Explore Apptimate Stuff, Airship and more!

Explore related topics

Apptimate Tech Overview whitepaper Everything you developers want to know about developing secure apps

WHY POSITIONING IS MORE AND LESS THAN CHECK-INS I got inspired by a great post by Natasha Lomas on TechCrunch about location based social networks and check-ins and just wanted to show how PingPal is what she is looking for :)

IoT security improving with developments in onboarding technology and processes. This means that devices will come pre-installed with certificates and necessary software to protect the endpoint device, as well as the last mile between gateway and endpoint (in the most used standards). But then there's still the rest of the system to worry about, from the gateway to the clouds, etc. making up the whole application.

IoT security common sense broken down into 10 steps. Do you follow this? Do you have security common sense? If, not, you have some training to do.

Some IoT applications are targeting Big Data number crunching applications, they will thrive on cloud based IoT platforms. Some need low latency and local processing, like a car that cannot wait for information from a cloud to push the break. So whether or not you should design your architecture for a central cloud or an edge computing "fog" architecture, depends on the needs of the application. But, security is fundamental in all these applications, and how you build it will also depend on…

Connected devices with poorly designed security and weak passwords (if any) has been deployed everywhere. Now, we will start paying the price for thoughtless convenience.

Open & Secure IoT platform with Object Security and End-to-End Payload Encryption by Apptimate.

This report was proven right last Friday with the massive DDoS attack. Will this be a weak-up call for the IoT industry, or do we need even worse incidents?

IoT is not a Big Data solution by default, as many early initiatives assume. Not one big central IoT platform that controls everything. This is because of many different data owners. Take for instance a building where the tenants own their data about their family and usage of their apartment and it’s connected appliances, home networks, TVs, etc. And this has data must be managed in a secure and privacy-protected way, or it will be impossible to lease those flats. Think of the landlord…

Pinterest • The world’s catalogue of ideas
Search