Connect with us

Cars

Akamai targets IoT devices with launch of IoT Edge Connect

Published

on

14 mins ago
Networking

1 Views

The Rise of Industrial IoT
Infrastructure around the world is being linked together via sensors, machine learning and analytics. ZDNet examines the rise of the new leaders in industrial IoT (IIoT) and case studies that highlight the lessons learned from production IIoT deployments.

Akamai launched IoT Edge Connect, a service that’s aimed at connecting Internet of things end points and applications.

Special feature


The Rise of Industrial IoT

Infrastructure around the world is being linked together via sensors, machine learning and analytics. We examine the rise of the digital twin, the new leaders in industrial IoT (IIoT) and case studies that highlight the lessons learned from production IIoT deployments.

Read More

Simply put, Akamai’s network, which puts content and media closer to customers to reduce latency, can be used for IoT data.

Edge Connect is part of Akamai’s Edge Cloud, which is designed to enable enterprises to deliver data and applications at scale. Networking tools such as 5G are expected to enable more IoT data with less latency.

What is the IoT? Everything you need to know about the Internet of Things right now

Today, Akamai’s core markets are media and content as well as security. IoT could become a growth market.

Akamai said its IoT Edge Connect will offer a secure framework and support for in-application messaging such as Message Queuing Telemetry Transport (MQTT). MQTT is designed for resource constrained devices to send and publish information to a server.

IoT Edge Connect includes:

  • An architecture that supports hundreds of millions of endpoints. The architecture is designed to reduce battery drain and optimize data, speed and volume.
  • An all-in-one data stream, distributed database and key value store.
  • Mutual authentication between connected end points.
  • MQTT and a cloud broker for major cloud providers.

In Akamai’s first quarter, the company reported revenue of $707 million, up 6% from a year ago, with earnings of 65 cents a share.

Related:

Source link


Check Also



Australian telco iiNet has introduced a symmetric gigabit broadband plan for business. Businesses looking to …

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Cars

The Science Behind The Deadly Lake

Published

on

A buildup of carbon dioxide gas is not uncommon for crater lakes, with many of them occasionally releasing bubbles of it over time. Volcanic activity taking place below the Earth’s surface (and below the lake itself) will cause gasses to seep up through the lakebed and into the water. Something that generally isn’t a concern as deeper, colder water is able to absorb substantial amounts of carbon dioxide, but if the concentration gets too dense it can create bubbles that float up to and burst on the surface of the water.

This in itself is common, and the volume of carbon dioxide usually released in this manner will dissipate into the air quickly. However, it’s theorized that Lake Nyos had been amassing an uncharacteristically large amount of gas due to a combination of factors like location, local climate, overall depth, and water pressure. Once that buildup had been disturbed, it all came rocketing out.

Whether it was due to a rock slide, strong winds, or an unexpected temperature change throwing off the delicate balance is still unknown. But whatever the catalyst was, it caused the lower layer of deep, carbon-infused water to start to rise. Which then began to warm up, reducing its ability to contain the gas. The resulting perpetual cycle of rising waters and gasses creates the type of explosion you might see after opening a carbonated beverage after it’s been shaken vigorously.

Continue Reading

Cars

The Super Nintendo’s Secret Weapon

Published

on

The Super Nintendo featured seven different video rendering modes, each offering a different level of display detail, shown in one to four background layers. Most of the Super Nintendo’s games utilized Mode 1, which could display 16-color sprites and backgrounds on two layers plus a 4-color sprite on a third layer. This little trick was the key to the parallax scrolling effect you’d see in games like “Super Mario World,” where background elements would scroll at different rates from foreground elements.

Mode 7, however, was the only one of these display modes that permitted advanced visual effects. In a nutshell, Mode 7 allows the Super Nintendo to take a 2D image and apply 3D rendering effects to it, such as scrolling, curving, stretching, and more. By switching to Mode 7, games could transform one of their background layers into an independently moving image, which could be used for gameplay modifications and simple spectacle. Plus, with a bit of creative warping, a 2D image could be changed into a pseudo-3D view, having 2D sprites move around in a flat 3D space. It’s kind of like rolling a ball on a treadmill.

Continue Reading

Cars

Does Wrapping Your Key Fob In Foil Actually Make It Harder To Steal Your Car?

Published

on

Car key fobs operate using two pieces of radio-based technology: radio waves and a radio frequency identification system, or RFID. A wireless key fob has its own unique RFID signal paired to your car. This is how your fob is able to send remote commands with button presses, like locking doors and sounding the alarm. However, with the right kind of technology (or, rather, the wrong kind of technology), a bad actor could co-opt your fob’s RFID signal and send an unlock command to your car. Afterward, they can waltz right over, pop the doors open, and go on their merry way.

The tin foil theory banks on a metallic material’s natural ability to block and redirect electromagnetic waves, including radio waves. If you were to wrap your key fob in a few sheets of foil, especially very thick foil, then its RFID signal wouldn’t be able to get out. While that does mean you’d need to take the fob out of the foil every time you want to use it, it also means that a bad actor wouldn’t be able to intercept and co-opt its signal.

Continue Reading

Trending