The Week in Review: IoT


Acquisitions ASSA ABLOY has agreed to acquire August Home, a startup providing home security products; the purchase price wasn’t revealed. August Home, which raised $75 million in private funding, should fit well with the Scandinavian conglomerate’s Yale lock business. The transaction is subject to regulatory approval and customary closing conditions; it is expected to close by the end of ... » read more

MEMS Market Shifting


The MEMS sector is beginning to look more promising, bolstered by new end-market demand and different packaging options that require more advanced engineering, processes and new materials. All of this points to higher selling prices, which are long overdue in this space. For years, the market for microelectromechanical systems was populated by too many companies vying for too few opportunit... » read more

How To Build An IoT Chip (Part 2)


Semiconductor Engineering sat down to discuss IoT chip design issues with Jeff Miller, product marketing manager for electronic design systems in the Deep Submicron Division of [getentity id="22017" e_name="Mentor, a Siemens Business"]; Mike Eftimakis, IoT product manager in [getentity id="22186" e_name="Arm"]'s Systems and Software Group; and John Tinson, vice president of sales at Sondrel Ltd... » read more

The Week in Review: IoT


Market Research International Data Corp. (IDC) forecasts the worldwide Internet of Things market will double from $625.2 billion in 2015 to $1.29 trillion in 2020 for a compound annual growth rate of 15.6%. Aeris collaborated with IDC on its report, which predicts the installed base of IoT endpoints will increase from 12.1 billion at the end of 2015 to more than 30 billion by 2020. Initiati... » read more

Trimming Waste In Chips


Extra circuitry costs money, reduces performance and increases power consumption. But how much can really be trimmed? When people are asked that question they either get defensive or they see it as an opportunity to show the advantages of their architecture, design process or IP. The same holds true for IP suppliers. Others point out that the whole concept of waste is somewhat strange, becau... » read more

The Week in Review: IoT


Finance Mountain View, Calif.-based FogHorn Systems has received Series B funding of $30 million, led by Intel Capital and Saudi Aramco Energy Ventures. The new round brings the Industrial Internet of Things edge computing startup’s total funding to $47.5 million. Honeywell Ventures is a new investor, joining existing investors Darling Ventures, Dell Technologies Capital, GE Ventures, March ... » read more

IoT Security: Technology Is Only One Part Of The Equation


Survey after survey on the adoption of the IoT punctuates that security and data privacy continue to be the top concerns with any new implementation. It used to be that security was all about protecting data (business, personal ID, etc.), but as more devices are connected to the IoT, security concerns reach far beyond just the value inherent in the data. According to Gartner, nearly 5.5 ... » read more

Let’s Talk About Securing The Industrial Internet of Things


What is the IIoT? Objects, sensors, actuators and controllers that were once designed for stand-alone operation are now increasingly connected by means of intelligent software and networks – forming the basis of the Industrial Internet of Things (IIoT). To be sure, GE defines the IIoT as “a network of a multitude of devices connected by communications technologies that results in systems t... » read more

What’s Next for the IoT?


The Internet of Things continues to evolve, attempting to overcome its poor reputation for cybersecurity and making the case for wider adoption, especially by enterprises. Consumer IoT, largely represented in smart-home automation, remains a market being targeted by Amazon, Apple, Google, LG Electronics, Samsung Electronics, and other technology titans. The big bucks are in [getkc id="78" k... » read more

IoT Cyber-Security: A Missing Piece Of The Smart City Puzzle


Smart city devices, as well as the data they generate, must be protected against a wide range of cyber threats. Vulnerable devices can be hijacked and even physically disabled, while unencrypted or unverified data transmissions can be intercepted, leaked or spoofed. A leak or deliberate falsification of sensitive customer data will inevitably damage a brand and decrease confidence in smart city... » read more

← Older posts Newer posts →