Author: megan

Why smart home is a smart play for operators

Covid-19 has had many side effects and one of them has been to rejuvenate the smart home. A market that was previously in decline is now revving up and operators have a springboard into its heart. Analysts predict the value of the global smart home market will soar to between $138.9 billion and $622.59 billion by 2026 as connectivity is introduced across a wider range of home devices from security cameras to utility meters, and thermostats. The pandemic has already amplified demand for smart appliances for security, climate control, lighting and health alongside smart TVs. Connectivity is likely to become so pervasive to the extent of being embedded in every household device in the coming years. The exponential growth in working from home and the urgent need for energy-saving and low carbon emission solutions are also driving demand.

Broadband Router: Gateway to the intelligent edge

The intelligent edge is poised to propel media and the communications industry toward the next generation of connectivity and efficiency. The opportunities will be great and telcos and operators have the chance to gain. With the advent of 5G, Mobile Edge Computing and the WiFi edge, partnerships and collaborations between Amazon, Google, Microsoft and telcos will flourish across both enterprise and consumer markets – according to ABI Research.

Accelerate your development of IoT products

Scaling your product to the ‘00s, ‘000s, or even millions brings additional commercial and technical risks that can be easily overlooked during development and early deployment. Getting your IoT product to scale profitably is a multi-stage journey that requires different skills, experience and approaches at each stage. Recent research highlights that scaling up challenges are the main reason why IoT projects fail.  

 

From Zero to Hero: Scaling IoT

Discover our product development playbook to ease the scaling process and avoid some of the risks associated with IoT product development failure. A strong business case is built with real-world understanding across the whole product and life cycle. From product to operations, there are many difficult considerations. The true cost of investment and resource to achieve scale is often underestimated, as are the risks involved, leading to a loss in stakeholder confidence and sometimes funding. 

Choosing the right Edge AI framework

When it comes to AI, bigger isn’t necessarily better. Significant growth in the development of Edge AI brings a world of opportunities but using Edge Computing is not without challenges, finding the right hardware is tough. There are several open-source AI frameworks on the market. Their capabilities and characteristics vary considerably with performance, coding language, pre-trained models, commercial support, licensing terms etc. To find out how these Edge AI frameworks compare, we’ve developed an at-a-glance guide comparing the most popular Edge AI processors on the market, so you don’t have to!

Choosing the right Edge AI processor

The edge is already complex, consisting of a myriad of devices and gateways interacting through new and established wired and wireless technologies.  When selecting an AI processing solution, it’s important to consider hardware and also AI software frameworks, as both can impact the capabilities which can be supported. To help you choose, we’ve created a high-level guide of market options. 

Will your new IoT device break your business?

In partnership with IoT Now and Transforma Insights, we share insight on IoT security and how to design, develop, deploy and scale a trustworthy IoT product to market. In this webinar we’ll go through the big decisions you need to make through the entire IoT product development journey to ensure compliance with secure by design principles.  

Product development quick guide: Future-proof your security

Security is one of the most significant factors holding back deployment and adoption of IoT, and one of the most complex. As an end-to-end IoT product development company, we can help you design, develop, deploy and scale secure, trusted smart products, reducing your risk and helping you get to market faster. Our quick guide sets out key stages you should go through when considering security in your internet of things device to comply with the UK’s Secure by Design (SbD) principles. 

Is it secure? Your IoT security checklist

Do you want to develop a robust, trustworthy product that will be secure during its total product lifecycle? then you need to ensure compliance with the UK’s Secure by Design standards. Our Secure by Design checklist will help you ensure you’ve covered all the internet of things security bases. Our checklist will provide you with a set of questions to ask at every stage in the product development journey, perhaps throwing light on some important areas you may not have thought of yet. These questions are guided by four key aspects of attack surface analysis: deterrence, prevention, detection, correction and counter measures.