With Black Friday and Cyber Monday behind us, the holidays are officially in full swing. To help get you in the holiday spirit, we’ve curated some of our favorite connected creations that take holiday celebration to the next level.
Here are some of our favorite Internet of Things-powered projects to keep you occupied this holiday season.
IoT Seminar Series
The Digi executive team started the month off across the globe for the IoT Seminar Series “Connect with Confidence”. This two part series focused on solving mission-critical machine-to-machine communication challenges with expert technical advice and Internet-of-Things product offerings. The intimate set up gave attendees the opportunity to meet one-on-one with key presenters and technical staff to openly answer questions, share customer stories, and discuss product strategies for industrial connectivity, IoT devices, and embedded RF and cellular applications.
Part one of this series took place in Tokyo, Japan on November 1
Part two took place in Shanghai, China on November 2
Digi Product Manager went live with Beecham Research, Founder & CEO Robin Duke-Woolley, for the M2M Zone webinar to discuss details of the cellular IoT roadmap, LTE IoT standards and benefits, and how low-power cellular connectivity is a game changer. Listen to the full webinar below and tune in for the next one on January, 12 2017.
Digi traveled to Germany for Electronica 2016 to feature new products, offer customer promotions, and support partnerships. Highlights include connecting with current and new customers, meeting with media, and working with our dedicated partners. Read more about the show and the IoT highlights here >>>
The Digi team had a great time at Electronica 2016, a trade show that takes place every other year in Munich.
This year over 73,000 attendees and 2,800 exhibitors helped the event live up to its billing as “the best place to see the entire world of electronics here—on Planet e.”
But, what impressed us the most was the number of applications and topics, as the Internet of Things (IOT) is bringing innovations that permeate every industry and product category.
Exhibits covered topics ranging from automotive and industrial process control to consumer wearables and connected health. Embedded computing and integrated sensors along with ubiquitous connectivity are truly transforming every industry.
Here are a few creative ways we saw engineers using embedded computing and connectivity:
This Digi XBee ZigBee Light demonstrates the capabilities of cloud-connected, industrial lighting. It was designed with an Digi XBee ZigBee module, and an Digi XBee gateway to create a cloud-connected wireless lighting solution that can be monitored and controlled from a cloud-based application.
This particular industrial light was created by our very own Digi experts to be showcased at events like electronica 2016. Hence the reason why the board is placed below the light, but in reality it would be embedded in the light fixture itself.
1 Black Display with attached power strip, plus:
1 Digi XBee Cloud Kit Development Board (55001789-02) and XBee-PRO ZigBee module (XBP24CZ7PIT-001)
1 Digi XBee ZigBee Gateway (Eth/Wi-Fi) w/ power supply
1 Ethernet Cable
1 Digi XBee Smart Plug
1 Micro-USB Cable
In the Heroku app for the kit, there are 4 widgets:
Street Light control – turns the LED on and off
Ambient light – measures the light on the sensor placed directly below the light. Presented as a percentage 0-100%
Housing temperature – measures the temperature on the development board
Street Light Watts – measures the current draw of the light in Watts
First time Digi XBee users, successfully created the Smart Record Player at the 2016 IoT Hack Day in Minneapolis, MN that was organized by IoT Fuse. This Clank, Clank, Clunk record player was created using “off the shelf parts” and “off the shelf technology” also known as the Digi XBee module and the Digi XBee Cloud. This allowed the hackers to solely focus on creating this master piece within the 12 hour time-frame.
The expansion of IoT applications allows more remote devices to wirelessly collect, store, and transmit information across vast networks and distances to multiple applications. This advancement now demands that remote IoT solutions be designed to have individualized device security, well thought out IoT hardware and with consideration of risk aversion because hackers now have a larger playing field with even more targets. Industries like Smart Grids, Smart Cities, and the Transportation industry are more susceptible to these cyber attacks because they are constantly trying to go further, do more, and expand network coverage. Remote IoT connected devices can be accessed from both wired and wireless networks, which leave them vulnerable to these basic types of attacks to consider:
Access/Authentication of IoT Devices – Hackers can cause mistrust by misleading remote network devices by altering the manufacturer code.
Up-to-date security systems – Hackers can attack systems that have fallen behind on updates or lack support to patch issues in large numbers of scattered IoT devices.
Encryption Network Security – Hackers can easily access and find encryption keys to decrypt IoT data.
Hardware Port access Protection- Hackers can physically attack remote IoT devices and gain access through the JTAG port, network ports, or an Ethernet port.
The IoT solution to help prevent these cyber attacks is to design and implement a futuristic IoT security framework. The security solution will be tailored to a specific IoT solution and will provide advance features like device authentication, using a remote system that will monitor and update devices. Remote services will also help store IoT data and validate that data as originating from the proper device. It will include a hardened coprocessor that add other layers of IoT security by enabling security functions separate from the main processor in a hardened security environment.
To more efficiently monitor and manage waste containers, PragmaTech an innovative waste management consulting firm, developed Pandora. Pandora, a proprietary software, utilizes wireless communication to allow individual machines to remotely indicate fullness and that the units are working correctly and efficiently.
This software helps PragmaTech customers save as much as 60% in haulage costs by monitoring the performance of on-site equipment, ensuring all services are provided in a timely and efficient manner. Today, the company has more than 3,400 systems deployed across all of North America.
The software accesses onboard computers with the Digi TransPort® WR21 3G/4G LTE M2M enterprise router to collect and deliver data. The data supports services, production, purchasing, sales, and marketing functions and enables organizations to achieve cost savings. Pandora schedules pick-ups only when compactors reach a specified fullness level, eliminating the cost of unnecessary collections.
Cyber security has attracted a tremendous amount of attention lately due to recent cyber-attacks that have been publicized in the news. Internet of Things (IoT) connected devices have given users the amazing ability to connect devices in distant, isolated areas saving time and money, while minimizing risk. However, this connectivity comes at a cost. Remote devices can be susceptible to cyber-attacks such as hacks, viruses and spyware invasions that can go undetected until it is too late. Remote devices can also be even more prone to physical unauthorized access or damage because security focus tends to be elsewhere.
While cyber security is not to be downplayed, physical security should not be overlooked and is equally concerning. Physical attacks could jeopardize critical units like Supervisory Control and Data Acquisition (SCADA) systems, Intelligent Electronic Devices (IEDs), and Smart Cities and Transportation management solutions. This could lead to widespread, costly and hazardous damage to city services, water systems and even more.
Awareness is critical when trying to determine a balanced security solution for IoT applications. Below are some key questions to be considered as you assess threats and determine the best solutions.
● What type of information must be collected? The data typically falls into two categories – alarm data and log data.
● What type of sensors will be needed?
● Will the sensors use radio, Wi-Fi or cellular for connection, or a combination of two or more?
● What power source is available? Battery, hardwire, or other?
● Will managers and security personnel have insight into what actions to take?