Connected Devices - ReadWrite IoT and Technology News Sat, 09 Dec 2023 00:25:16 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.2 https://readwrite.com/wp-content/uploads/cropped-rw-32x32.jpg Connected Devices - ReadWrite 32 32 The Evolution of Cybersecurity in the Age of IoT and Cloud Computing https://readwrite.com/the-evolution-of-cybersecurity-in-the-age-of-iot-and-cloud-computing/ Sat, 09 Dec 2023 00:24:30 +0000 https://readwrite.com/?p=244901 Evolution of Cybersecurity

The widespread spread of the Internet of Things (IoT) and cloud computing has become obvious in this continually developing tech […]

The post The Evolution of Cybersecurity in the Age of IoT and Cloud Computing appeared first on ReadWrite.

]]>
Evolution of Cybersecurity

The widespread spread of the Internet of Things (IoT) and cloud computing has become obvious in this continually developing tech world. Everyone is embracing the potential of these transformative technologies to improve daily life activities.

Let’s take a look at the advantages and difficulties that come with the prevalent adoption of IoT and cloud computing, revealing insights into the dynamics of modern digital connectivity.

The Rise of IoT

IoT has changed how the world interacts. It has smoothly integrated into almost every aspect of our daily lives, from smart homes and wearable devices to autonomous vehicles and industrial sensors. However, this has also paved the way for cyber threats. There has been a larger avenue for threat actors due to the magnitude of interconnected devices, making traditional measures incompetent.

Cybersecurity has started concentrating on data encryption, device-level security, and robust authentication mechanisms to address security challenges. Presently, manufacturers emphasize that security is incorporated into the plan of IoT devices from the onset. This includes executing secure boot processes, regular firmware updates, and traceability and accountability enhancement using unique devices.

Cloud Computing’s Universality

Business operations have changed from traditional on-premises infrastructure to scalable and flexible cloud-based solutions since the advent of cloud computing. According to Statista, the worldwide public cloud computing market was worth 478 billion dollars in 2022 and is estimated to reach 679 billion dollars in 2024. That’s a whopping 201 billion increase in the space of 2years.

Although Cloud computing brings evident benefits such as availability and cost savings, it also has cyber security challenges. Cloud services are centralized in nature; which implies that a breach could expose a tremendous amount of sensitive data. To tackle these threats, advanced cybersecurity measures focus on data encryption, multi-factor authentication, and strong access controls.

Cloud service providers now invest greatly in advanced security measures, like real-time monitoring, threat intelligence, and automated incident response systems. The shared responsibility model emphasizes the collaboration between cloud providers and their clients –  which has become a foundation of cybersecurity to ensure a comprehensive security posture.

Confluence of IoT and Cloud Computing

The merging of IoT and Cloud Computing has created a mutual relationship that increases both the risks and benefits. The cloud provides the necessary infrastructure for storing, processing, and analyzing the vast amount of data produced by IoT devices. Even so, this connection also presents a complex security landscape.

In the end, cybersecurity aims to create a consistent and secure data flow, so it has evolved to provide end-to-end protection that involves securing the communication channels between devices and the cloud.

For the benefit of the IoT and Cloud Computing ecosystem, cybersecurity solutions apply improved identity and access management and use AI for anomaly detection and to predict threat analysis.

Challenges in the Changing Landscape

Despite the developments in cybersecurity, there are difficulties in the changing landscape of IoT and Cloud Computing.

Different IoT devices each have its own specifications and security protocols, which is a major challenge. In security practices across the industry, standardization is vital for guaranteeing a uniform and robust security posture.

The ever-changing nature of cyber threats is another challenge. As technology changes, so do the techniques employed by cybercriminals; they keep finding new ways to breach security. Cybersecurity Ventures states that global cybercrime costs will grow by 15 percent annually over the next five years, from $3 trillion in 2015 to reaching $10.5 trillion year-over-year by 2025.

Cybersecurity measures need continuous monitoring, regular updates, and joint effort between cybersecurity experts, device manufacturers, and network security providers  – to remain dynamic and versatile in front of rising threats.

The Human Factor

The human factor is an essential component of cybersecurity. While the focus is on technological solutions, users must also be educated on the risks and best practices for maintaining a secure digital environment.

Ransomware attacks, insider threats, and phishing attacks are major concerns. Phishing email statistics show that 1.2 percent of all emails sent are malicious, which translates into 3.4 billion phishing emails daily.

Education and awareness programs are very important. People should be taught to recognize and report these threats, attend cybersecurity forums and events, and they should stay informed about safe online practices, including using strong passwords or password managers.

Also, organizations must hold regular training sessions and conduct strict cybersecurity policies to keep employees informed on the most recent cyber threats and precautions. According to Cybersecurity Ventures, in 2023, global spending on security awareness training for employees is up from around $5.6 billion and is predicted to exceed $10 billion by 2027 – a whole 15 percent yearly increase.

The Future of Cybersecurity

As the world relies on digital networks daily, there is a need to strengthen and improve cybersecurity. Marsh’s U.S. Cyber Purchasing Trends report states that during the first quarter of 2023, insurance for cyber security pricing increased by 11 percent in the U.S. compared to 28 percent in 2022, and the cost is still on the rise.

The future of cybersecurity will be shaped by technologies such as artificial intelligence (AI) – which has an important role to play in threat detection and solutions, quantum computing which might present new decryption challenges and solutions, and 5G networks.

Although the spread of 5G networks will result in faster speed and connectivity, it can also give way to cyber threats. Therefore, getting the right foundation of 5G networks on vital systems and services is necessary to get ahead of attacks.

Conclusion

The evolution of cybersecurity is a continuous ride and is constantly changing. With the emergence and merging of technologies like IoT and Cloud Computing, there has been an increase in the risks of cyber threats, and cybercriminals find new ways to breach security daily.

Managing these challenges requires teamwork and an extensive security strategy. This strategy should aim to improve the digital ecosystem’s connection and make the digital future secure. It should also involve education, regular monitoring, a combination of all the latest technologies, and the creation of cybersecurity awareness.

Featured Image Credit: Tima Miroshnichenko; Pexels

The post The Evolution of Cybersecurity in the Age of IoT and Cloud Computing appeared first on ReadWrite.

]]>
Pexels
New Stanford biodegradable wearable takes your data to its grave https://readwrite.com/stanford-unveils-a-new-wearable-marvel-dl1/ Sun, 14 May 2017 03:00:51 +0000 https://readwrite.com/?p=98098

A wearable electronic device that can dissolve in vinegar and is currently considered to be the lightest, thinnest electronic device, […]

The post New Stanford biodegradable wearable takes your data to its grave appeared first on ReadWrite.

]]>

A wearable electronic device that can dissolve in vinegar and is currently considered to be the lightest, thinnest electronic device, was recently unveiled by researchers at Stanford University. This technology can help reduce electronic waste while maintaining privacy.

See Also: How personal beacons can help keep women safe

The need for biodegradable tech in an era when new gadgets are constantly being introduced and quickly discarded, causing tons of electronic waste, presented the key concern and main focus for the team of researchers who have shared this new device. The team designed this wearable electronic device to totally dissolve when vinegar is poured on it.

Having a biodegradable wearable option presents an answer to the privacy problem that occurs when new devices are discarded in favor of new ones, hoping that the cautionary measures taken to erase old data are effective enough to keep it from falling into the wrong hands.

The decomposing polymer that the device is made of ranks as one of the thinnest and lightest electronic gadgets that’s ever been made. The team has synthesized the biodegradable semiconductor by utilizing a molecule taken from tattoo ink, and has created a base by weaving plant fibers into a new, extra-thin film.  Inside the structure are embedded electronics. When placed in vinegar, or even a less acidic liquid, the entire thing melts away within a 30 day timeframe.

An answer to e-waste?

In the near future, this technology will likely be used for storing sensitive digital information that could rapidly and easily be destroyed and kept a secret. It can also possibly be used for biological sensors, and implantable medical devices.  Testing has been done with the device in mice to research whether this idea would work.  The device is currently still not safe for use in humans. But it may be in the future.

According to an ENDS Europe agency report about electronic waste, due to an increasing built-in obsolescence, in 2012 defective appliances were replaced at the rate of 8.3 percent, which is an increase from 3.5 percent in 2004. Recent studies share that a huge majority of young adults own smartphones, and approximately 30 percent of American upgrade their phones every two years. This helps add to a huge amount of waste that estimates show will produce more than 50 million metric tons of electronic waste by 2018.  

The solution to this problem looks as though it may be here, with this new biodegradable wearable. Electronic waste is a real problem, causing poisonous groundwater by leaching hazardous materials like mercury into the ground.

The post New Stanford biodegradable wearable takes your data to its grave appeared first on ReadWrite.

]]>
Pexels
How to Use Voice Assistants in Your Home https://readwrite.com/how-to-use-voice-assistants-in-your-home/ Wed, 18 Oct 2023 17:00:18 +0000 https://readwrite.com/?p=237794 Voice Assistants for Home

How to Use Voice Assistants in Your Home In an increasingly interconnected world, voice assistants have emerged as transformative tools […]

The post How to Use Voice Assistants in Your Home appeared first on ReadWrite.

]]>
Voice Assistants for Home

How to Use Voice Assistants in Your Home

In an increasingly interconnected world, voice assistants have emerged as transformative tools for simplifying daily life.

These intelligent digital companions, like Amazon’s Alexa, Google Assistant, and Apple’s Siri, have revolutionized the way we interact with our homes.

From controlling smart devices to answering questions and managing schedules, this article explores the myriad ways you can harness voice assistants’ power to enhance convenience and efficiency within your living space.

What are Voice Assistants?

Voice assistants are artificial intelligence (AI) software programs designed to understand and respond to spoken language commands or questions from users. They use natural language processing (NLP) and voice recognition technology to interpret and process human speech.

Voice assistants can perform a wide range of tasks, including answering questions, providing information, setting alarms and reminders, controlling smart home devices, sending messages, making calls, and more.

Popular voice assistants include Amazon’s Alexa, Apple’s Siri, Google Assistant, Microsoft’s Cortana, and Samsung’s Bixby. These digital assistants are commonly found on smartphones, smart speakers, and other connected devices, offering users a convenient and hands-free way to interact with technology and access information and services.

Voice assistants continue to evolve, becoming increasingly integrated into various aspects of daily life, from entertainment and home automation to productivity and personal assistance.

How to Set Up and Use Voice Assistants in Your Home?

Here are the steps to set up and use voice assistants like Amazon Alexa, Google Assistant, or Apple’s Siri in your home:

1. Choose a Voice Assistant

Decide which voice assistant ecosystem you want to use. Standard options include Amazon Alexa, Google Assistant, and Apple Siri.

2. Purchase Compatible Devices

Ensure you have compatible smart devices that your chosen voice assistant can control. This includes smart bulbs, plugs, thermostats, locks, and more. Check for compatibility with your voice assistant of choice.

3. Set Up Your Voice Assistant

Follow the setup instructions for your voice assistant device (e.g., Amazon Echo, Google Home, Apple HomePod). Typically, this involves connecting it to your Wi-Fi network and linking it to your voice assistant account.

4. Connect Smart Devices

Use the voice assistant app on your smartphone or tablet to discover and connect your smart devices. This often involves following on-screen instructions to pair your devices with your voice assistant.

5. Customize and Name Devices

Assign names and labels to your connected devices that are easy to remember. For example, if you have a smart touchless kitchen faucet  in your kitchen, name it “Kitchen Faucet.”

6. Learn Voice Commands

Familiarize yourself with the voice commands your voice assistant understands. For example, you might say, “Hey Alexa, turn off the lights,” or “Hey Google, set the thermostat to 72 degrees.”

7. Control Devices with Voice

Use your voice assistant to control connected devices. Simply say the wake word (e.g., “Alexa,” “Hey Google”) followed by your command. For example:

  •   “Hey Siri, play my favorite playlist.”
  •   “Hey Google, turn on the coffee maker.”
  •   “Alexa, what’s the weather forecast for today?”

8. Set Up Routines and Automations 

Many voice assistants allow you to create routines or automation. For example, you can set up a “Good Morning” routine that turns on the lights, adjusts the thermostat, and provides the weather forecast when you say, “Good morning.”

9. Control Devices Remotely

Use the voice assistant app on your smartphone to control your devices while away from home. This can be useful for adjusting thermostats or checking security cameras.

10. Explore Third-Party Integrations 

Many voice assistants support third-party integrations, allowing you to control various devices and services. For example, you can connect your voice assistant to music streaming services, smart home security systems, and more.

11. Privacy and Security

Be mindful of your privacy and security settings. Review and adjust permissions as needed to protect your data.

12. Regular Updates

Ensure your voice assistant device and its companion app are regularly updated to receive new features and security patches.

Note: Remember that the specific steps and commands may vary depending on the brand and model of your voice assistant and smart devices. Always refer to the user manuals and official documentation for detailed instructions.

Advanced Voice Assistant Capabilities

Advanced voice assistants have evolved significantly in recent years, offering many capabilities extending beyond basic voice recognition and simple commands. Some of the advanced capabilities of voice assistants include:

Natural Language Processing (NLP)

Advanced voice assistants can understand and respond to natural, conversational language rather than rigid commands. This makes interactions with the assistant feel more intuitive and human-like.

Multimodal Interaction

Voice assistants can work in tandem with visual interfaces. For instance, they can display information on screens, provide visual feedback, or process commands involving voice and touch inputs, like smartphones or smart displays.

Context Awareness

These assistants can remember previous interactions and use that context to provide more relevant responses. For example, if you ask, “Who is the president?” and then follow up with “How tall is he?” the assistant will understand that you’re still talking about the same person.

Multi-Step Tasks

Advanced voice assistants can perform complex, multi-step tasks. For instance, they can help you plan a trip by booking flights, reserving hotels, and scheduling transportation—all through a single conversation.

Personalization

They can recognize individual users by their voices and tailor responses or recommendations based on the user’s preferences and history. This is especially useful for tasks like music recommendations or calendar management.

Integration with Third-Party Apps and Services

Voice assistants can connect with a wide range of third-party apps and services, allowing users to control smart home devices, order food, make reservations, and perform other tasks through voice commands.

Continuous Learning

These assistants continually improve their understanding and responses through machine learning algorithms, which means they better understand and assist users over time.

Voice Commerce

Users can shop online, place orders, and make payments through voice assistants. This includes adding items to a shopping cart, checking out, and even tracking deliveries.

Voice Search

Advanced search capabilities enable voice assistants to retrieve information from the internet effectively. You can ask them questions, request specific facts, or search for local businesses and services.

Emotional and Sentiment Analysis

Some advanced voice assistants can detect emotional cues in a user’s voice, providing a more empathetic and tailored response. For instance, they might adjust their tone when speaking to a user who sounds upset.

Security and Authentication

They can use voice recognition as a form of biometric authentication to unlock devices or access sensitive information, enhancing security.

Language Support

Advanced voice assistants can understand and respond in multiple languages and dialects, making them accessible to a broader audience.

Privacy and Security Concerns Users Should Be Aware Of

While advanced voice assistants offer numerous benefits and convenience, they also raise significant privacy and security concerns that users should be aware of:

1.  Voice Data Storage 

Voice assistants typically store voice recordings of user interactions, often on remote servers. These recordings may be kept indefinitely, and concerns arise over who has access to these recordings and how they are used.

2. Data Breaches 

If the servers holding voice data are compromised, sensitive information can be exposed. This may include personal conversations, financial information, or other private details.

3. Eavesdropping

There have been instances where voice assistants mistakenly activate and record conversations without user initiation, leading to concerns of inadvertent eavesdropping by tech companies.

4. Data Mining and Profiling 

Companies may use the data collected from voice interactions to create detailed user profiles, which can be used for targeted advertising or even sold to third parties, raising concerns about user privacy.

5. Accidental Activation

Voice assistants can sometimes activate unintentionally, especially if their wake word or phrase is similar to common speech patterns. This can lead to unexpected recordings and privacy breaches.

6. Third-Party Apps

Users who grant third-party apps access to their voice assistant may inadvertently expose their data to additional security risks if those apps have vulnerabilities.

7. Authentication Risks

While voice recognition can be a convenient authentication method, it may not be as secure as other forms of biometric authentication, as voiceprints can be mimicked or recorded without consent.

8. Device Security

Voice assistants are often integrated into various devices, including smartphones and smart speakers. If these devices are compromised, attackers can access the voice assistant’s functionality and potentially sensitive information.

9. User Profiling and Targeting

The information collected by voice assistants can be used to build detailed user profiles, leading to personalized advertising. Still, it also raises concerns about manipulating user behavior and opinions.

10. Children’s Privacy

Voice assistants may not always differentiate between adult and child voices, potentially collecting data from underage users without proper consent or safeguards.

To address these concerns, users need to take steps to protect their privacy and security when using voice assistants:

Review Privacy Settings

Check the privacy settings on your voice assistant and associated accounts to understand what data is being collected and how it’s used. Adjust settings to enhance your privacy.

Use Strong Authentication

If voice recognition is used for authentication, consider using additional authentication methods, such as PINs or passcodes, for sensitive tasks.

Monitor Voice History 

Regularly review and delete voice recordings stored by your voice assistant to minimize the data collected and stored.

Be Cautious with Third-Party Apps

Be selective when granting access to third-party apps and ensure they have reputable privacy policies and security measures in place.

Disable Voice Assistants When Not in Use

Turn off voice assistants or mute the microphone when you’re not actively using them to minimize the risk of accidental activation.

Keep Software Updated

Ensure that all devices and apps connected to your voice assistant are up to date with the latest security patches.

Educate Yourself

Stay informed about the privacy policies and practices of the companies behind voice assistants, and be cautious about sharing sensitive information through them.

Conclusion

Voice assistants have transformed our homes into smart, responsive environments, offering unparalleled convenience and efficiency.

As we’ve explored their myriad possibilities, it’s evident that harnessing their power requires a balance between convenience and privacy.

By understanding their advanced capabilities and implementing security measures, we can make the most of voice assistants while safeguarding our personal information.

Embracing these digital companions opens doors to a future where technology seamlessly enhances our daily lives.

Featured Image Credit: Provided by the Author; Pexels; Thank you!

The post How to Use Voice Assistants in Your Home appeared first on ReadWrite.

]]>
Pexels
Unmasking Oospy: dismantling global spyware menace https://readwrite.com/unmasking-oospy-dismantling-global-spyware-menace/ Sun, 08 Oct 2023 03:00:51 +0000 https://readwrite.com/?p=240330 Unmasking Oospy

A spyware operation known as Oospy has been dismantled after its web host, Hetzner, deactivated its back-end server. Oospy was […]

The post Unmasking Oospy: dismantling global spyware menace appeared first on ReadWrite.

]]>
Unmasking Oospy

A spyware operation known as Oospy has been dismantled after its web host, Hetzner, deactivated its back-end server. Oospy was essentially a rebranded version of a phone monitoring application that enabled surveillance of tens of thousands of Android devices globally. The original app was targeted and hacked, resulting in its shutdown. Following the shutdown, Oospy’s creators continued to modify and distribute their software under different names in an effort to evade detection and maintain their nefarious activities. Despite the dismantling of Oospy, cybersecurity experts warn users to remain vigilant, as similar spyware operations continue to pose significant threats to user privacy and digital security.

The Back-End Server is Still a Lingering Threat to Privacy

Although the original app’s website was taken down, the back-end server continued to communicate with the monitored devices. This allowed administrators to launch Oospy without interrupting the ongoing surveillance. The server was hosted on a different domain and housed stolen data from numerous devices. Consequently, this enabled the unauthorized gathering of personal information and sensitive data, posing significant privacy and security risks.

It wasn’t until cybersecurity experts stepped in to counteract this threat that the troublesome server was dismantled, effectively bringing an end to this intrusive surveillance operation.

Combined, the original app and Oospy had a minimum of 60,000 global phone surveillance victims, with thousands in the United States. This extensive breach of privacy has alarmed cybersecurity experts and government officials, who are now working to assess the overall impact and potential threats posed by this surveillance campaign. Efforts are also being taken to identify the perpetrators behind it and prevent further exploitation of mobile devices.

Oospy Got a Lot

Oospy collected a wide range of data, including contacts, messages, pictures, call logs, recordings, and location details. The gathered data provided detailed insights into users’ lives, leading to concerns about privacy and the intentions of the app creators.

Terminating the spyware’s back-end server effectively ends Oospy and its predecessor’s operations, significantly crippling the cyber espionage capabilities of the threat actors behind these campaigns. This decisive action not only dismantles a major surveillance tool used by malicious actors, but also sends a strong message that such invasive tactics will not be tolerated.

The more significant issue here is privacy concerns with phones and the Internet. In addition to these disappearing phone surveillance activities, there is a growing concern regarding individual privacy and the extent to which companies and organizations collect user data. As technology continues to advance, it becomes increasingly vital for consumers to be aware of potential risks and for governments to implement necessary regulations to protect the rights of individuals.

Featured Image Credit: Photo by Antoni Shkraba; Pexels; Thank you!

The post Unmasking Oospy: dismantling global spyware menace appeared first on ReadWrite.

]]>
Pexels
How LoRaWAN and Massive IoT are Reshaping Business and Society https://readwrite.com/how-lorawan-and-massive-iot-are-reshaping-business-and-society/ Fri, 01 Sep 2023 18:00:58 +0000 https://readwrite.com/?p=232860 Reshaping Business and Society

Over the past several years, the Internet of Things (IoT) has reached new heights. We now find ourselves on the […]

The post How LoRaWAN and Massive IoT are Reshaping Business and Society appeared first on ReadWrite.

]]>
Reshaping Business and Society

Over the past several years, the Internet of Things (IoT) has reached new heights. We now find ourselves on the cusp of the “Massive IoT” era, where the technology is reaching a nearly unimaginable scale due to the number of sensors and devices entering the market. Along with that comes new possibilities to operate businesses and address global challenges that were not feasible even five years ago.

Valuable use cases are already forming across industries, creating new ways to monitor resources, optimize processes, and save costs. Sensor devices deliver data about an asset’s location, condition, and other time-sensitive operational statuses that help prevent costly losses or potential liabilities. However, in order for the IoT to function correctly as it continues to grow, its ability to scale hinges on the expansion of Low Power Wide Area Networks (LPWANs) designed to support large-scale deployments of sensors that work seamlessly for decades at a time. Additionally, these networks need to be able to support different public and private deployment models, simplify the management of networking tasks, and scale on demand as needs and priorities change.

LoRaWAN has surged ahead of competing LPWAN solutions in meeting those needs due to its unique combination of cost efficiency, low power consumption, long-range, and non-proprietary model. Because of its functionality, according to the LoRa Alliance, it now leads global, at-scale LPWAN deployments across all metrics, ranging from the most solutions available, devices deployed, messages sent, and network availability, with coverage offered in more than 76,000 cities in 188 countries.

The value provided by large-scale IoT sensor deployments far outweighs the costs of moving away from legacy technologies and manual processes, which require relying on networks that are ill-fit to the requirements of the devices they support and lack the flexibility to adapt. To that end, the following three examples illustrate how IoT connectivity using LPWAN networks like LoRaWAN is improving public safety, conserving resources, and providing other unprecedented benefits by enabling businesses to do far more than they ever could.

Smart buildings and campuses – improving air quality

Smog, wildfires and other sources of pollution create unhealthy air that impacts health. Recent research by the American Lung Association found that 40% of the country lives in areas with failing grades of particle pollution or ozone. But poor air quality can extend to inside buildings and campuses too. For example, the pandemic taught us the importance of proper ventilation and good indoor air quality.  Sensor monitoring can help in both environments, not only giving states and municipalities an easy way to monitor environmental safety conditions like wildfire smoke or other air pollution, but enabling building owners to monitor indoor air quality.

Indoor air quality (IAQ) monitoring aims to measure and reduce pollutants indoors for the health and comfort of a building’s occupants, to ensure proper ventilation, air processing and filtration. Using sensors to monitor IAQ in smart building and campus environments helps to identify and reduce air pollution, viruses, and contamination that cause occupants discomfort and respiratory issues.

When deployed, IoT sensors provide building managers temperature, humidity, and CO2 level data. In the event a potential danger is detected, managers can execute remote commands and alarms to alert anyone in the building. The sensors also help to gather data to optimize heat or air conditioning usage, giving building owners the added benefit of saving energy costs.

To effectively monitor air quality, IoT devices require network connectivity to share data. To do that, their signals need to be able to pass through building materials without being blocked, never lose power, and periodically send small data packets. LoRaWaN supports this functionality and communication. Once building owners and operators have the data, they can further analyze it to identify where ventilation needs to be improved or where liabilities exist.

Natural Gas – preventing dangerous leaks

Like CO2 and poor air quality, methane and natural gas leaks are common and potentially an even more dangerous hazard. Outside of building environments, leaks can occur in pipelines and other related infrastructure. Methane leaks in urban areas have been reported to be more than two times higher than EPA estimates, which is why many gas utilities are implementing sensing and alerting systems with valve shut-off capabilities to provide more visibility and improve public safety wherever possible.

With sensors spread throughout all their infrastructure, gas utilities can gain complete awareness and control of their gas distribution systems, including automating the secure shutdown of single or multiple valves. In the past, natural gas utilities were unaware of leaks until long after they occurred, at which point most damage was already done.

These automated systems that detect hazards and shut off the flow of gas improve safety and reduce the risk of life-threatening incidents for residential and commercial building owners. Their connectivity needs to always work and communicate across long distances due to the spread-out nature of infrastructure. Additionally, using LoRaWAN to connect these sensors opens the possibility of obtaining additional property management sensor data to prevent things like water leaks, rodents, HVAC malfunctions, and more.

Water Utilities – conserving a resource that is becoming scarce

As we have seen in recent years, droughts are becoming far more common. Municipalities, water utilities, and residents must work together to conserve and distribute water.

Smart water metering in residential and commercial properties allows water utilities to measure trends in water usage wherever it is delivered without manual intervention. IHS Markit forecasts that almost 50 million smart water meters will ship globally in 2023, roughly four times more than in 2017.

Advanced Metering Infrastructure (AMI) is not limited to Automatic Meter Reading (AMR), which allows utilities to bill customers directly based on their usage data. The data collected can also help reduce water loss through improved leak detection, streamline billing through enhanced water flow monitoring, and implement new rate structures to incentivize water conservation among customers. Additionally, the two-way communication between utilities and their metering devices can improve infrastructure diagnostics, provide advanced data analytics, and enhance field operations – all while giving tenants more detailed information about water consumption.

Perhaps most beneficial for water utilities, the wireless communication networks deployed by modern AMI systems are ideal for supporting multiple water metering and management applications. Establishing a shared LoRaWAN network infrastructure allows municipalities to support a wide range of commercial and citizen-facing applications beyond just water AMI.

Why LoRaWAN

For large-scale IoT deployments with relatively low data payloads that seldom require low latency — such as water metering and infrastructure monitoring – LoRaWAN has proven to be a cost-effective new technology investment and long-term replacement option for legacy systems. For critical infrastructure and essential enterprise IoT projects, LoRaWAN remains the leading choice given its open standards, propagation characteristics, extended end-device battery life, ease of deployment, and low cost.

Since its inception, LoRaWAN has been designed to connect low-cost, battery-operated sensors over long distances wirelessly. Once established, a LoRaWAN network is designed to support the broader set of resource conservation and sustainability initiatives prioritized at municipal levels across the country and worldwide today. Additionally, LoRaWAN’s open standards mean that end users can deploy ever-growing LoRaWAN-enabled devices on the network, offering more flexibility in deployment and more devices that function with the network compared to proprietary connectivity solutions.

As businesses and municipalities consider how data can be used to optimize their operations and services, they must also consider the networks on which IoT devices and their data depend. With LoRaWAN, organizations across industries can realize the cost, safety and resource conservation benefits of the Internet of Things.

Featured Image Credit:

The post How LoRaWAN and Massive IoT are Reshaping Business and Society appeared first on ReadWrite.

]]>
Pexels
Ethical Considerations in IoT Data Collection https://readwrite.com/ethical-considerations-in-iot-data-collection/ Thu, 17 Aug 2023 17:00:49 +0000 https://readwrite.com/?p=231445 Ethical IoT Data Collection

Last year, a court determined Richard Dabate — who police had found with one arm and one leg zip-tied to […]

The post Ethical Considerations in IoT Data Collection appeared first on ReadWrite.

]]>
Ethical IoT Data Collection

Last year, a court determined Richard Dabate — who police had found with one arm and one leg zip-tied to a folding chair in his home — was guilty of his wife’s murder. His elaborate story of a home invasion might have held water had it not been for Connie Dabate’s Fitbit, which showed her moving around for an hour after the alleged intruder took her life.

Few would argue this was a case of unethical data collection, but ethics and privacy have a complicated, at times sordid history. Rising from the ashes of such experiments as Henrietta Lacks’ cancer cell line, in which a biologist cultured a patient’s cells without her knowledge or consent, a new era of privacy ethics is taking shape — and it has people questioning right from wrong.

What Is IoT?

The Internet of Things (IoT) is shorthand for the vast, interconnected network of smart devices that collect and store information online. Projected to be worth over $1 trillion by 2030, it includes appliances people use at home — like TVs, voice assistants, and security cameras — as well as infrastructure like smart streetlights and electric meters. Many businesses use IoT to analyze customer data and improve their operations.

Unethical Data Collection and Use

There’s no question that IoT data is helpful. People use it for everything from remotely turning off the AC to drafting blueprints for city streets, and it has enabled significant improvements in many industries. However, it can also lead to unethical data collection and applications.

For example, using a person’s demographic information without their consent or for purposes beyond marketing and product development can feel like a breach of trust. Data misuse includes the following violations.

1. Mishandling Data

Collecting and storing vast amounts of data brings ethics and privacy into question. Some 28% of companies have experienced a cyberattack due to their use of IoT infrastructure, and these breaches often expose people’s sensitive or confidential information.

The average data breach cost in 2022 was $4.35 million — and a loss of consumer trust. For example, hospital network hacks can reveal patients’ medical history, credit card numbers, and home addresses, leaving already-struggling people even more vulnerable to financial woes. The loss of privacy can make people wary about using a service again.

Mishandling data isn’t unique to IoT devices, of course — 40% of salespeople still use informal methods like email and spreadsheets to store customer info, and these areas are also targets for hackers. But IoT devices often collect data beyond what you’d find on a spreadsheet.

2. Collecting Highly Personal Info

Home IoT devices are privy to uniquely private data. Although 55% of consumers feel unseen by the brands they interact with, many people would be shocked at how much businesses actually know about them.

Some smartwatches use body temperature sensors to determine when a user is ovulating, guessing their fertility levels, or predicting their next period. Smart toothbrushes reduce dental insurance rates for people who brush regularly and for the recommended two-minute interval.

In many cases, smart devices collect as much information as a doctor would, but without being bound by pesky HIPAA privacy laws. As long as users consent, companies are free to use the data for research and marketing purposes.

It’s an easy way to find out what customers really want. Like hidden trail cameras capturing snapshots of elusive animals, smart devices let businesses into the heart of the home without resorting to customer surveys or guesswork.

3. Not Following Consent and Privacy Ethics

It’s one thing to allow your Alexa speaker to record you when you say its name; most users know this feature. However, few realize Amazon itself holds onto the recordings and uses them to train the algorithm. There have also been cases where an Amazon Echo secretly recorded a conversation and sent it to random people on the users’ contact list, provoking questions about unethical data collection and privacy ethics.

Getting explicit consent is crucial when collecting, analyzing, and profiting off of user data. Many companies bury their data use policies deep in a terms-and-conditions list they know users won’t read. Some use fine print many people struggle to make out.

Then, there’s the question of willing consent. If users have to sign up for a specific email service or social media account for work, do they really have a choice of whether to participate in data collection? Some of the most infamous cases of violating privacy ethics dealt with forced participation.

For example, U.S. prisoners volunteered to participate in studies that would help the war effort during World War II. Still, they could not fully consent because they were physically trapped in jail. They tested everything from malaria drugs to topical skin treatments. Some volunteered in exchange for cigarette money or to potentially shorten their sentences.

Even if users give explicit consent, most people now consider collecting data — medical or otherwise — unethical by coercing people into doing so. Collecting data from people unaware they’re giving away sensitive information is also an ethics and privacy violation.

Characteristics of Ethical Data Use

How can data scientists, marketers, and IoT manufacturers keep users’ best interests in mind when collecting their data?

1. Ask for Permission

It’s crucial to always ask before using someone’s data — and ensure they heard you. IoT devices should come with detailed information about how the device will collect data, how often it will do so, how it will use the information, and why it needs it in the first place. These details should be printed in a clear, legible, large font and not be buried deep in a manual heavy enough to use as a paperweight.

2. Gather Just Enough

Before collecting information, decide if you really need it. How will it help advance your company’s objectives? What will you and your customers gain from it? Only gather data relevant to the problem at hand, and avoid collecting potentially sensitive information unless absolutely necessary.

For example, smart beds can track users’ heart rates, snoring, and movement patterns, but they can also collect data about a person’s race or gender. How many of these metrics are necessary for marketing and product development purposes?

3. Protect Privacy

After gathering data, keep it hidden. Strong cybersecurity measures like encryption and multi-factor authentication can hide sensitive data from prying eyes.

Another way to protect consumer privacy is to de-identify a data set. Removing all personally identifiable information from a data set and leaving just the numbers behind ensures that even if someone leaks the data, no one can connect it to real people.

4. Examine Outcomes

How might your data be used — intentionally or not — for other purposes? It’s important to consider who your data could benefit or harm if it leaves the confines of your business.

For example, if the data becomes part of an AI training set, what overall messages does it send? Does it contain any inherent biases against certain groups of people or reinforce negative stereotypes? Long after you gather data, you must continually track where it goes and its effects on the world at large.

Prioritizing Ethics and Privacy

Unethical data collection has a long history, and IoT plays a huge role in the continued debate about privacy ethics. IoT devices that occupy the most intimate of spaces — the smart coffee maker that knows you’re not a morning person, the quietly humming, ever-vigilant baby monitor — give the most pause when it comes to data collection, making people wonder if it’s all worth it.

Manufacturers of smart devices are responsible for protecting their customers’ privacy, but they also have strong incentives to collect as much useful data as possible, so IoT users should proceed with caution. It’s still a wild west for digital ethics and privacy laws. At the end of the day, only you can decide whether to unwind with a smart TV that might be watching you back — after all, to marketing companies, you are the most interesting content.

Featured Image Credit:

The post Ethical Considerations in IoT Data Collection appeared first on ReadWrite.

]]>
Pexels
If You Have a Smartphone, Do You Even Need Home Internet? https://readwrite.com/smartphone-home-internet/ Fri, 14 Jul 2023 19:00:00 +0000 https://readwrite.com/?p=232755 home internet

Most smartphone plans come with data and internet access, so why would you need a separate home internet connection through […]

The post If You Have a Smartphone, Do You Even Need Home Internet? appeared first on ReadWrite.

]]>
home internet

Most smartphone plans come with data and internet access, so why would you need a separate home internet connection through a cable or DSL connection? Although it seems redundant, there are some reasons to get home internet.

If you’re like most people, you can’t function without the internet at home. Having internet access outside the office has become more of a utility than a luxury in the last decade, especially if you manage social activities with groups, meetups, or community centers. Most people don’t connect solely over phone calls and, instead, prefer using email and social media to keep in touch and make plans.

Even though you need internet in your house, that doesn’t mean you necessarily need a separate internet connection. If you own a smartphone, you can use your plan’s data to access the internet or get a plan with more data if you don’t already have enough. The difference is that with a separate connection, you’ll access the internet via Wi-Fi through your phone rather than directly using your phone’s data. Both are workable options for getting a connection, but they differ in terms of cost, speed, and reliability.

Nine Reasons You Need Home Internet

If any of the following situations apply to you, it’s safe to say you’ll benefit from having a separate home internet connection in addition to your smartphone’s data plan.

1. Home internet is affordable.

When it doesn’t cost much to get an internet connection in your house, why not go for it? If you can afford it and have a use for it, there’s no reason not to get it.

It’s understandable if you want to avoid paying for yet another internet connection. A smartphone is an investment. You probably paid a good amount of money for your device, a durable, rugged phone case, and monthly plans aren’t always cheap. However, if you can get a home internet connection without overpaying, why not get one so you don’t have to worry about being charged for using too much data?

2. You need a high-speed connection.

If speed matters, and you can’t compromise here, then you need an internet connection in your house. No matter how fast the internet connection on your phone gets, it won’t compare to the fastest home connection speeds offered by the top cable internet companies. All wireless internet connections are slower than wired connections by default. Although some cell phone connections can get pretty fast, they still don’t compare to home internet.

For those still using 4G LTE, you can expect download speeds of between 5-12 Mbps. If you have access to a 5G device and network, you can get download speeds of up to 450 Mbps. With other devices, like the Meshforce M7, you can get up to 867 Mbps (theoretically).

When it comes to home internet, Xfinity’s download speeds range from 50 Mbps to 6 Gbps. T-Mobile’s home internet download speeds are still fast, but slightly slower, ranging from 33-182 Mbps.

Why the difference? T-Mobile only offers a fixed wireless connection. Wireless connections are always slower than if you were to use a cabled connection. When your internet connection is wired, as with Xfinity, you have the option of using a router to create a Wi-Fi connection, but you still have the option of using an Ethernet cable. You don’t have any hardwired options with a fixed wireless connection.

For most people, speed won’t be an issue. Hardly anyone would complain about any of the speeds mentioned above. However, if you need to perform work that requires super high speed, like downloading and uploading massive files on a regular basis, you probably need home internet.

3. You live in a remote area with poor or no cell reception.

No matter how great your smartphone is, even the fastest internet connection can’t overcome the problem of no service. If you live in an area that doesn’t get much or any reception at home, the only option you have is to get a home internet connection.

There are many rural areas that don’t have a lot of cell towers nearby, and some areas don’t even have the infrastructure for fiber optic cable internet connections. However, as long as you have a physical landline phone connection, you can at least get DSL in your home. Or, you can buy the equipment for satellite internet, like Starlink, if it’s available in your area.

4. You need to work on a standard laptop or desktop.

One of the biggest advantages of home internet is being able to broadcast a Wi-Fi signal throughout your house. If you need to work on a desktop or laptop computer, then home internet is a must.

It’s possible, but not practical, to use your smartphone as a hotspot or tether your internet connection to another device. Tethered connections via USB and Bluetooth tend to be slow, and it’s not easy to set up. While many people use both of these methods to get online at home, it can be a frustrating experience.

When you have a separate internet connection in your home, you only need to plug in an Ethernet cable or connect to Wi-Fi to get online from your laptop. If you use DSL, you have to set up a PPoE connection, but that’s just entering a username and password. It’s still relatively easy compared to tethering.

5. A mobile hotspot didn’t work for you.

If you need internet outside of what your smartphone can provide, you may have looked into hot spots. At first glance, they seem like a great idea. You get this little device that you can take anywhere and use with any device, even your phone if you want to preserve your data. However, there are several downsides to hot spots.

First, you have to pay more money upfront to buy a hot spot that is capable of higher speeds. Then, you have to pay a monthly fee for the connection. This can be done on a month-to-month prepaid basis, or you can sometimes pay for a full year in advance and get a discount. However, the prices aren’t that cheap and the speeds can be pretty slow.

If you tried using a hot spot and that didn’t work out for you, consider getting home internet. Your connection and speed will be more reliable and you’ll probably end up paying less.

6. You play games or stream movies often.

Smartphones are more than capable of streaming movies and running games, but that doesn’t mean your experience will be smooth. Even when your device has the resources required to stream movies and run games, that doesn’t mean your internet connection can keep up the pace.

If you’ve noticed your movies or games slowing down, glitching, getting frozen, or crashing your smartphone, it could be caused by a slow internet connection. If this is your experience, and you want to play games or binge-watch Netflix and YouTube videos, get a home internet connection fast enough to meet your needs. Also, if you’re the only one using the connection, you can get away with a slower speed than you might think, which will cost you less per month.

7. You need multiple, simultaneous connections.

Do you have multiple people in your home who want to stream movies and access the internet for other purposes? If everyone in your house is using their phone’s data to use the internet all night long, it makes more sense to get a home internet connection, connect a router, and broadcast the Wi-Fi signal for everyone to share.

8. You plan to rent out a room or area on your property.

If you’re planning on renting out a room in your home, or another building on your property, it’s a smart move to get a home internet connection so that you and your tenant can share the Wi-Fi. Most renters expect the internet as a perk, and it’s actually a great way to get a renter to move in quickly.

Instead of charging for rent plus internet, include internet in the rent and just bump the price up by around $20-$30 per month. For example, if you’d normally charge $550 for the room, rent it for $570 with internet included.

9. You pay too much for streaming TV services.

If you’re fed up with how much you pay for streaming services just to watch television and movies, consider getting a home internet connection to get TV and internet in one. You can also connect your game systems, tablets, and phones to the Wi-Fi and avoid using your phone’s data.

Is Home Internet Worth It? Absolutely.

Using the internet connection on your smartphone is convenient, but it can be costly and slow. It can also be inconvenient if you need a better connection that just isn’t possible with your device.

When you get home internet, you’ll not only be able to consolidate your TV and internet bills into one company, but you can usually get a good new customer deal that will last for a year or two. You’ll have the ability to share your connection with the rest of your household through Wi-Fi, and you’ll probably end up saving money in the long run.

The post If You Have a Smartphone, Do You Even Need Home Internet? appeared first on ReadWrite.

]]>
Pexels
How the Application of AI in Threat Detection Will Revolutionize Cybersecurity https://readwrite.com/how-the-application-of-ai-in-threat-detection-will-revolutionize-cybersecurity/ Sun, 25 Jun 2023 13:30:25 +0000 https://readwrite.com/?p=231285

The increasing sophistication and pervasiveness of cyber threats keep businesses on their toes — 493.33 million attacks were reported in […]

The post How the Application of AI in Threat Detection Will Revolutionize Cybersecurity appeared first on ReadWrite.

]]>

The increasing sophistication and pervasiveness of cyber threats keep businesses on their toes — 493.33 million attacks were reported in 2022. It’s no surprise that organizations constantly seek new ways to strengthen their security systems.

Integrating artificial intelligence (AI) into threat detection systems is one of the most promising approaches for advancing security measures because it employs a proactive approach to threat detection and provides a level of sophistication and accuracy previously unachievable.

Let’s explore how AI can be integrated to make systems more secure and capable of detecting highly sophisticated attacks.

AI Integration With User and Entity Behavior Analytics (UEBA)

User and Entity Behavior Analytics (UEBA) is a formidable force in security analytics, playing a critical role in threat detection. Through machine learning algorithms, UEBA excels at identifying abnormal or irregular behavior within any network, fortifying defenses against potential threats with an additional layer of protection.

It establishes baseline behavior patterns for users and entities, equipping the system to recognize deviations from the norm that may signify a potential security breach. By meticulously analyzing diverse data points, it flags suspicious or unconventional activities that demand attention.

In the past, UEBA has been an effective threat detection strategy. However, with the relentless progress of AI technology, UEBA’s capabilities have been exponentially expanded. For one, AI-powered systems possess the prowess to process and analyze massive volumes of data with unrivaled efficiency. This is ushering in an era of heightened accuracy and swifter detection of potential threats.

By seamlessly integrating AI algorithms into UEBA systems, organizations stand to reap a wealth of benefits; enhanced detection capabilities, bolstered accuracy, and accelerated response times are a few of them.

Furthermore, the adaptive nature of AI, continuously learning from historical data and adapting to new information, will ensure that the system remains ever-vigilant and proficient in the face of ever-evolving threats. This dynamic synergy between UEBA and AI guarantees an up-to-date and effective defense mechanism, fortifying organizations against emerging threats.

AI Integration With Machine Learning (ML)

Traditional signature-based approaches often fail to detect new or evolving threats. In contrast, machine learning algorithms can analyze vast amounts of data and identify patterns that may indicate a threat.

By combining the analytical power of machine learning algorithms with the adaptive and intelligent nature of AI, organizations can achieve more accurate and efficient identification of potential threats.

AI can provide valuable context and insights to machine learning algorithms, enabling them to make better decisions and identify patterns that may indicate malicious activities.

AI Integration With Natural Language Processing (NLP)

Costing businesses an average of $4.1 million per incident, social engineering remains the top cybersecurity threat today. To bypass detection, attackers have evolved their strategies and adopted more devious tactics that go beyond using traditional communication tools like texts or emails alone.

Fortunately, businesses can harness a significant advantage over cyber-criminals by integrating AI’s cognitive abilities with NLP’s natural language processing capabilities.

When combined together these tools become powerful at analyzing vast amounts of textual information quickly so they can detect potential threats proactively which helps businesses recognize suspicious variations or anomalies within communications that may indicate a hack attempt is underway quickly.

AI Integration With Deep Learning

Beyond the power of traditional machine learning and NLP technologies, deep learning algorithms have pushed the boundaries in threat detection research toward analyzing bigger data sets faster.

Deep learning models, such as convolutional neural networks (CNNs) and recurrent neural networks (RNNs), excel at analyzing complex, unstructured data, such as images, videos, and text.

By applying these advanced techniques alongside AI methods, companies can detect dangerous activity within their network even quicker.

AI Integration With Security Information and Event Management (SIEM)

Artificial Intelligence-enabled Security Information and Event Management (SIEM) platforms offer transformative capabilities in identifying potential cybersecurity risks modern businesses face daily.

Advanced analytics and machine learning-based algorithms facilitate seamless integration that results in centralized surveillance frameworks capable of detecting diverse cyber-attacks using vast data volumes effectively.

Organizations will enjoy prompt recognition capability leading towards efficient responses with unparalleled precision due to actionable insights gained from analysis.

These features will significantly reduce the impact of security incidents that would considerably compromise an organization’s security posture.

AI-Powered Threat Intelligence Platforms

One approach adopted by many contemporary enterprises involves exploiting the potential of AI-powered threat intelligence platforms.

By leveraging big data analytics through machine learning algorithms multifaceted system threats such as attack vectors or malware can be detected accurately for prevention before serious harm occurs.

These sophisticated structures have been designed to streamline security frameworks by making interaction more efficient between already existing procedures within an organization. They provide important insights for threat profiling and continually update their knowledge base to ensure compatibility with the ever-evolving cybersecurity landscape.

Conclusion

AI-powered solutions have transformed the landscape of threat detection. With machine learning, NLP, and deep learning algorithms, your organization can detect and respond to threats with unprecedented speed and accuracy. The integration of AI with SIEM systems and the use of threat intelligence platforms will further enhance security systems for organizations.

As the threat landscape evolves, organizations must embrace these emerging trends to stay one step ahead of cybercriminals and safeguard their valuable data and assets.

The post How the Application of AI in Threat Detection Will Revolutionize Cybersecurity appeared first on ReadWrite.

]]>
Pexels
The Future is Here: Intelligent Sensors Become the Brains of IoT https://readwrite.com/the-future-is-here-intelligent-sensors-become-the-brains-of-iot/ Fri, 23 Jun 2023 21:15:15 +0000 https://readwrite.com/?p=231347 IoT

Sensors have long been the silent workhorses of various industries, dutifully recording and transmitting data for further interpretation and action. […]

The post The Future is Here: Intelligent Sensors Become the Brains of IoT appeared first on ReadWrite.

]]>
IoT

Sensors have long been the silent workhorses of various industries, dutifully recording and transmitting data for further interpretation and action. However, advances in technology are reshaping this dynamic, equipping sensors with the power to process information either on-board or in their proximity. This trend towards more intelligent sensors is primarily driven by the need for speedy processing and decision-making at the edge of IoT networks, which minimizes reliance on central processors in cloud-based systems.

The evolution of MEMS (Micro Electro-Mechanical System) sensors provides an interesting lens to view this shift towards smarter sensors. Comprising a suspended mass sandwiched between a pair of capacitive plates, MEMS sensors have long been employed in various sectors, such as industrial and automotive. In recent times, these sensors have achieved significant reductions in power consumption, noise, and size, while simultaneously expanding their full-scale range.

One of the key drivers of this evolution is the integration of an ASIC on the sensor. This allows for the deployment of machine learning capabilities directly on the sensor, enabling on-board functions such as wake-up, free fall detection, six degrees of freedom orientation, and fusion capability. The need to transmit data to a separate processor for these functions is thus eliminated, streamlining operations and reducing latency. This capability will become increasingly crucial as IoT networks grow more complex, and the benefits of edge computing become more apparent.

Power efficiency is another significant advantage of this integration. A reduction in power consumption translates into extended battery life for the devices these sensors are integrated into. Furthermore, this opens up possibilities for more effective energy harvesting, thereby improving energy efficiency even more.

As machine learning and artificial intelligence become more embedded in MEMS sensors, we can expect these devices to become even smarter. They will develop a heightened awareness of their surroundings, positional context, and tasks, enabling them to make more informed decisions autonomously. This ability to detect anomalies, understand their location, and make decisions independently will revolutionize the way we deploy and use sensors.

The IoT landscape is rapidly evolving, with intelligent sensors taking center stage in this transformation. These sensors, equipped with integrated circuits like iSIM, are redefining the way data is processed and decisions are made in IoT networks.

Traditional sensors passively collected data and forwarded it for processing and interpretation. However, the integration of iSIM into sensors is changing this dynamic. iSIM-equipped sensors can now process data on-board, reducing latency and reliance on distant processors in cloud systems.

This is particularly crucial in the context of MEMS sensors. These devices, used extensively in industrial and automotive sectors, have seen significant improvements in terms of power consumption, noise reduction, and overall miniaturization. The integration of iSIM has amplified these benefits, enabling functions such as wake-up, free fall detection, and six degrees of freedom orientation to be implemented directly on the sensor.

With the incorporation of machine learning and artificial intelligence, iSIM-powered sensors are set to become the brains of IoT networks. These intelligent sensors can understand their environment, detect anomalies, and make autonomous decisions, charting the path for a future where IoT devices are more efficient, responsive, and smarter.

First reported on Design News

The post The Future is Here: Intelligent Sensors Become the Brains of IoT appeared first on ReadWrite.

]]>
Pexels
What You Need to Know to Use Drones for Your Wedding https://readwrite.com/what-you-need-to-know-to-use-drones-for-your-wedding/ Sat, 03 Jun 2023 20:00:26 +0000 https://readwrite.com/?p=161564 drone at wedding

The popularity of wedding drone photography is constantly rising. It’s not surprising because these flying machines can take really amazing […]

The post What You Need to Know to Use Drones for Your Wedding appeared first on ReadWrite.

]]>
drone at wedding

The popularity of wedding drone photography is constantly rising. It’s not surprising because these flying machines can take really amazing photos and videos. But many people still aren’t sure about the necessity of aerial photography at weddings or different events. We’ve gathered for you the most important information you need to know about drones if you want to use them for a wedding (See our review of the best drones).

When using drones, safety comes first.

It may not be the information you wanted to read first. But safety is a necessary measure and you should always keep it in mind if you have decided to get some pictures from a drone. The drone itself is a little helicopter that has a camera. When the drone operator has no required skills, the risk to have some unpleasant accidents rises.

Professionalism and planning are necessary.

The drone pilot should have insurance, extended knowledge on how to operate the vehicle, an established safety plan, and excellent coordination with facility managers, wedding photographers, and the couple. Otherwise, the whole wedding party may be in danger. It is also important to be sure that your photographer and videographer cooperates with the drone pilot. You need to discuss all the plans and details with them because everyone should be aware of the other professional’s actions.

Check all the needed paperwork.

Personal property and liability insurance for commercial unmanned aerial vehicles are required for every drone pilot. In case something goes wrong, the damaged object will be restored and the operator can feel safe. This aspect shouldn’t be neglected. You need to be sure that your drone operator has taken all possible safety precautions.

Drones show a whole new perspective.

It is quite easy to find a professional drone pilot in order to shoot your wedding. But professional pictures made from the drone are quite different from the usual photos. You’ll want to be sure that all photos will be amazing because your wedding is a very special day. Drones provide an entirely new style of capturing your wedding. They bring you a unique opportunity to memorize that will never be forgotten in a completely fascinated way.

Take advantage of your location.

The drone camera can capture dynamic photos and videos that demonstrate the scale and style of your event. Drones offer unusual and great prospects for stunning places where people choose to get married. If you decided to tie the knot on an exotic beach, in a flower valley or in another amazing place, imagine that you are viewing your wedding album on your 25th anniversary and get a stunning aerial shot of your wedding venue. This is a wonderful way to take complete advantage of the magnificent location that you have chosen.

You can make your dreams real.

Drones can be very versatile and can add some creativity to plain wedding photos. A good idea is to gather all your guests to spell out words or you may organize a group photo in another way. You can also get a magnificent photo of a just the married couple surrounded by a sprawling cityscape or landscape. The contrast between the closeness of this moment and the epic splendor of the perspective makes these shots very impressive.

A drone can operate in the cold.

Drones are quite sturdy, but you should remember that they are still electronic devices. That means that you shouldn’t use them in nasty humid weather. But cold weather will not stop them. As soon as the drone starts to discharge, it will produce its own warmth.

Cold air is denser, so the drone can get even more lift. You can get some extra minutes of flight in winter but it is a controversial advantage. If your marriage takes place in a cold climate, you still will not be able to take many pictures of your guests on the street.

Drones need a lot of space.

It is better to use drones outside, but sometimes it is possible to fly them inside if the drone pilot has good skills. It is also important that the ceiling is high enough to guarantee that the drone and people are not in danger. But even if you have a lot of space, it is still better not to use a drone in a ceremony indoors because it is quite noisy. Open space remains a better option for drones.

When you decided to have an outdoor wedding, we recommend you to think about drone photography. This will be especially appropriate for family property. You will be able to look from above at the place where you spent your childhood. Or if you have a wedding on a ship, a drone is the one and only who is able to take pictures of your party.

Close-ups are not available with your drone.

Drones should never get in the way, so it is better to avoid close-ups. It would be not only very dangerous but also unpleasant, distractive and loud. Drones don’t record sound, so you will not be able to take your wedding vows on video. But they can capture the whole view. You can film a walk, the moment when the couple meets the officiant near the church and many other fascinating details. So you’ll get the whole picture of the wedding without spoiling the most intimate moments.

Take a review of Instagram marketing so that you can provide your wedding couple with ideas to share their special day on this social media.

The post What You Need to Know to Use Drones for Your Wedding appeared first on ReadWrite.

]]>
Pexels
Fortifying National Security: Inside the DoJ’s New Cybersecurity Unit Combatting State-Backed Hackers https://readwrite.com/fortifying-national-security-inside-the-dojs-new-cybersecurity-unit-combatting-state-backed-hackers/ Thu, 22 Jun 2023 21:00:54 +0000 https://readwrite.com/?p=231180

In the ever-evolving landscape of technology, cybersecurity has become a paramount concern for governments and organizations worldwide. With the rise […]

The post Fortifying National Security: Inside the DoJ’s New Cybersecurity Unit Combatting State-Backed Hackers appeared first on ReadWrite.

]]>

In the ever-evolving landscape of technology, cybersecurity has become a paramount concern for governments and organizations worldwide. With the rise of nation-state and state-backed hackers, the need for robust measures to combat cyber threats has become more pressing than ever. The U.S. Department of Justice (DoJ) has recently taken a significant step in this direction by announcing the creation of a new unit within its National Security Division, dedicated to tackling cybersecurity challenges. This article delves into the details of this development, highlighting its significance and implications for national security.

Cyber threats originating from nation-state and state-backed hackers have been on the rise, posing a considerable risk to national security. In response to this growing concern, the DoJ has established a specialized unit aimed at pursuing and disrupting such cyber threats. This unit will work in close collaboration with the existing national security team within the DoJ, enabling them to scale up their operations and expedite the prosecution of threat actors.

Assistant Attorney General Matt Olsen states that the new unit will not only focus on nation-state threat actors but also target state-sponsored cybercriminals, associated money launderers, and other cyber-enabled threats to national security. By formalizing this unit within the DoJ’s hierarchy, the department aims to streamline its efforts and enhance its ability to combat cyber threats effectively.

Although the DoJ’s announcement did not explicitly mention Chinese cyber efforts, it is worth noting that China has been a major concern in the realm of cybersecurity. The U.S. government, including top cybersecurity officials, has consistently emphasized the threat posed by Chinese cyberattacks. China’s tactics include compromising telecommunications firms, conducting cyber intrusions targeting journalists and dissidents, and launching cyberattacks capable of disrupting critical infrastructure.

Chinese cyber activities have also extended to corporate and industrial espionage. There have been instances where Chinese-backed hacking groups have targeted U.S. entities to gain intelligence and access sensitive data. This has raised concerns among government and corporate executives, particularly as China attempts to bridge the technological gap by leveraging U.S. innovation and research.

While Chinese cyber efforts have been a significant concern, it is important to recognize the threats posed by other nations as well. Russian and North Korean cyber actors have also been involved in cyber intrusions and attacks, albeit with different motives and tactics.

Russian hackers and ransomware groups have been known to engage in profit-driven activities, often extorting their victims for financial gain. These groups are highly skilled and capable of inflicting significant damage, but their attacks are typically less coordinated and strategic compared to those originating from China.

On the other hand, North Korean cyber actors have been involved in various cyber campaigns, targeting financial institutions, cryptocurrency exchanges, and other entities to generate revenue for themselves or their government. These attacks are often motivated by economic factors, and their impact can be severe.

Building cases against state-backed cyber threat actors can be a complex and time-consuming process. The global nature of cyber threats, coupled with the ability of threat actors to conceal their identities and operate from remote locations, presents significant challenges for law enforcement agencies. Investigations can take years to gather evidence and identify the individuals responsible, and even then, it is not always possible to make arrests.

To address these challenges, the newly established cybersecurity unit within the DoJ will serve as an incubator for early-stage cases. This will allow the unit to invest the necessary time and resources in conducting detailed and comprehensive investigations. By doing so, the DoJ aims to enhance its ability to disrupt cyber threats and bring threat actors to justice.

The creation of a dedicated cybersecurity unit within the DoJ’s National Security Division marks a significant step in combating cyber threats and protecting national security. With a focus on nation-state and state-backed hackers, the unit aims to increase the scale and speed of disruption campaigns and prosecutions. While Chinese cyber efforts have been a major concern, the unit will also address threats from other nations, such as Russia and North Korea. By investing in early-stage cases and leveraging the expertise of its national security team, the DoJ is positioning itself to be at the forefront of the fight against cyber threats.

As technology continues to advance, it is crucial for governments and organizations to prioritize cybersecurity and stay one step ahead of malicious actors. The establishment of this cybersecurity unit signals a proactive approach by the DoJ, demonstrating its commitment to safeguarding national security in the digital age.

First reported on: Silicon

The post Fortifying National Security: Inside the DoJ’s New Cybersecurity Unit Combatting State-Backed Hackers appeared first on ReadWrite.

]]>
Pexels
7 Awesome Ways to Increase YouTube Watch Time (2023) https://readwrite.com/7-awesome-ways-to-increase-youtube-watch-time-2021/ Fri, 16 Jun 2023 18:22:55 +0000 https://readwrite.com/?p=182569 increase YouTube Channel watch time

YouTube utilizes watch-time as a modus operandi in which it uses algorithms for suggesting videos, especially in terms of ranking. […]

The post 7 Awesome Ways to Increase YouTube Watch Time (2023) appeared first on ReadWrite.

]]>
increase YouTube Channel watch time

YouTube utilizes watch-time as a modus operandi in which it uses algorithms for suggesting videos, especially in terms of ranking. YouTube has grown tremendously and is the most visited video platform site in the world. It has become an imperative source of income for influencers, advertisers, marketers and other business-related figures.

Millions upon millions of video content is available on the YouTube platform. Everyone wishes to have at least one viral video can propel their YouTube channel to the elite level. Everyone wants to gain a higher ranking to receive the most clicks and viewership.

Only the ones who have upgraded their ranking gain that privilege. However, this is not an easy challenge. It requires strategy and work. And therein lies the question, how can you increase watch time to elevate your YouTube ranking. We will discuss that in detail in the following.

Featured Partner for Social Scheduling


on Later's website


  • Free Version: 14-day Free Trial

  • Starting Price: $18 / monthly

  • Integrations: Instagram, Tiktok, Facebook, Twitter, Youtube...

What Is YouTube Watch Time?

YouTube watch time is basically the amount of time a viewer has viewed the video. It gives you an idea as to what viewers like and what attracts them. It also gives you an insight into what they dislike if they ever refuse to click on your content again.

Increase YouTube Watch Time

First things first, do you have a YouTube channel of your own? Do you hope to gain a source of income from YouTube? Your prospects can materialize when your channel acquires at least 4,000 watch hours in one year with 1,000 subscribers. Passing these criteria will enable you to apply for the YouTube Partner Program or YPP. This paves the way for you to gain monetary support from ads.

Now the real question remains, how can YouTube watch time be increased in 2023?

You will find the answers to your question below.

  • Create Quality Content Videos

YouTube was created on 14th February in 2005. It is currently the second most trafficked website in the world. 500 hours of video are uploaded on its platform every minute. The competition is naturally fierce and merciless. To crease watch time, you must upload videos that focus on standard and quality.

Content makes all the difference in this aspect. You need to empathize with their mind frame of your target demographic. You need to envision yourself according to their lens and question what kind of content would make you want to stay and watch the entire video.

Featured Partner for Social Scheduling


on Later's website


  • Free Version: 14-day Free Trial

  • Starting Price: $18 / monthly

  • Integrations: Instagram, Tiktok, Facebook, Twitter, Youtube...

The content needs to be effective, charged, and visually appealing. Once you gain an idea as to how you want to portray your videos, you will create a platform that will get you viewer traffic at a quick pace. You can also gather information from veteran YouTube rs who have ample knowledge of what makes the YouTube community tick.

  • First 15 Seconds are Crucial

There are endless amounts of YouTube content being streamed and recommended. The average YouTube viewer can only give a couple of seconds to a video that passes his page. If he happens to come across a new video from your YouTube page.

Remember that he will ask himself the following questions.

Should I look into this video?

If I click on it, should I continue watching it?

These answers lie in the first 15 seconds of your video.

If your 15 seconds do not have the effect of piquing your viewer’s curiosity? He will immediately lose interest and move on to another content. The result will be them leaving your video platform. This only serves to drive down your watch time dramatically.

Featured Partner for Social Scheduling


on Later's website


  • Free Version: 14-day Free Trial

  • Starting Price: $18 / monthly

  • Integrations: Instagram, Tiktok, Facebook, Twitter, Youtube...

This is why you need to ensure that you make the initial seconds of your video interesting and engaging to the point it captures the viewer’s interest. If you can pull off this strategy, you will gain more viewers to your page, eventually rendering you with a healthy watch time.

  • Expand Your Subscriber Base

Building upon your subscriber base is the most important thing you can do once you establish your own YouTube presence. The more viewers you receive, the more the subscriptions climb to your page. This growth in viewership directly propels the watch time of your videos the moment you upload them.

Growing your subscriber base can be tricky. So, use the following tactics to grow your subscriber base:

Optimize your YouTube Channel, promote your videos on social media accounts like Facebook, Twitter, or Instagram. You will cater to a specific audience that will provide you with organic subscriber growth.

You need to generate social proof. Social proof is similar to the scale of popularity your channel has amassed. When viewers enter your channel, they will realize that you have an impressive number of subscribers. They will subscribe as well, and through that, subscribe — and these people will become your content viewers, thereby increasing your YouTube Watch time.

  • Select Clickbait Titles & Thumbnails

YouTube Titles and thumbnails represent what the viewer will perceive as your content. When people are searching for videos about a specific subject matter, they will see a long list of titles and thumbnails, which will be the deciding factor if they want to view the video.

If your title is well designed, then you will get the benefits of attracting more subscribers to your channel. The same thumbnail and titles will be recommended to other viewers who are searching for the same content. This will render your content appealing to various advertisers who hope to capitalize on a growing YouTube channel.

  • Focus on Audience Retention

Audience retention basically is the average percentage of a YouTube video watched by viewers. Once you upload your video, you need to keep a close eye on the audience retention report. This will enable you to increase the watch hours on YouTube. Keep focusing on the audience retention of every video you upload on your YouTube Page.

The Audience Retention report will give you an insight as to where your viewership is dropping and where it is peaking. This information allows you to make the necessary modifications to retain your audience and increase traffic.

Increasing your video’s retention rate will enable you to gain more viewers attracted to your content, thereby elevating YouTube Watch Time.

  • Use Long-Tail YouTube Keywords

The usage of long-tail YouTube Keywords can benefit your subscription. The target audience will be able to drive more traffic through its usage and increase your watch time in the process. This will enable you to beat out your competitors.

There are a myriad of techniques for creating long-tail keywords for content usage. But you can acquire them in a simplistic manner which is through YouTube’s suggestion feature. Use the YouTube search bar to type in the work you know your audience is interested in. There, you will get a list of long-tail keyword ideas that you could incorporate for your own content.

Featured Partner for Social Scheduling


on Later's website


  • Free Version: 14-day Free Trial

  • Starting Price: $18 / monthly

  • Integrations: Instagram, Tiktok, Facebook, Twitter, Youtube...

You can use any form of content you want pertaining to ads, information, entertainment, etc. You will get an abundance of long-tail keyword ideas that can prove useful for the YouTube content you have built for yourself. This will eventually lead to an increase in YouTube Watch Time for your platform.

  • Create Video Playlist

What if it comes to your knowledge that there is a way to increase Watch time on YouTube in more hours even though people have not watched your videos?

To elaborate further, if a viewer starts watching your video and continues to the next one on the playlist, you will still get credit for an increase in watch time. It also doesn’t matter if the videos in the playlist belong to other people. You will receive credit regardless.

Playlists usher viewers to a more gradual viewing experience which has the potential to increase your YouTube watch time. You can create different Youtube video playlists to encapsulate all your videos.

Make sure your playlist is organized in sequences. Ensure that the videos are based on relevant content. Playlists that are effective in gaining viewership have the ability to attract viewers to more of your videos in one viewing session. This enhances your visibility and advances your YouTube watch time.

If you are an avid YouTube user, you may have gotten a clear picture of how you can use watch time as a crucial metric measuring success on YouTube. The main prospect for any would-be YouTube influencer is to gain income or capital. YouTube has become a source of livelihood for many individuals and enterprises alike.

Generating revenue has allowed different generations of people to do what they love and create the content they like. The challenges associated with increasing the watch time may seem daunting. But in the end, it’s all the more worth it.

The post 7 Awesome Ways to Increase YouTube Watch Time (2023) appeared first on ReadWrite.

]]>
Pexels
Will the Internet of Behavior Improve Everywhere You Go? https://readwrite.com/will-the-internet-of-behavior-improve-everywhere-you-go/ Fri, 02 Jun 2023 19:22:57 +0000 https://readwrite.com/?p=190959 iob internet of behavior

What, you ask, is the Internet of Behavior, also known as IoB? Good question. This term is suddenly becoming more […]

The post Will the Internet of Behavior Improve Everywhere You Go? appeared first on ReadWrite.

]]>
iob internet of behavior

What, you ask, is the Internet of Behavior, also known as IoB? Good question. This term is suddenly becoming more common after the pandemic, and it’s a concept with important implications for the future. IoB refers to internet-connected technologies that collect, integrate, and analyze data related to people’s behavior within a space.

Will the Internet of Behavior Improve Everywhere You Go?

How people interact with space has become extremely relevant in the wake of the pandemic. When a deadly virus can spread through minimal contact, it’s vital to manage public health and maintain social distancing by whatever means necessary. That’s where IoB comes in.

Better Understanding the IoB Space

Many workplaces welcoming employees back on site for the first time in over a year now have IoB technologies installed. So, for example, there could be RFID tags tracking hand-washing or sensors detecting mask-wearing, coupled with automated alerts if someone isn’t following protocols. These are some of the most common applications for IoB technologies right now, but they’re hardly the only ones.

Combining data from multiple technologies (cameras, scanners, sensors) and multiple sources (private sector, public sector, social media) helps distill the dynamism of spaces filled with human beings into a format ripe for analysis.

Featured Partner for Social Scheduling


on Later's website


  • Free Version: 14-day Free Trial

  • Starting Price: $18 / monthly

  • Integrations: Instagram, Tiktok, Facebook, Twitter, Youtube...

Understanding how and why people occupy spaces helps those spaces become safer, cleaner, more convenient, and more attractive — better in every way.

IoB allows us to know what we couldn’t know before — which means that we can improve and innovate upon spaces in ways that used to be impossible.

How We Live

There are plenty of reasons to be excited about IoB — and to be alarmed about a world that tracks our every move. But, unfortunately, both sides of the coin require debate because it looks all but assured that IoB technologies would one day be everywhere.

Rapid expansion looks likely, given how many different things IoB can do.

Consider that there are already billions of connected devices collecting data about where people go and what they do on a very granular level. Those devices are in offices, stores, and restaurants — not to mention in our cars, phones, and wearable devices, all collecting troves of data about the details of modern life.

There will be more than 42 billion connected devices in use by 2025, generating more than 1 billion GB of data daily.

Previously, we used this data only for specialized purposes like tracking our health, and we made minimal effort to integrate disconnected data sources. IoB, at its core, is about using more of this data to understand more about how we live.

Fixing Complicated Problems with IoB

The implications are huge, yet the applications are hyper-specific. For instance, a company could use IoB to track when people join and leave Zoom meetings over time and then use that data to set a better schedule.

Another use would be deploying facial recognition technology during the meeting to track the participant’s facial cues and identify employees who may feel overworked or under-engaged, thereby allowing for early intervention instead of inevitable burnout.

IoB applications aren’t limited to the workplace, either.

Traffic data could be used to prevent slowdowns and accidents and design future roadways for maximum safety and efficiency. Crowd data could be used to keep protests or large celebrations from erupting into riots, just as it could help more people pass through airport security in less time. Schools could even use IoB data to help prevent or stop school shootings and fights.

Any place where people interact could literally leverage IoB to identify and eliminate pain points for all involved.

Featured Partner for Social Scheduling


on Later's website


  • Free Version: 14-day Free Trial

  • Starting Price: $18 / monthly

  • Integrations: Instagram, Tiktok, Facebook, Twitter, Youtube...

Where IoB Could Go Wrong

It’s not at all an overstatement to say that IoB can solve some of the most common, consequential, and complex problems affecting humanity. But, unfortunately, these outcomes are far from guaranteed.

IoB may be promising — but it’s also problematic for many reasons.

Because internet-connected devices are currently subject to relatively few regulations, it’s often up to whoever collects data to decide how to use it. Harnessing the power of IoB will require sharing that data early, frequently, and completely. But sharing it will also require a firm commitment to ethics and a clear understanding of how things could go wrong.

Good Versus Evil

Here’s a hypothetical that illustrates the fine line that IoB must walk: Let’s say a surveillance company has data showing everywhere someone went for the past month. The company may agree to share that data with a partner as long as the person’s identity is obscured or to supply it to a judge who issues a warrant. However, they could also decide to sell that data to the highest bidder or give it to government officials who use it to quell dissent.

For every piece of IoB data, there are ways to use it ethically or exploitatively.

Another potential drawback is that people’s movements aren’t great indicators of their motives. For instance, if a fitness tracker registers that someone heads for the bedroom every night at 3 a.m., are they staying up so long because they’re working late, partying hard, or struggling with insomnia?

Enough IoB data can usually answer that question. When it can’t, however, it leaves companies with lots of data and very few actual insights.

How We Make IoB Work

Companies involved with IoB, whether with developing or implementing the technology, need to seriously take legal and ethical issues. The question remains, will the companies do the ethical thing? And then think of the costs. Who bears the costs of keeping the internet safe? You? The government? The company?

They must be transparent about what data they’re collecting and why.

More importantly, however, companies and individuals need to use IoB as a force of good: something that improves people’s experience rather than punishing, rejecting, or stalking them.

In a nightclub, for example, IoB could help monitor the sentiment of the crowd and then adjust the ambiance accordingly by playing different music. Armed with this information, the nightclub could be admitting more or fewer people, switch drink specials, or tweaking the lighting.

Featured Partner for Social Scheduling


on Later's website


  • Free Version: 14-day Free Trial

  • Starting Price: $18 / monthly

  • Integrations: Instagram, Tiktok, Facebook, Twitter, Youtube...

Over time, this data could help a club owner fine-tune a space that makes everyone feel like a VIP when they step inside. But potentially more important, the club owner will increase his business by catering to his customers’ special needs and wants.

Endless IoB Possibilities

Another area where IoB could have tremendous impacts without raising ethical concerns is inside the home, where people control what technology sees and tracks. For example, the right mix of technologies could detect when someone is running late for work and then automatically turn up the bedroom lights, start the coffee maker, and get the car warmed up.

As long as we get creative and stay conscientious, there’s little that IoB can’t transform for the better.

Image Credit: jacek dylag; unsplash; thank you!

The post Will the Internet of Behavior Improve Everywhere You Go? appeared first on ReadWrite.

]]>
Pexels
How drones will change our retail experience, our cities and our skies https://readwrite.com/drones-change-retail-experience-cities-sky-il1/ Tue, 13 Jun 2023 06:47:37 +0000 https://readwrite.com/?p=98632

The acquisition of Whole Foods by Amazon has been the focus of much attention over the last week. And it’s […]

The post How drones will change our retail experience, our cities and our skies appeared first on ReadWrite.

]]>

The acquisition of Whole Foods by Amazon has been the focus of much attention over the last week. And it’s not only retailers that are taking notice. With our increased desire for delivered goods, drone companies are looking toward Amazon as a way to shepherd in the use of drones in mainstream retail (see our review of the best drones).

Amazon is, in many respects, primed for success in such a market, especially with the creation of its Prime Air drone delivery platform. In March, Amazon completed its first public demonstration of drone deliveries, ferrying sunscreen to attendees at an Amazon-hosted conference in California.

Most recently, we saw news of the creation of a new research and development facility near Paris, where about a dozen software engineers and developers are working to ensure flying delivery vehicles don’t collide with buildings, trees, other drones, and birds.

In a quest to understand the impact of drones on retail services, I spoke to Yariv Bash, co-founder and CEO of full-service drone delivery logistics company Flytrex.

See also: Smart cities will soon buzz with (hackable) drones

Last year, Flytrex successfully rolled out a drone delivery service with the Ukranian postal service to deliver goods up to 1kg (2.2 pounds) over 23km (14.3 miles). Flytex’s main focus, however, is enterprise customers who not only want to purchase a fleet of drones, but also the accompanying control and monitoring systems. Perhaps the biggest selling point their drones is their convenience — they can be taken out of the box, charged, connected to an accompanying app, and used.

According to Bash, over 25 million parcels are transported around the world every day, with the majority weighing less than 2 pounds — ideal for drone delivery.

“By acquiring Whole Foods, Amazon gets its hands on prime real estate for drone stations in every major city,” Bash said. “By optimizing Whole Foods’ warehouses with Amazon’s Kiva robots, additional space can be created to store drones and to stock Amazon’s top selling products. This would allow Amazon products to be delivered locally and on-demand by drones from Whole Foods stores.”

Changing the transit experience

The Federal Aviation Authority (FAA) published new regulations for commercial drones in August last year. Under the new rules, operators can’t fly drones higher than 400 feet, or at night. The drones must also weigh less than 55 pounds and constantly remain in the sight of a human operator — a rule that prohibits any kind of long-distance drone use, including basic delivery. People also cannot operate drones from a moving vehicle unless in a “sparsely populated area.”

As a result, it’s likely that we’ll see drones as part of a logistics package where they complement road vehicles, rather than replace them.

“The drone will be a key component of the supply chain from warehouse to the customer, with increased benefits as goods warehouses become more automated,” Bash said. “They’re also highly cost effective as a drone costs a lot less than a delivery truck and operates with batteries instead of fuel. Maintenance is also much cheaper.”

One of the least-reported benefits of drones is their low carbon footprint. According to Bash, drones can “reduce road congestion in crowded cities and reduce air pollution.” It’s easy to imagine them replacing small-scale single-item deliveries, including food deliveries.

Drones will also change customer experience. While the idea of a drone arriving on our doorstep is still far off, it’s likely that we will soon see scheduled drone deliveries to designated drop off areas like a rooftops in residential areas.

“One of the great advantages of drones in delivering items is the scale of what they can deliver,” Bash said. “Imagine a warehouse full of 200,000 of the most popular items sold in your area. It could include everything from groceries to books and pharmaceuticals and be delivered to shoppers in just 10-15 minutes.”

13307323_1036190069806986_5182073576598197419_n

How will drones change our skies?

Drones will undoubtedly change our skies; one of the biggest challenges to their success will be the struggle to regulate airspace to accommodate different vehicles.

NASA and various partners completed testing earlier this month of live, remotely operated drones at six sites around the country. According to Parimal Kopardekar, senior technologist for NASA’s air transportation system research and principal investigator for UTM, a traffic management system is essential “to ensure the safety of the nation’s manned and unmanned airspace.” The operational scenarios have simulated a variety of use cases including package deliveries, farmland surveys, search and rescue operations, railway inspections, and video surveillance operations.

Initial test results showed that when flying well beyond the pilot’s line of sight, operators could lose sync with their aircraft, demonstrating the need to develop better ways to strengthen these links. Developing a quality standard for these communications links will be a critical element for the success of the industry as a whole.

Big industry players like Amazon are reliant on the FAA to solve these challenges; the FAA’s efforts are aided by increased technological advances like spatial recognition and awareness of other drones, airplanes, and man-made objects like tall buildings and bridges. Drones also need to be adaptable to changing weather and changing flight paths and able to react to communication from land.

Flytrex signed a shipping agreement with American Duty Free, the largest duty-free company in the United States. American Duty Free’s partnership with a pharmaceutical company makes it interested in helping its fleet of drug makers supply medication in difficult-to-access areas of developing countries.

While Bash admits that he doesn’t know how long we will have to wait until drone deliveries become commonplace, he insists on its eventuality. That drone-delivered kale might be a way off, but it’s coming.

The post How drones will change our retail experience, our cities and our skies appeared first on ReadWrite.

]]>
Pexels
AT&T unleashes drones to aid in Hurricane Harvey relief https://readwrite.com/att-sends-drones-to-aid-in-disaster-relief/ Sat, 02 Sep 2017 00:00:48 +0000 https://readwrite.com/?p=99251

As residents on or near the coast of Texas continue to try to pick up the pieces of devastation brought […]

The post AT&T unleashes drones to aid in Hurricane Harvey relief appeared first on ReadWrite.

]]>

As residents on or near the coast of Texas continue to try to pick up the pieces of devastation brought on by Hurricane Harvey, the ability to communicate to the outside world has become more and more important. Yesterday, AT&T deployed a fleet of 46 drones to inspect areas in South Texas that have been impacted.

The key goals for the deployment were to check out all the towers, determine the network impact and ensure that customers continue to be able to speak to their loved ones.  A total of 26 drones were sent the day before, prior to sending out the 46 drones yesterday.  AT&T has an additional 58 drones on standby if needed.

See Also: Amazon’s drones will tell you when your house needs work

In natural disaster situations such as this one, drones can often be utilized to inspect areas that aren’t accessible to cars or trucks due to flooding (see our review of the best drones). The use of drones allows for quicker access to these inaccessible areas that could not be inspected otherwise. They can also see parts of the towers that people can’t reach when climbing or see from observing from the ground level.  They also speed up the inspection process of towers overall, because more towers can be studied in a shorter amount of time, freeing up time for making repairs.

AT&T said “Drones can take HD video and photos of a cell site, giving us a birds’ eye view of the tower. This offers high-quality visuals of equipment, components, and cabling so our engineers can remotely view cell sites safely from the ground – all in real time.”

Further help in the works

In addition to the two flights of drones, AT&T plans to deploy 2 Satellite Cell on Wheels (Sat COLTS) to Beaumont, TX.  These will be joining additional assets that are already in place.  AT&T is planning to send 12 more to assist customers and first responders located in that area, due to the second landfall of Tropical Storm Harvey.

Customers who live in these impacted areas will be receiving credits for extra data, voice and text charges, and prepaid credits for extra voice and text charges from the company.

Follow this link to see drone footage shared by AT&T:  https://ql.mediasilo.com/#ql/59a73367e4b0b55905b47c40/ec1edd79-9041-419b-a5a1-45a0d480164a

The post AT&T unleashes drones to aid in Hurricane Harvey relief appeared first on ReadWrite.

]]>
Pexels
Cybersecurity: Ensuring Sanity in Smart Cities https://readwrite.com/cybersecurity-ensuring-sanity-in-smart-cities/ Thu, 30 Jan 2020 19:00:02 +0000 https://readwrite.com/?p=163802 cybesecurity in smart cities

Currently, we consider ourselves lucky if we don’t get stuck in traffic while driving to the office. The struggle of […]

The post Cybersecurity: Ensuring Sanity in Smart Cities appeared first on ReadWrite.

]]>
cybesecurity in smart cities

Currently, we consider ourselves lucky if we don’t get stuck in traffic while driving to the office. The struggle of even finding a parking spot for your car is real. The smart city industry is projected to reach the $400 billion mark by 2020. The urban population is increasing at an alarming rate. According to one survey, 65% of the world’s population will live in cities by 2040. It sounds like chaos to me. We will need cybersecurity to ensure the sanity in smart cities.

In today’s world of digitalization, the world is already familiar with the concept of IoT, AI, and Robotics. Using these latest advancements to our advantage, we can prepare and self-equip our cities to support the increasing urban population.

Currently, only 600 urban cities contribute to 60% of global GDP. The idea of a smart city is to collect information through connected devices and make life more comfortable using these devices for logistics. If we follow the promising results of smart cities, every drive to your office will be a lucky one! You will know exactly where to park your car every time you reach a shopping mall or a supermarket. Sounds perfect.

Cybersecurity in Smart Cities – The Problem Statement

In 2012, a Puerto Rico electric utility company asked the FBI’s help after its smart meters got hacked and reprogrammed. When the company was reprogrammed, it allowed many people to pay substantially lower electricity bills. Smart meters had been introduced by the company to improve the efficiency and comfort of its consumers.

Multiple such cases have been reported over the years concerning the increased vulnerabilities of smart devices against cyber threats.

Without ensuring proper security measures, the risk of cyber threats can make one’s life more costly, dangerous, and painful in a smart city. There are many aspects of cyber securing a smart city, including the role of connected devices, isolating vulnerabilities, establishing secure endpoints, and dealing with evolving threats.

Identifying Vulnerabilities – What determines the security of Smart Cities?

Everything is connected in a smart city.

Having everything connected opens up the possibility of multiple pain points in a single infrastructure. Even a single vulnerable endpoint can corrupt the entire infrastructure allowing data theft, device hijacking, Distributed Denial of Service (DDoS), and more.

smart city cyber security, iot cybersecurity, cyber threat
       How a Cyber Threat Works?

To give you a better idea. Let’s say that there are three systems – A, B, and C connected to a single server in an infrastructure. If an attacker finds a security flaw in Endpoint three of System C, they have entered and can end up corrupting all the connected endpoints and systems of the entire infrastructure.

The server of any smart city infrastructure is designed to help consumers and has user-centric information. It could be anything from trivial data – names and addresses to confidential information.

Confidential information includes bank account details, IP addresses, and other information.

Though the significance of data you share in a smart city infrastructure might not seem important to you, but the information is a blessing for a hacking entity. A hacker loves knowledge.

As such, the first step towards a secure smart city is identifying vulnerabilities and possible entry points for hackers in each infrastructure. It could be a single, smart meter in an extensive power grid system.

Remember how we were talking about hitting just green lights on the way to our offices. Imagine the chaos in a smart city with thousands of vehicles on the road if someone hacks into the traffic infrastructure and turns every light to green.

The Role of Connected Devices

By 2025, there will be over 21 billion connected IoT devices, says  US Norton, an internet security company. When we are talking about sensors, smart infrastructure, smart electricity, and smart data, what ties them all together? The answer is the Internet of Things.

Remember, not long ago, everyone was talking about smart homes and how your smartphone can control the functioning of everything in it? Well, a smart city is like implementing the technology of smart homes in the entire city.

You may be wondering why you should put your confidential data at stake? The most straightforward answer is that without the Internet of Things, connected devices, or shared information, the concept of a smart city would remain a dream.

It’s the data and the shared devices that make the whole system work. In smart cities, everything is inter-webbed, and the attack surface and possible weak links increase multi-fold for a hacker.

Connected devices – be it smart sensors, your mobile phones, smart meters, or anything else, are the only source to derive information that is used to enhance user experience or quality of life in a smart city. The deployment of connected devices across public domains is mandatory to establish interconnectivity in smart cities.

So, where do you begin your journey if you want to cyber-secure a smart city?

Security of a Smart City: Where to Begin?

The entire concept of smart cities is comparatively new, and one of the many challenges faced in cyber-securing a smart city is the lack of anticipated intelligence.

How do you ensure the security of such a vast network area?

Start at the bottom and move up from there – one step at a time. While governments are finding it hard to implement the essential internet privacy and security rules, many countries are starting to realize the significance of implementing cybersecurity regulations in their smart cities.

For instance, the GDPR was formulated by the European Union to safeguard the data privacy of all individual citizens of the EU and the European Economic Area (EEA).

Certain steps can be implemented to ensure data security and privacy in smart cities.

The management of smart cities needs to define clear boundaries for protecting the information and the extent of its usage right at the source. Besides these, the mobile and web applications (if any) that are responsible for the interconnectivity among IoT devices need to foolproof and created by highly experienced developers.

Against hiring full-time developers, you can hire a dedicated Laravel developer or any other developer using the Staff Augmentation model. Use wearing international boundaries to your advantage and save business dollars while ensuring the quality of your IoT services. Implementing smart city security solutions can be tricky but we have to start somewhere.

Securing Pain Points: Dealing with Evolving Threats

Every new technological discovery in today’s era can end up giving hackers a new tool or creating a new loophole to break into the inter-webbed network of our smart cities. Given that, is $135 billion enough to secure the entire web of connected devices across various sectors in all our smart cities by 2024?

Considering the number of connected devices and the complexity of the entire network in smart cities, human efforts won’t be enough for creating the required impact when dealing with evolving threats in cybersecurity.

We need security solutions that can detect evolving cyber threats and prevent them from corrupting infrastructures in smart cities.

In such a scenario, a possible feasible solution can be deploying Artificial Intelligence for cybersecurity. The AI security elements can be programmed to learn and detect any foreign elements in a smart city infrastructure.

But is AI enough?

There has been news and questions rising regarding the bias-ness of AI. Taking this into consideration, how do we deal with evolving cyberthreats in smart cities? There needs to be more research-based development of artificial intelligence in cybersecurity following well-defined legal and ethical guidelines.

Safety of Smart Cities Beyond Cybersecurity

Establishing resilience against cyber threats in smart cities is necessary. It becomes crucial to ensure that every smart city has a backup plan in case its functioning infrastructure goes down. A backup plan will ensure that critical services such as traffic networks of a smart city remain functional even if its infrastructure is under attack.

Surveys have shown that users are willing to offer more personal data when reassured of its safety.

Finally, an entity or an appointed officer needs to be accountable in case of identity theft, DDoS, PDoS, and more. The technology is evolving at an exponential rate and it’s almost time that we will live in smart cities. But, it’s high time to ask the question: Are we ready yet?

The post Cybersecurity: Ensuring Sanity in Smart Cities appeared first on ReadWrite.

]]>
Pexels
The Value of Intelligent Products and Services is Clear. Can Traditional Product Companies Seize the Opportunity? https://readwrite.com/the-value-of-intelligent-products-and-services-is-clear-can-traditional-product-companies-seize-the-opportunity/ Fri, 30 Jun 2023 15:00:38 +0000 https://readwrite.com/?p=224380

Digitally native companies have dominated the intelligent products and services landscape with software-driven offerings and services. But that may be […]

The post The Value of Intelligent Products and Services is Clear. Can Traditional Product Companies Seize the Opportunity? appeared first on ReadWrite.

]]>

Digitally native companies have dominated the intelligent products and services landscape with software-driven offerings and services. But that may be changing. A 2022 survey of executives and senior leaders at 1,000 traditional manufacturers in 11 countries explored how they’re retooling for the future and how they’re using, or planning to use, intelligent products and services to protect and grow their franchises. The companies surveyed included automotive, consumer products, high tech, medical device, and industrial manufacturers, along with energy and utility providers. The aim was to assess whether and how these organizations are catching up to digital natives in pursuit of new intelligent products and services such as connected cars, remote health monitoring, smart home devices, and more. This shift applies to consumer and B2B products and services.

The survey found that 59% of these traditional B2C and B2B companies already have “well-defined visions and strategies” for intelligent products and services, and they are already “realizing significant benefits in the form of new, profitable revenue streams; increased customer loyalty and satisfaction; greater efficiency; reduced total cost of ownership; and improved competitive advantage.” The remaining 41% of organizations surveyed are working on visions and strategies—but they’re often running into challenges that can delay or prevent their access to the full value that intelligent products and services can deliver.

Unlocking the value of intelligent products and services

Smart, connected, sensor-enabled, and software-controlled products and services seamlessly interact with the broader ecosystem through APIs and platforms. They can be continuously enhanced based on real-time feedback. They can deliver hyper-personalized customer experiences by using AI, machine learning, predictive analytics, and similar tools.

The Opportunity for Servitization

Maybe most importantly, intelligent products and services create the opportunity for servitization. Take an industrial manufacturer that has been selling only equipment, or equipment plus scheduled maintenance, for example. They could create an intelligent service that guarantees a certain level of product uptime for their customers. The manufacturer provides intelligent equipment that uses sensors, data analytics, and AI/ML to provide predictive maintenance, which helps avoid unplanned outages and downtime and can reduce the number of calendar- or hours-based scheduled service calls, so that field service is only required when a piece of equipment needs preventive attention.

The survey showed that manufacturers expect to generate tremendous value from servitization, which is “the key to creating value, fueling growth, and boosting resilience in organizations.” In the next three years, 43% of these companies expect intelligent services to provide more than 20% of their revenue, and 46% expect up to 20% of their revenue to come from intelligent services. This represents a seismic shift from what the market looks like today. Organizations, on average, get about 12% of their revenues from intelligent services right now, but in three years the projected average will be 28%.

Servitization can also improve customer experience and make those customers more loyal. This happens by automatically handling product maintenance or updates before they become issues for the customer. As customers grow to expect this kind of anticipatory service, brands that provide it may pull further ahead of companies that don’t.

Faster, more contextualized feedback also allows product companies to meet customer needs as they evolve. Manufacturers offering intelligent products and services can also make faster progress toward their ESG goals, with 84% reporting lower CO2 emissions and other environmental impact reductions.

Identifying proof-of-concept hurdles

With so many potential benefits, it’s important for organizations that aren’t in the fast mover category to accelerate their progress along the intelligent products and services maturity curve. The survey found that 48% of manufacturers have use cases at the proof-of-concept phase. Only 7% of the organizations said they have fully scaled use cases, and another 31% have partially scaled use cases. 13% have identified use cases but haven’t created a proof of concept.

While making the shift to intelligent products and services offers benefits and competitive positioning that manufacturers can’t afford to ignore, many manufacturers that are currently at an early stage of their journey report getting stuck at the proof-of-concept stage. Their barriers to progress fell into a handful of categories:

Organizational structure challenges

This includes siloed business functions or the absence of clear responsibility for intelligent products and services, lack of agile culture. Two-thirds of manufacturers cited siloed business functions such as research and development and sales as a hurdle to transforming.

Talent and skill gaps

Particularly for roles related to product innovation, data science, and data governance. More than half of the respondents cited critical talent gaps in data-related roles. The survey data s that “there will also be strong demand for networking engineers and physical product- development engineers.” Partnerships and open collaboration can help to address these issues.

Data lifecycle management

This requires good hygiene around data infrastructure, collection, management, ownership, and monetization. Less than half of surveyed manufacturers reported adequate data collection, analytics, and culture for their intelligent products and services goals.

Digital transformation

Move away from legacy systems and data silos toward unified platforms that support data analytics, simulation tools, and digital twins. In the survey, 76% of manufacturers reported struggling with storing and handling the data that intelligent products and services create.

Cybersecurity

Protect systems, data flow, maintain data privacy, and maintain regulatory compliance. Software producers are used to building security features into their products. But, this presents an often new and different challenge for manufacturers. For example, 68% of those surveyed said that it was a challenge to embed security into hardware at the design stages to protect their intellectual property.

Moving forward with intelligent offerings

The way to address these challenges is to adopt a framework that starts with a holistic, innovation-driven, customer centric strategy. That strategy can inform talent hires, strategic partnerships, and changes to governance to maintain centrality while federating implementation for more creativity. With these resources in place, it’s possible to keep the customer at the center of the product development process.  Big bang transformation rarely works. Companies are best served by starting small, taking a test and learn, iterative approach as a precursor to scaling. That feedback enables continuous evolution, product iteration, and better visibility across the product lifecycle.

As the value proposition for connected products and services along with servitization and new business models becomes clearer, and more manufacturers clear the hurdles in their path, we can expect to see a major shift in the way consumers and businesses select products, connect with brands, and develop loyalty.

The post The Value of Intelligent Products and Services is Clear. Can Traditional Product Companies Seize the Opportunity? appeared first on ReadWrite.

]]>
Pexels
Smart Parking: UWB Technology Solving Parking Woes of Urban Population https://readwrite.com/smart-parking-uwb-technology-solving-parking-woes-of-urban-population/ Thu, 25 May 2023 18:00:56 +0000 https://readwrite.com/?p=225630 UWB Tech Solving Parking

In urban areas, parking can be a major headache for residents and visitors alike. With limited parking space and high […]

The post Smart Parking: UWB Technology Solving Parking Woes of Urban Population appeared first on ReadWrite.

]]>
UWB Tech Solving Parking

In urban areas, parking can be a major headache for residents and visitors alike. With limited parking space and high demand, finding a spot can take time and effort.

Moreover, UWB technology gains traction in smart parking due to advantages over traditional solutions. UWB technology enables parking systems to provide real-time data on available parking spots, allowing drivers to quickly locate and park without circling the lot.

This blog will examine UWB technology and its applications in smart parking solutions. UWB Technology is gaining traction in smart parking due to its advantages over traditional solutions.

What is Ultra-Wideband Technology?

UWB technology transmits large data over short distances with low power wirelessly. UWB technology uses a broad range of frequencies for data transmission, unlike traditional wireless technologies that use a narrow frequency range. This allows UWB technology to provide high-precision location data and enable accurate tracking of objects, even in crowded environments.

UWB technology works by sending out short pulses of radio waves across a wide range of frequencies. UWB technology measures pulse travel time to calculate device distance with high accuracy.

Exploring the Applications of UWB Technology

UWB tech helps drivers find parking spots fast, reducing congestion and improving the parking experience.

UWB technology improves parking system efficiency and has many smart parking applications.
Here are some ways in which UWB technology is applicable in smart parking:

Real-time parking spot detection: UWB sensors can be installed in parking lots or garages to detect the presence of vehicles in real-time. These sensors can detect the exact location of parked vehicles and provide information on available parking spots to drivers. It helps drivers find parking spots quickly, reducing search time and traffic congestion.

Vehicle tracking: UWB technology can be used to track the movements of vehicles in parking lots or garages. UWB sensors at key locations monitor vehicles and inform drivers of parked vehicle locations. UWB technology is useful in large parking facilities and garages where finding parked vehicles is difficult.

Parking guidance: UWB technology can be used to guide drivers to available parking spots. UWB sensors guide drivers to open parking spots in real-time, increasing parking efficiency. This can improve the overall parking experience for drivers and reduce traffic congestion in parking lots and garages.

Payment and access control: UWB technology can be used to enable contactless payments for parking and to control access to parking facilities. Integrating UWB sensors with payment and access systems offers a seamless parking experience for drivers.

Addressing Urban Parking Challenges with UWB Technology

The urban population faces several parking challenges, including limited parking spaces, traffic congestion, and difficulty in locating open parking spots. Here are some ways in which UWB technology is solving these challenges:

Maximizing parking space utilization: UWB sensors can be installed in parking lots or garages to provide real-time information on available parking spots. This helps drivers find parking spots faster, reducing search time and maximizing parking space usage.

Reducing traffic congestion: By providing real-time information on available parking spots, UWB sensors can reduce traffic congestion in parking lots and on city streets. This can help to ease traffic flow and reduce the environmental impact of vehicles idling in search of parking spots.

Improving the parking experience: UWB technology can enhance the overall parking experience for drivers by providing real-time guidance to open parking spots and contactless payment options. This can reduce the stress and frustration associated with parking and improve the convenience of the parking experience.

Enhancing parking security: UWB technology can also enhance parking security by enabling access control and tracking the movement of vehicles in parking facilities. This can help to prevent theft and vandalism and improve the safety of parked vehicles.

UWB Technology in Smart Parking Solutions: A Game-Changer for the Automotive Industry

UWB sensors and data analytics enable smart parking systems to offer an efficient, convenient, and secure parking experience for urban drivers.

The global market for vehicle access control using ultra-wideband technology was valued at $92.6M in 2022 and is expected to reach $383.1M by 2031 at a CAGR of 17.09%, according to the BIS Research report.

There are already several smart parking solutions that incorporate UWB technology.

Here are some examples:

Bosch: Bosch has developed a smart parking system that uses UWB sensors to detect the location of parked vehicles. The system offers real-time parking information through a mobile app, helping drivers find an available spot quickly.

ParkHelp: ParkHelp has developed a parking guidance system that uses UWB technology to track the movement of vehicles in parking lots and garages. The system guides in real-time to open parking spots and also allows for tracking of vehicles and access control.

Quanergy: Quanergy has developed a smart parking system that uses UWB sensors to detect the presence of vehicles in parking spots. The mobile app offers real-time information on available parking spots and can also be used for enforcement and security.

Hikvision: Hikvision has developed a smart parking system that uses UWB sensors and cameras to provide real-time information on available parking spots and track the movement of vehicles in parking facilities. The system also includes license plate recognition technology for access control and security.

ParkSense: ParkSense has developed a parking guidance system that uses UWB technology to detect the presence of vehicles in parking spots.

Conclusion

Ultra-wideband technology can differentiate vehicle access control, offering enhanced security and convenience for users in the automotive industry.

According to Dhrubajyoti Narayan, Principal Analyst, BIS Research, “UWB technology is becoming increasingly popular for vehicle access control systems, and industry experts predict that this trend will continue to grow in the coming years.”

Featured Image Credit: Provided by the Author; Pexels; Thank you!

The post Smart Parking: UWB Technology Solving Parking Woes of Urban Population appeared first on ReadWrite.

]]>
Pexels
What is 2023’s top wireless router with the fastest speeds? https://readwrite.com/the-top-wireless-routers-with-the-fastest-speeds-dl1/ Wed, 22 Feb 2023 22:37:41 +0000 https://readwrite.com/?p=9891

It seems like every day lately, router manufacturers are coming up with some new buzzword or marketing term to sell […]

The post What is 2023’s top wireless router with the fastest speeds? appeared first on ReadWrite.

]]>

It seems like every day lately, router manufacturers are coming up with some new buzzword or marketing term to sell you on why their networking appliance is better than the rest, without actually having the real performance to back it up.

That’s why we’ve teamed up with Gadget Review to extensively test and review the best wireless routers on shelves today, in order to give you a detailed breakdown of everything you need to know about the best wireless routers of 2017.

How we choose and why you should buys

To create this year’s roundup of the best routers on the market, we’ve run dozens of newer and some not-so-new models through the ringer to find the best of the best.

Using a 1GB symmetrical fiber optic line, we pushed our top picks to the absolute limits of what routers could do, testing on a variety of devices including desktops, laptops, smartphones and tablets.

See also: Are prices driving away smart home tech consumers?

To make this list, the routers we tested needed to have a minimum wireless bandwidth rating of 1900AC, have at least four ethernet ports on the back, one USB port for media server options, and be able to transmit on both the 2.4GHz and 5GHz spectrum. All the routers here hit the spec of transmitting at 250Mbps or more on 5GHz, and were able to maintain a rate of 300Mbps over a hard-wired connection.

Features like software and configuration options were also thoroughly tested, in order to find the best mix of performance, reliability, and price in the best wireless routers of 2023.

Our best wireless routers for 2023, compared

#1 Pick: Linksys WRT3200ACM Smart Wi-Fi Router – Editor’s Choice/Best Home Router

Linksys-WRT3200ACM-Best-Router-2017-1
The Linksys WRT3200ACM may look old-school on the outside, but it’s all future tech under the hood

Price: $249.99

The Linksys WRT3200ACM may look on the outside like it’s a blast from the past, but after running it through the ringer on everything from downloads to streaming, we can tell you this router might as well be straight out of five years from the future.

The WRT3200ACM comes equipped with the latest in bleeding-edge features like MU-MIMO beamforming capabilities and the option to create a mesh network with Linksys’ USB dongle architecture. It also runs all of this on top of Linksys’ revolutionary Smart WiFi dashboard system, which makes it easier than ever to customize and control how your router handles traffic from family members or guests on the fly.

If you’re looking for the total package when it comes to performance and power, the Linksys WRT3200ACM is undoubtedly the best wireless router for 2017.

#2 Pick: TP-Link Archer C9 AC1900 Wireless AC Gigabit Router – Best Budget Wireless Router

TP-Link-C9-Wireless-Router-Review
TP-Link Archer C9 wireless router is budget speed at its best

Price: $119.95

As great as the Linksys WRT3200ACM is, though, not everyone out there has a spare $250 laying around to spend on a single router.

Enter the TP-Link Archer C9, a smaller, unassuming router that still manages to pump out performance that’s on-par with routers two to three times the cost. In our testing on a fiber line, the Archer C9 was able to push nearly 300Mbps of download speed and almost half a gigabit of upload from 30ft away.

If you live in a larger house you may notice a few issues with signal reliability over longer distances, but otherwise the TP-Link Archer C9 is the perfect pick for apartment dwellers or small homeowners who need serious performance on a budget.

#3 Pick: Netgear Nighthawk X6 AC3200 Tri-Band WiFi Router – Best Wireless AC Router

netgear-nighthawk-x6-router
Netgear Nighthawk X6 AC3200 Tri-Band WiFi Router does it all and then some

Price: $255

Last up on this year’s list we have the Netgear Nighthawk X6, a powerful, imposing-looking router with a rich feature set for the ultra-geek in all of us.

As far as customization and configuration goes the X6 is simply unmatched in its category, thanks to the help of Netgear’s newly refreshed online dashboard. Its six high-powered antennas ensure coverage throughout every corner of homes large and small, and although it has a bigger footprint than most, this is the kind of kit you buy if you want your house guests to know you take your home networking more seriously than most.

And which wireless router of 2023 is right for you?

So, which one is the best wireless router for 2023?

They all are, or could be. The best part about routers is that in this category, there’s something that’s just right for everyone. If you want a router that’s got an extensive number of available features like parental controls and QoS management, the Linksys WRT3200ACM is the one for the job.

If you don’t have a spare arm and a leg to spend on a router but still want speed, the TP-Link Archer C9 is the perfect budget pick, while beasts like the Netgear Nighthawk X6 are all about range, performance, and reliability in one complete (and very scary-looking) package.

No matter what you’re looking for, there’s a best wireless router in 2017 for you!

The post What is 2023’s top wireless router with the fastest speeds? appeared first on ReadWrite.

]]>
Pexels
Kiosks: Types, Uses, and Profitability https://readwrite.com/kiosks-types-uses-and-profitability/ Fri, 05 May 2023 15:00:54 +0000 https://readwrite.com/?p=226487

With the rise of automation and self-checkout options, kiosks are becoming a hot topic of discussion among many business owners. […]

The post Kiosks: Types, Uses, and Profitability appeared first on ReadWrite.

]]>

With the rise of automation and self-checkout options, kiosks are becoming a hot topic of discussion among many business owners. But what exactly is a kiosk, and is it a profitable piece of equipment for businesses? Today, we’re going to unpack everything you need to know about the different types of kiosks and whether they’re profitable hardware.

What is a Kiosk?

A kiosk is a small, computerized booth or screen with a digital display, usually a tablet or other touchscreen computer enclosed in a protective tablet wall mount. Kiosks are often found in high-traffic areas, and are intended to provide additional information or offer services to customers passing by. A kiosk may be manned by an attendant who can assist in a transaction, or it may stand on its own and be available to serve customers when human employees are busy. There are a few different types of kiosks that each offer unique services and advantages.

 

Different Types of Kiosks

Here are a few of the most common types of kiosks you may encounter on a daily basis:

Information Kiosks

An information kiosk is the most general type of device, and its sole purpose is to offer information to shoppers. Information kiosks can be a great way to provide customers with resources and answer their questions without bothering the staff. They can be interactive or non-interactive but typically feature a menu system to help customers find what they need.

 

Self-Service Kiosks

A self-service kiosk is a device that acts as a POS system where customers can check themselves out without waiting for a human cashier. It’s typically a tablet or touchscreen computer that allows customers to scan and pay for items. It may be monitored by a human employee in case there is a system error or customers have questions. Self-service kiosks are a great way to avoid backed-up lines when it’s busy and help reduce the cost of hiring cashiers.

Wayfinding Kiosks

A wayfinding kiosk is a device that exists to help visitors find their way around an area. You’ll often see them at the mall or in large buildings where visitors need assistance to find a particular store or department. Wayfinding kiosks can be a great way to show potential customers exactly where they need to go to find you, so they don’t get frustrated and simply visit another establishment. This can be especially crucial for businesses that aren’t easy to locate or are within a large complex with many other stores.

 

Advertising Kiosks

An advertising kiosk is a large, backlit digital display that shows advertisements for a business or event. It’s typically placed in a high-traffic area full of potential customers and intended to market products or services. It functions much like a billboard, although it offers additional flexibility and convenience because the display can be easily changed, or the kiosk itself can be moved to a different area.

 

Internet Kiosks

Internet kiosks are a particular type of kiosk that provides users access to the internet and other applications. They can offer visitors full access to the world wide web or restrict it to a particular page or application based on the goals of the provider. You can offer free internet access to encourage customers to try a specific software or application, or you can charge a small fee for use and attract those who just need to do a quick search while they’re out running errands. Internet kiosks are a great way to bring in new customers and offer exclusive access to a digital product or service.

 

Are Kiosks Profitable for a Business? 

The simple answer is yes; kiosks can be very profitable to many different businesses. However, it depends on your objectives and how you use it. For instance, self-service kiosks can be a great way to reduce the costs of hiring unnecessary employees, although they may not work for all businesses as certain industries benefit from human interaction.

Advertising kiosks are another device that can increase brand awareness and generate more sales. Here, you must have a solid marketing plan and research where your ideal customers are likely to hang out.

Kiosks are a relatively low-cost piece of hardware that serve a variety of different purposes and can certainly help you cut costs and boost revenue. They are also a great way to provide resources and information to customers that may not directly translate into sales, but can help create new interactions and build brand awareness that will ultimately help your bottom line.

However, like any piece of technology, you need to have a solid strategy and a clear set of goals to make money with a kiosk. If you simply plant the device in the middle of your storefront and expect it to magically sell your products faster, you’ll likely be disappointed. If you have a clear purpose and use your kiosk effectively, you’re sure to see a significant return on investment!

The post Kiosks: Types, Uses, and Profitability appeared first on ReadWrite.

]]>
Pexels