You are currently viewing SemiWiki as a guest which gives you limited access to the site. To view blog comments and experience other SemiWiki features you must be a registered member. Registration is fast, simple, and absolutely free so please,
join our community today!
The massive scale of recent DDoS attacks on DYN’s servers that brought down many popular online services in the US, gives us just a glimpse of what is possible when attackers are able to leverage up to 150,000 unsecure IoT devices as malicious endpoints.
To address the growing fear and uncertainty out there surrounding the IoT security… Read More
3 Steps To Choosing The Right IoT Vendorby Padraig Scully on 10-30-2016 at 8:00 pmCategories: IoT
There are thousands of contrasting IoT vendors in the market today. A strong push from hardware companies, communication providers, independent software vendors, system integrators, startups and IoT cloud platforms (of which there are360+ competing providers in this market alone) has resulted in a complex and confusing … Read More
Security is often an afterthought when developing IoT solutions. Security features are commonly cut from initial designs to accommodate additional device functionality. However, security needs to play a central role in IoT projects if we are to secure the Internet of Things.
The process of developing secure IoT solutions was… Read More
IoT solution development is complex. In many cases, development entails combining expertise from a number of different areas such as embedded system engineering, connectivity solution design, big data handling, application development, and data encryption techniques. Each area demands a specific array of competences … Read More
5 Expectations for the Memory Markets in 2025