public networks, can help expand IoT into new geographies and use cases.Continue Reading

Organizations are shifting IoT deployments from cloud computing to edge computing, but a newer option -- the edge cloud -- has emerged to bring the cloud to the edge.Continue Reading

When looking to apply 5G in IoT use cases, IoT leaders must think more about the combination of new edge devices and applications than about the new version of wireless.Continue Reading

Instead of scrambling to create an IoT update workflow when the need becomes pressing, IT experts should create a plan specifically to update IoT devices using these best practices.Continue Reading

The threat of IoT botnets continues to grow with the number of deployed IoT devices. IT experts must understand and guard against the inherent risk of an expanding attack surface.Continue Reading

Business objectives, data retention needs and cost all factor into where organizations should store endpoint-generated data in growing IoT deployments.Continue Reading

Healthcare IT professionals and medical device manufacturers must bolster IoT security with the growing number of connected devices, regulations and the future of remote care.Continue Reading

Developmental teams can minimize the risk of an IoT project failing by outlining each step of the plan, identifying problems early and maintaining realistic expectations.Continue Reading

When organizations work through the development of an IoT product, it's important to externally confirm its value during each stage of the process.Continue Reading

Cloud is the favored storage choice for many IoT uses, but vendors have stepped up their offerings to meet the growing variety of needs, including custom-built options.Continue Reading