Diagnose, Debug & Deploy: Ensuring Reliability with OTA and Remote Debugging

Diagnose, Debug & Deploy: Ensuring Reliability with OTA and Remote Debugging

In this webinar we’ll explore how embedded engineers can ensure device reliability using advanced observability and OTA management tools. You’ll learn how to proactively diagnose and debug issues remotely, allowing you to resolve them before they escalate and disrupt users. We’ll cover best practices for managing OTA updates to reduce the risk of fleet-wide failures.

Additionally, we’ll dive into actionable performance metrics—such as battery health and connectivity—that can be used to improve device performance and longevity. Through real-world examples, such as Silvertree and Diamond Kinetics, you’ll see how Memfault’s platform has helped companies boost product reliability, cut support costs, and accelerate time to market.

Join us to discover how to bring the power of OTA and remote debugging to your embedded systems

Why attend:

  • Ensure Device Reliability: Learn how real-time observability and OTA updates keep your devices running smoothly, reducing unexpected downtime.
  • Proactive Debugging: Discover how to diagnose and resolve issues remotely, preventing failures before they impact your users.
  • Streamline OTA Management: Explore best practices to minimize risk during firmware updates.
  • Actionable Performance Metrics: Understand how to collect and analyze critical data like battery life, connectivity, and memory usage to improve device performance.
  • Real-World Success Stories: Hear how companies like Bose and Latch use Memfault’s to significantly improve device reliability and speed up time to market.

REGISTER HERE


Diabolocom chooses Ribbon’s DCI Solution for cloud contact centre

Ribbon Communications has announced that Diabolocom?has selected Ribbon’s high density?Data Center Interconnect (DCI) solution. The solution enables Diabolocom to efficiently connect its global customers with its Cloud Contact Center Software and proprietary Voice AI solutions.

“Ribbon provides us with a cutting edge solution, coupled with a flexible, customer-first approach,” said Frederic Durand, the CEO and founder at Diabolocom. “Their highly scalable solution enables the efficient transfer of major datasets and economically, supporting our mission to help businesses foster customer loyalty and drive growth."

READ MORE HERE


Enterprise Connectivity Series 2024:Security and Connectivity

How can IoT connectivity be secured from ongoing threats and probing for vulnerabilities across networks, software and hardware? It is clear from Kaleido’s 2024 survey that enterprises hold security in high regard. End-to-end security was?the number one connectivity concern?for enterprises, with 51% of respondents ranking this within their top five concerns. At the same time, 48% of respondents reported that cybersecurity threats represent a major issue for their organisation.

During this webinar, proudly presented alongside?Kigen, we’ll outline clear guidance on how enterprises can best equip themselves to stay secure, and how this can be enabled without over complex management. With 49% of eSIM users reporting that its ability to be used as a security root of trust was a factor in choosing the technology, we’ll also showcase how eSIM can be a game changer on the security front.

READ MORE HERE


IIT Ropar launches BLE Gateway for IoT with real-time environmental monitoring

AWaDH (Agriculture and Water Technology Development Hub) at the Indian Institute of Technology (IIT) Ropar, under the National Mission on Interdisciplinary Cyber-Physical Systems (NM-ICPS) by the Department of Science and Technology (DST), Government of India, with funding of ?110 Crore has announced the launch of its state-of-the-art AWaDH’s Bluetooth Low Energy Gateway and Node System.

Developed by IIT Ropar, this first-of-its-kind cost-effective system connects Bluetooth-enabled sensors to cloud platforms, enabling seamless data transmission, real-time environmental monitoring, and advanced analytics across diverse sectors such as agriculture, logistics, and environmental resilience. With features designed to support scalable IoT deployments, the BLE Gateway system reinforces AWaDH’s commitment to sustainable and technology-driven advancements.

READ MORE HERE


Discover the billion-dollar benefits of digital monetisation for tier-one telcos.

Billing consolidation and 'next-generation' billing solutions are simply smoke and mirrors and wont address the fundamental monetisation flaws holding CSP's back.??Are you missing out on the cost savings and competitive advantage that a modern, unified monetisation approach can offer?

It's likely your billing and charging systems are no longer keeping pace with a world full of one-time purchases, subscriptions, multi-party and multi-directional business models.? It doesn't have to be all about delayed go to market, high costs, siloed data and complexity.? There is a better way. ?A billion-dollar better way.

READ MORE HERE


Crypto Quantique’s QuarkLink offers quantum-resilient security for IoT devices

Crypto Quantique?has upgraded its QuarkLink IoT device security platform with a hybrid post-quantum cryptographic algorithm.

QuarkLink is an integrated, scalable, cloud-based software platform that reduces the time and expense of implementing all necessary security functions in embedded devices (IoT) and industrial PCs by up to 10X. It integrates client libraries for popular MCU families, supports Linux distributions in industrial PCs, and manages device identities. It also manages security keys, digital certificates, and Public Key Infrastructure (PKI), and supports secure boot and firmware-over-the-air (FOTA) updates.

READ MORE HERE


How to maximise uptime, reliability and efficiency of your equipment health monitoring

Equipment health monitoring is vital for protecting your critical infrastructure. By monitoring changes to your machinery from pumps and motors to fans and compressors, it’s possible to become aware of issues before they slow or stall production. But the IoT you choose to support you in this is just as important as the equipment they look after. In this downloadable factsheet from Honeywell – innovators in building automation, performance materials & technologies and safety & productivity solutions – discover the compact Honeywell Versatilis? Transmitter or HVT.

Unlock to download this one-pager which dives into its many features including:

  • The measurement functionality of the HVT – See how it works to track vibration, surface temperature, acoustics and ambient (pressure, temperature, humidity) wirelessly; displaying the Vibration Raw waveform on BLE with statistical parameters and FFT data. The device is ATEX, Marine and NAMUR Certified and allows for remote configuration changes, making it more efficient to use.
  • How you work with the equipment health monitoring data – With the Connect feature, you can use mobile, tablet or laptop across iOS, Windows and Android to see and share historical trends, perform local monitoring & troubleshooting tasks on the go, bulk configure & update devices or view the Raw & FFT spectrum data.
  • What the enterprise-level remote monitoring offers – When you’re doing equipment health monitoring at scale, you need certain features. The HVT offers on-premise solutions with remote clients, full trend & spectrum views with an intuitive hierarchical view of your assets, emailed alarms, automated reports and remote config. All of these tools help you work smarter and faster; prioritising critical machines.

Even if you’ve not put optimisations to your equipment health monitoring at the top of your priority list this quarter, downloading this fact sheet on the Honeywell Versatilis? Transmitter is an easy way to sense-check your current IoT deployments. Do you have a multi-variant sensing platform based on the latest LoRaWAN? protocol communication technology? Does it offer low power consumption and easy installation so you can deploy it at a scale while keeping OPEX low? If not, this downloadable offers great food for thought.

READ MORE HERE


Trellix EDR achieves DoD IL5 certification for advanced cybersecurity

Trellix has announced Trellix Endpoint Detection and Response (EDR) was granted Impact Level 5 (IL5) High Provisional Authorisation (PA) from the U.S. Department of Defense (DoD), certifying it has passed rigorous security requirements for the complex and expanding DoD cloud environment. Trellix EDR runs on AWS GovCloud and strengthens organisations cybersecurity posture by reducing the mean time to detect and respond to threats with Trellix’s AI-powered foundation, Trellix Wise.

The DoD uses Impact Level (IL) classification labels as part of a comprehensive security categorisation system, with IL5 encompassing higher sensitivity Controlled Unclassified Information (CUI), Mission Critical Information and National Security Systems (NSS). This certification ensures the DoD has access to Trellix’s cloud-hosted EDR, aligning with the directive to advance?EDR adoption for government agencies.

READ MORE HERE


IIoT and AIoT efficiency is empowered by a unified software stack

The IoT market is maturing and that means there’s a growing focus on edge intelligence. It’s a simple way to minimise communication, eliminate latency and streamline processes and data analysis; hence the widespread adoption. Adding embedded AI at the edge is helping boost IIoT and AIoT operations as they can now manage their deployed devices efficiently and reap huge benefits.

In this report, learn all about:

  • Why management platforms matter – As hyper-scale industrial IoT becomes a reality, device design and development impacted by edge capabilities means management platforms begin to take centre stage.
  • The risks to IIoT and AIoT – As the market adopts more smart manufacturing, there’s an increased reliance on innovation to keep the costs of utilisation down and avoid latency issues.
  • Where the ‘edge’ is – Thick, thin and micro are terms used to describe the types of computational resources located at or below the cell tower data centre or on-premise data centre. Where does your operation fall?
  • How the Eclipse Kanto supports – Developed by the Eclipse Foundation and initiated within Bosch IO, this is the lightweight, connected, containerised and flexible system that AI edge resources need. Empower cloud connectivity, digital twins, local communication, container management and software updates from a remotely manageable IoT cloud ecosystem that’s easy to use.
  • Why you don’t want vendor locks – By supporting other Eclipse IoT projects, the Bosch IoT Suite, adapters for Azure and Amazon Web Services plus connectivity via message queueing telemetry transport (MQTT), you’re not locked in and can follow tech innovation wherever it leads.

No matter how you’re capitalising on the IIoT or AIoT markets, choose a software stack that has no licence fees and doesn’t restrict you. Get fragmentation under control, reduce the impact of latency and tap into the value of open-source ecosystems. Learn how Kanto and a unified approach can abstract away operational complexity and streamline the development of your next groundbreaking features and services.

READ MORE HERE


DIME Project achieves a breakthrough in edge AI for real-time decision-making

Edge artificial intelligence (AI) is enabling real-time data processing and decision-making directly on devices, reducing latency and bandwidth usage while enhancing privacy by minimising data transmission to the cloud. However, its widespread adoption has faced technical obstacles. The DIME project, led by a research team at IMDEA Networks and coordinated by Joerg Widmer, the research director, and Jaya Champati, the research assistant professor, concluded this year, achieving a breakthrough in overcoming these challenges. Its outcomes aim for faster, safer and more sustainable edge artificial intelligence applications, with impact in key sectors such as healthcare, transportation and smart cities.

Overcoming technical barriers

One of the major challenges of deploying deep learning (DL) models on devices such as microcontrollers or smartphones has been understanding their impact on performance in terms of energy consumption, latency and accuracy. The DIME project conducted a study measuring these variables on five IoT devices, ranging from basic microcontrollers to advanced single-board computers like the Jetson Orin Nano. This analysis identified strategies to optimise performance without compromising decision quality.

READ MORE HERE


Empowering OEMs to Meet MNOs 5G FWA Requirements

OEMs need to meet specific requirements set by MNOs when building FWA devices. Sure, the list isn’t groundbreaking, but falling at any of these hurdles can cost your organisation big. With this detailed report, dive into ways OEMs can enable secure connectivity for 5G fixed wireless access to homes and deliver on MNO expectations.

Explore this topic in-depth, covering:

  • MNO requirements for connected devices – They need them to benefit from ease of installation, offer provisioning of high bandwidth, contain robust security features and offer gold-standard device lifetime in the field.
  • How the Thales process works – Thales offers tested support to FWA CPE device designers in a framework called Build, Run, Protect. It helps them meet the demands of Mobile Network Operators (MNOs) while also tapping into new technologies.
  • Reasons for the FWA resurgence – 5G could be credited with the renewed appetite in FWA and the funding that’s come with the government’s interest in providing levelling up across digital divides.?
  • The market data on FWA – FWA connections are estimated to grow from 100M in 2022 to 300M in 2028 and (by then) 5G is expected to represent nearly 80% of the total and by 2028, 17% of fixed home broadband connections are expected to be FWA, according to Ericsson’s June 2023 Mobility Report.
  • A visualisation of MNO’s top requirements by importance – While cost, regulations, coverage, contract models, interoperability and environmental resilience are important, they are overshadowed by bandwidth, simplicity, device lifetimes and security.

The challenge OEMs need to meet is around following a process that will tick all these boxes. Thales recommends the value chain for FWA CPE devices follows device, connectivity, platform and then application. By working with a global leader like Thales, OEMs can follow the build, run and protect framework to success. Over 450 MNOs use their solution, so detailed expertise is invaluable. Glean all their insights and plan your own internal processes for enabling secure connectivity for 5G FWA access to homes with this exclusive guide below.

READ MORE HERE


Over 4,700 private LTE/5G networks deployed globally by end of 2024

According to a new research report from the IoT analyst firm Berg Insight, there were a total of 4,700 private LTE/5G networks deployed across the world at the end of 2024, excluding proof-of-concept (PoC) projects. The market value for private LTE/5G network solutions reached an estimated US$ 1.8 billion in 2024. Berg Insight believes that the market value for private LTE/5G network solutions will grow at a steady pace over the next five years, largely driven by new network deployments. Revenue growth will also be driven by upgrades and expansions of existing networks, as enterprises add new applications and transition from LTE to 5G. Growing at a CAGR of 38%, the total market value for private LTE/5G network solutions is forecasted to reach US$ 8.9 billion in 2029.

“The increased availability of dedicated spectrum and emergence of new use cases open up a wide range of opportunities for the cellular ecosystem”, said Melvin S?rum, the IoT analyst at Berg Insight. “The shift is fuelling a new wave of investments by established network equipment vendors while also attracting new entrants into the space. The historically supply-driven market is today also increasingly driven by organic demand from end users.”

READ MORE HERE


Trends & regulations in cellular IoT security?

With 18.8 billion connected IoT devices expected by the end of 2024, it’s no surprise that device-level security is a growing concern for regulators. The new Cyber Trust Mark in the U.S. is designed to help consumers easily identify smart devices that meet certain cybersecurity standards like smart home cameras, routers, thermostats and other IoT products. And while that’s currently voluntary, other mandatory measures are coming into force like the EU’s CRA which will see manufacturers bring compliant products to market by 2027. This is in response to a market that previously saw 29% of cellular IoT modules shipped in Q2 2024 with no dedicated protection features.Dive into this report that looks at security considerations for software and hardware in the IoT module supply chain, covering topics like:

  • The role of SBOMs and VEX documents – Manufacturers need to verify that no vulnerable or unauthorised software components are introduced during firmware updates, for example.
  • Anti-tamper measures – Cryptographic signatures and hashes are essential for ensuring software updates and components have not been tampered with during distribution or implementation.
  • Verifying country of origin – Understanding where software comes from helps ensure software components in cellular IoT modules have robust native cybersecurity practices, further protecting IoT devices.
  • Pen testing, hardware-based RoT and trusted vendors – Measures should be taken to also ensure hardware-based security elements, supported by initiatives like IoT SAFE.

This report also suggests best practices; in collaboration with Quectel, that software, hardware and holistic manufacturers should take to ensure vulnerabilities are not present like testing, PKI, robust SBOM and other approaches. To get an edge on device security and prepare your operation for the connected marketplaces of tomorrow, click to access this report now.

READ MORE HERE

That's all! Make sure to subscribe to our newsletter so you never miss out on the latest reports, articles and news from the world of the Internet of Things.


要查看或添加评论,请登录

IoT Now的更多文章

社区洞察

其他会员也浏览了