IWCE 2016: What to expect next week?

The International Wireless Communications Expo (IWCE), is an annual event for communication technology professionals working globally in a broad range of the communications field, including energy, utilities, emergency response and municipality/infrastructure. This conference will get under way next week, from March 21-25, in Las Vegas. An estimated 7,000 individual industry experts are expected to attend from government/military; public safety (law enforcement, fire service and first responders); utility, transportation and business enterprise. IWCE will also feature around 370 exhibitors ready to show you the latest product innovations and trends forecasted this coming year. Donny Jackson editor of Urgent Communications, the official tradeshow media partner, believes that this year’s IWCE will give industry professionals a chance to get educated about the latest critical-communications technology, all while making key network contacts with industry experts. So, what else can we look forward to? IWCE promises to offer engaging content–with their 5-day comprehensive conference program; more quality time with peers; industry experts providing the latest strategies and tactics; minimal expenses–when you take advantage of conference discounts; structured networking opportunities; tangible handouts you can use throughout the year; more face-to-face learning time and more educational opportunities will be available this year. Excitement is building! Here are just a few of the people and organizations excited for next week’s event! Tune in next week for our IWCE insider recaps. Vegas here we come!

Difference Between Data Sheet Transmit Power & Data Stream Transmit Power

Image courtesy of Flickr Creative Commons You need to link a two production sites together in your IIoT network in order to move critical voice, video, data and sensor data (VVDS™) between the sites by deploying access points. So, you consider using industrial Wi-Fi Access Points to implement this short-haul, point-to-point (PTP) RF link between the two sites. Short-haul RF links out to 8 miles are very doable using industrial Wi-Fi Access Points with directional antennas. You evaluate potential Wi-Fi Access Points from their data sheet specs. This is given, and you select one. Now, there is one specification that is commonly misunderstood and leads to confusion when evaluating MIMO capable Wi-Fi Access Points and using them in either PTP or point-to-multipoint (PMP) IIoT networks as wireless infrastructure. Confusion and mistakes arise from the difference between the transmit power stated on the product data sheet and the transmit power of a single MIMO data stream of the Access Point. For example, a 3×3 MIMO Access Point data sheet states the transmit power is 27dBm for MCS4/12/20 data encoding in either the 2.4 or 5GHz band. This is typical, and not a surprise, but what is this transmit power really stating. The FCC limits and regulates maximum transmit power from an intentional emitter, e.g. Wi-Fi Access Points. For Wi-Fi devices, the limits apply to the aggregate transmit power of the device. In above product spec example, the transmit power stated is the aggregate transmit power for the 3 MIMO data streams. Still good? Yes. You have a Wi-Fi Access Point and the total transmit power is 27dBm. Now, you design your short-haul PTP link using Wi-Fi Access Points and directional antennas. What transmit power do you use in your RF link budget? 27dBm since it is the transmit power for the Access Point for the data encoding and the band you plan to use. Right? No. While 27dBm is the total aggregate transmit power for the Access Point, it is not the transmit power of an individual data stream. The individual data stream transmit power is roughly 5dB less than the aggregate transmit power found in the data sheet for a 3×3 MIMO product. Difference in Transmit Power versus Aggregate Power 1 Data Stream transmitting at 22dBm    —  Aggregate Transmit Power is 22dBm 2 Data Streams transmitting at 22dBm  —  Aggregate Transmit Power is 25dBm 3 Data Streams transmitting at 22dBm  —  Aggregate Transmit Power is 27dBm So here it is… If you use the transmit power from the data sheet in your RF link calculation without correction, your actual link distance will be approximately half what you expect for the planned fade margin or the link reliability will be less than what you expect for the planned link distance. When designing RF links for the IIoT networks, make certain you are using the correct transmit power in your RF link budget calculations.

IIoT Top News: Wireless and Wi-Fi

Gone are the days of limited connectivity—at least that’s the plan this year. According to Wireless Design Magazine, The Broadband Alliance has announced plans to hosts a world Wi-Fi-day. This global initiative has teamed up with more than 135 technology companies to help encourage all utilize the IoT and IIoT to its fullest, by taking steps to help business, industry and neighborhoods have access to quality wireless. Now as you reach for your smart device, smart machine or connected thing, hold on tight wireless is taking you to the deep end. Don’t worry you can handle it. Enjoy this week’s reading, and as always tell us what we missed! Army Command Post Gets Secure Gigabit Wi-Fi (GCN) The army is hoping to save countless hours tearing down wired battle systems networks with a new secure gigabit Wi-Fi. Mark Pomerleau with GCN reports that “Wireless capability speeds that configuration, improves troop mobility and provides greater flexibility for commanders.” Subsea Fiber Optic Networks: Past, Present and Future (RCR Wireless News) In this interconnected world, it is amazing to think about the amount of subsea fiber optic networks connecting the planet today, tomorrow and yesterday.  Joey Jackson with RCR Wireless News reminds us all that “Subsea fiber optic networks are responsible for the transmission of 90% of the world’s international data.” Type With Your Brain: Future Tech Ditches Keyboard (Discovery News) The future of wireless could allow you to get rid of the keyboard all together and simply type with your brain. Eric Niiler, with Discovery News, tells us that “Scientists are already working on technology that connects the brain to electronic gadgets and two new devices unveiled this week could help usher in a future without keyboards: a wireless brainwave headset and a brain sensor that dissolves in the body after completing its job.” The Future of Wireless Technology is Coming at Light Speed (The Telegraph) One hundred times faster than Wi-Fi, the future of wireless is expected to reach light speed. Rob Waugh with the Telegraph believes that “The speed boost will come from an unlikely source: the lighting above your head. Instead of Wi-Fi radio aerials beaming data through buildings to your laptop, computer-controlled LED bulbs will flicker above your head, beaming out signals like a super-fast Morse code.” The Future of Public Wi-Fi: What To Do Before Using Free, Fast Hot Spots (Wall Street Journal) Setting up an office on the sidewalk isn’t a realistic option year-round, but change is coming. It is good to know what to do before you jump on that free public Wi-Fi.Joanna Stern with the Wall Street Journal informs us, “Wi-Fi networks with widespread coverage and new standards are popping up to allow us to cut back on paying the carriers an arm and a leg for cellular data.”

IIoT Top News: CES 2016 & the Fate of IoT

All eyes appeared to be on the Consumer Electronics Show (CES) 2016 in Las Vegas since last week, as more than 3,600 companies unveiled the IoT and IIoT innovations we can all expect to see in the coming year. This year’s CES showcased plans to make the car a complete mobile office—with technology in place to allow Skype calls and the use of Microsoft 365 from the car. The other hot theme at CES was drones – not a surprise since these unmanned crafts have pulled us in like a tracker-beam to the mother ship. The autonomous ‘copter drone was one of the most impressive releases with the reality that the businessman of tomorrow doesn’t need a private jet, just a ‘copter drone and a smart phone. Now, as we watched all the products rolled out for their various purposes, it seems we have more connected things to add to an already expansive connected world. How will IoT connectivity technologies weather the storm as demand continues to skyrocket? According to IDC Research, IoT is about to take center stage by globally growing from $656 billion in 2014 to $1.7 trillion by 2020. The buzzwords of 2016 and beyond, IoT and IIoT specifically, simply show we are moving to an “everything is connected” environment. Naturally, once the luster of a shiny new thing wears off, we are tasked with the goal of protecting a critical piece of the IoT world – the data. Businesses need to make sure they are keeping information safe and secure. In this digital innovation age, plenty of industries (and therefore technologies) can’t afford a hack or cybersecurity breach at any time, for fear of customer loss.  Companies need to trust their digital information infrastructure will be not only be safe, but also high-performing – or they could very well risk extinction altogether. This week’s IIoT top news post takes another look at the fate of IIoT, as many new “connected things” hit the market this year. Hope you enjoy this week’s recap, and as always, tell us what we missed! Enterprise IoT Projects Will Be Costly, Lengthy and Vulnerable, Says Gartner (Computer Weekly) As the IIoT continues to inhabit day-to-day life, it’s not a surprise that, fifty percent of businesses will use some form of IoT systems by the year 2020. Gartner states that, “By 2020, addressing the black market and other compromises around IoT security will push overall security budgets up, with IoT costs expected to account for twenty percent of annual security budgets, compared with one percent in 2015.” Does Anyone Really Care About the Internet of Things? (Forbes) In this latest article by Forbes, Todd Hixon claims the term IoT was coined 17 years agoand he is still waiting for the killer ultimate app to come out. Hixon further suggests that when it comes to IoT, “Most of the time people prefer to ignore security and focus on more immediate needs and wants.” CES 2016 Takeaways: IoT Could Be the Death of Your Security Network (Network World) The real takeaway from CES 2016 is the overall lack of security for all these new IoT gadgets entering the market and how they fit into the IIoT ecosystem. Tom Henderson, from Network World believes the fate of IoT after CES is that “The damage, the damnation, the truculent total churl of the event was this: all of the new Internet of Thingies/IoT/KewlGear has no cohesive security strategy.” The Internet of Things: Hyped But Here to Stay (USA Today Tech) As the magnitude of connected things get ready for their clos-up, it would appear all the hype for IoT is here to stay. Edward Baig, with USA Today reports that, “You couldn’t walk around CES this week without hearing about or bumping into products related in some way to IoT, the tech industry’s inelegant way of describing all things connected.” What’s Next for the Internet of Things? (TECHCO) Sensors, software, electronic devices and M2M have taken over our daily lives. So, what’s next for IoT? Monoka Jha, with Tech.CO thinks the industry plan needs, “To use the Internet of Things optimally, we need to connect a device to different industries through varied media. For that to happen, the different industries need to have a common physical medium.”

IIoT Top News: 2015 News Round-Up

Let’s take a moment and appreciate the excitement 2015 brought for the IIoT: As we look back at the top articles from the year, we were intrigued to learn that cooperative utilities actually have the largest penetration of smart grid meters per percentage of customers, according to Greentech Media and the U.S. Energy Information Administration. It’s interesting to see the largest publicly-owned utility companies in the U.S. are not the leader in deploying smart meter systems. Another topic that caught our eye this year focused on big data initiatives and how they will improve operational efficiencies by the large-scale storage and transfer of volumes of information safely and securely. Companies don’t always see the value in updating information governance policies because there isn’t always a direct reward and no direct penalty for non-compliance. Tim Jennings, Ovum chief research officer, believes as big data continues to grow within the company infrastructure, it is time to consider the security, availability, and time spent storing data. Speaking of Big Data… It is hard to grasp the magnitude of data transferred throughout the cloud. Today, as big data goes to work, it is transforming industrial facilities, and as Forbes states, “they have grown increasingly complex and yes, every machine, every pipeline, every transmission point collects data ready to be read.” Of course, a 2015 news review would not be complete without at least one mention of unmanned systems. Whether the want/need was for industrial, commercial or government applications, the thing on everyone’s mind was how many cool ways this technology could be deployed in the future. While there were many examples to choose from, DARPA certainly caught a lot of attention from its new autonomous submarine-hunting ocean drone. Yes, you read that right! Finally, as we ease our way into 2016, we would like to share the rest of the top technology and IIoT stories from 2015. This year’s round-up highlights articles about: utilities, manufacturing, oil and gas, wireless, big data, security, drones and industry analyst perspectives. Hope you enjoy this week’s roundup, and as always, tell us what we missed! Energy Six Ways IoT Enables Innovation in the Energy Industry (IT World Canada) The energy industry is learning to use IoT to its advantage. IT World Canada details six ways IoT is enabling innovation and improving overall cost and efficiency for the industry. Yogi Schulz with IT World Canada believes that “Applying these IoT advances to a range of energy industry problems will be a major factor in helping the industry return to profitability in the new, lower commodity price environment through innovation based on better data.” Manufacturing Machine Learning (The Economist) As manufacturing becomes digitized, the industry has to adjust from being a product-focused world to a services market, with smart machines installed on the shop floor. The Economist believes that “For many manufacturers—in Germany and beyond—the principal sticking-point in making this digital leap is often cultural.” Manufacturing’s Digital Future (Industry Week) The digital future of manufacturing will incorporate the data analytics, cloud and many other wireless IoT solutions. Industry Week believes “many companies are leveraging interconnectivity to improve their own factory productivity, the factory-floor blocking and tackling of reducing downtime, cutting costs, reducing cycle time, improving OEE, etc.” Oil and Gas In the Digital Oilfield, “No Wires is a No-Brainer (World Oil) With the digital progression of our world, it seems only fitting we would find IoT in the oilfield. The question we must ask is: “Why, in 2015, has wireless I/O not overtaken hardwired infrastructure as the industry standard throughout the OFS sector?” Big Data Internet of Things Transforming Oil and Gas Operations (RigZone) Analytical movement has increased as the cost of oil continues to drop, therefore forcing the oil industry to gravitate toward more big data and IoT. It has been said, “the amount of data generated by oil and gas operations is starting to explode as real-time information from sensors is being collected at a rate of four milliseconds.” Wireless Tech Darpa’s RadioMap Detects RF Spectrum Congestion (GCN) An interconnected connected wireless world has created congested airways, thus making military communication and intelligence gathering requiring radio frequencies be managed. “RadioMap adds value to existing radios, jammers and other RF electronic equipment used by our military forces in the field,” said John Chapin, DARPA program manager. Big Data The Ethics of Big Data (Tech.Co) Big data has been defined as information that has been either unstructured or multi-structured as way to transform data into value. Once you have given value to the data, it is important to realize who owns the data. Tech.CO says that “when it comes to big data ethics, privacy is not necessarily dead, shared information can still have a reasonable degree of confidentially, but big data can still compromise identity and other information that customers and businesses prefer to be confidential.” Security IoT Security Needs to Stop Being an Afterthought (PCR) In the age of smart homes and smart devices it is time to improve the IoT security across the board. The Internet Society (ISOC) recently released a white paper stating, “the vendors who use IoT should take more responsibility for the security issues that can occur with IoT products.” Drones Robo-Bulldozers Guided By Drones Are Helping Ease Japan’s Labor Shortage (The Verge) Komatsu had to find a way to complete construction projects, as Japan gets closer to the 2020 Olympics. The aging population makes it hard to find anyone able to complete the work. The fix Komatsu has found is to offer a service called Smart Construction where, “a team of robotic vehicles scoops rock and pushes dirt without a human behind the wheel. They are guided in their work by a fleet of drones, which map the area in three dimensions and update the data in real time to track how the massive volumes of soil and cement are moving around the site.” Deforestation: British Firm Developing Tree-Planting Drone to Counter Industrial-Scale Logging (The Independent) A British engineering company is hoping to get international backing for an automated tree planting drone system. The purpose of these drone planting fleet’s, would be not

Guest Post: IHS Predicts IIoT Cybersecurity Will Increasingly Be Implemented in Hardware

By Sam Lucero, Sr. Principal Analyst, M2M & IoT at IHS Technology IIoT & Cybersecurity As IIoT systems create ever more critical dependencies in plant, energy infrastructure, and transportation environments, developers and deploying organizations will turn to hardware-enabled cybersecurity to stave off proliferating cyberattacks. Although the use of secure processors in smartcard applications, such as bank cards, mobile phone SIM cards, and digital ID documents is common, IIoT developers have barely begun to adopt a hardware-enabled approach. Instead, “root of trust” technologies, such as secure key storage, cryptography, and secure boot, are handled in software on the main application processor of the device. IHS estimates that in 2015 only 9.8% of all secure processors shipped were intended for IoT applications (that is, all of IoT, not just IIoT). The challenge with this software-based approach is that security functions on the application processor share common memory resources with other functions and are therefore exposed and vulnerable to malicious attack. Hardware isolation reduces (but cannot completely eliminate) this exposure and therefore dramatically increases the security of the device. This increased security is fundamentally why bankcards, mobile phones, and now ePassports, have shifted to the use of hardware-based security. Looking Ahead A lingering question regarding the use of secure processors in IIoT applications is whether implementation will be in the form of a second coprocessor chip placed alongside the host application processor, or whether cybersecurity hardware intellectual property will be integrated directly into an application processor. (Integration of cybersecurity circuitry still achieves hardware isolation in contrast to software, although some physical security measures may become impractical.) Chip companies such as Atmel, NXP, and Renesas Electronics have adopted this integrated approach for at least some of their respective portfolios targeting the IoT. It remains to be see whether an integrated approach will be successful. While integration helps to reduce overall device bill-of-materials, it can increase cost and complexity for cybersecurity certification, relative to a “two-chip” solution. About Sam Lucero Sam Lucero is a seasoned industry analyst with over 14 years of experience analyzing telecommunications and networking technology markets. He has spent the last ten years assessing the markets for machine-to-machine (M2M) and Internet of Things (IoT) applications. Sam has established leading M2M market research programs and managed international teams of industry analysts. He has authored numerous reports, forecast databases, and topical articles covering various aspects of the M2M/IoT market opportunity and has been widely quoted in news and trade journals, from the New York Times and the Economist to CNET and Wireless Week. Furthermore, Sam has moderated, presented, and judged at a number of industry events, including CTIA and Connected World. In 2014 Sam was named one of six “Augural Analysts” for M2M by Connected World Magazine.

IIoT Bold Prediction Series Part 2: Government Regulations Coming

Yesterday, we kicked the 2016 IIoT Bold Prediction Series off with a bang! As a nice follow-up, and second iteration of the series, Tim Mester, Principal Engineer of Advanced Technology at FreeWave, presents his Industrial IoT bold prediction: Prediction #2: Government Regulations Coming for IoT and IIoT Devices Due to a major security breach or reliability failure in connected devices or systems used in the Industrial IoT space, governments will be compelled to create and enforce new regulations on all IoT (and IIoT) devices, much like what is happening with the drone industry. (Note: IoT security breaches are not unheard of, as pointed out in this recent article by Bill Montgomery and  Glenn Longley’s latest prediction as the first part of the bold prediction series.) But, like drones, the barrier to entry into the IoT space has been lowered by improvements in technology. For IoT/IIoT devices, it is by the proliferation of a low power “system on chip” technology (SoC) and platforms like the Beagle Bone, Raspberry Pi and Arduino. Also, the Open Source software that is available allows developers to quickly pull products together based on these inexpensive SoC’s. Now that we can quickly have these products, how do those procuring these know that they are secure? How do they know they will be reliable and will not fail in mission critical applications? Companies that are already experienced in the M2M and IIoT space understand these issues and concerns. They take the necessary steps to ensure that they can deliver secure and robust devices to their customers. But what about the new comers? The ones that took the easy route? The ones who do not have the experience in this space? Looking Ahead As IoT/IIoT data and control becomes more sensitive and critical, concern will grow concerning the robustness of all of these devices that our lives are becoming dependent on. I believe that we will see a surge of government regulations that mandate the levels of security and reliability for IoT and IIoT devices. We are already seeing the beginning of these types of government regulations being mandated in some critical infrastructure industries and this will only perpetuate. In smart grid projects, for example, operators must take into consideration the cybersecurity reliability standards which FERC oversees. This helps operators choose a more cyber-hardened technology. On the other hand, for industries that do not have these standards in place yet, there remains a tradeoff between “secure” and “easy-to-use.” When strong cybersecurity has not been mandated, people tend to avoid the “harder-to-use” option that is typically more secure.

Announcing the 2016 IIoT Bold Prediction Series!

The year 2015 is soon coming to an end as the year 2016 looks to be ushering in exciting new ways in which the Internet of Things (IoT) is changing our way of life. It’s easy to see these transformations taking shape on the consumer side (home automation, smart appliances, connected cars, personal computers, smart devices, etc.), but what will 2016 hold for the Industrial IoT (IIoT) space? (Note: Go here for a quick rundown on the difference between consumer IoT and industrial IoT) 2016 IIoT Bold Prediction Series As stated in our introductory blog post (Are We All on the Same Industrial IoT WaveLength?), we at FreeWave Technologies are thrilled for the future of the IIoT and what it means for the entire business ecosystem. That is why we are excited to present the “connected world” community with a bold prediction in IIoT each day this week – aptly named the 2016 IIoT Bold Prediction Series! We of course encourage everyone to contribute your perspectives and experiences – whether in response to our predictions or a submission of your own – to help advance the dialogue around the emergence of the industrial internet. Our first bold prediction in the series comes from Glenn Longley, Regional Manager of Energy Markets at FreeWave: Prediction #1: Major Security Breach of Industrial SCADA System Brings New Focus to IoT According to Longley, “There will be a major security breach of an industrial SCADA system in 2016, which will drive industrial organizations to shift more of a focus on IoT and newer, more secure communication systems.” If you may not already know, cyber attacks against supervisory control and data acquisition (SCADA) systems are not new. In fact, Homeland Security Magazinereported earlier this year that “Cyber attacks against industrial targets—including power plants, factories and refineries—increased 100 percent in the past year, according to a new study conducted by computer technology company Dell.” Additionally, IT World Canada reported on a new InfoSec survey by the SANS Institute in 2015 where, “Both the degree of uncertainty and the rising number of known incidents are red flags calling for the dedication of greater resources to monitoring, detecting and analyzing anomalous activity in control system networks.” The survey also found that only 65 percent said vendor qualification of security technologies and solutions to be either highly important or mandatory. So with a proliferation of new cyber attacks seemingly happening more frequently, Longley explains how this widespread issue will impact IoT adoption in industrial businesses in the coming years: “Each company is different in how it handles the influx of IoT and the resulting IT/ OT convergence. With the merging/blending of Information Technology (IT) and Operations Technology (OT), the firewall that separates the two becomes more complicated and less well-defined. Traditionally, each was a separate entity; however, with IP-enabled devices and blending of technologies in enterprise networks, that dividing line becomes less clear. IT and OT professionals themselves might put a different emphasis on security, but in 2016, the two will need to come together (more than ever before) to prioritize security in their quest to create end points for all of their field assets. Therefore, security will ultimately be the limiting factor on how much IIoT is deployed.”

IT Security Dynamics and the Industrial IoT

The quest to understand production and operational factors, distribute this information to business systems and people within an organization, and directly improve business processes and profitability as a result is not new. In fact, it has been embraced by companies for decades. This collection of operational information for use in information or business systems is known as IT/OT convergence. Getting IT and OT systems to work together to maximize business efficiency — while avoiding negative consequences, risks and pitfalls in the process — is a tall task. However, thanks to new technologies, this process is becoming more practical and is creating the opportunities for huge economic benefits when these two disciplines are successfully integrated. But, how does this convergence affect the security paradigm in large, geographically dispersed enterprises? Let’s Talk Security Traditionally, companies have a corporate firewall that divides the corporate IT space from OT space. With an Internet of Things (IoT) communications network, there is a need to protect the sensors and new applications on the OT side. However, even if there is a secure communication link, if the individual devices that are connected on the OT side become compromised and the threat has access to that communication link, a hacker can push malicious data, cause denial of service (DoS), or introduce malware or viruses to the entire network. There are many of ways to run into problems on the IoT front if companies are not careful in their network design security implementation. On the IT side, corporate network security typically sees many threats. Those threats require significant attention, and consequently IT organizations have numerous options and tools to use, such as intrusion detection, log monitoring, network behavior monitoring, network inspections, whitelisting, firewalls, and more. The IT space has a much different attack surface than OT because with an IT network, the company can physically secure the building and control where the data goes in and out. Data escaping the building is relatively small in comparison to the OT space. WiFi that is leaking outside the building could be a vulnerability, but there are tools and ways to lock down that type of threat, and checkpoints where the IT department can analyze the traffic going through the network. In IT, bandwidth is plentiful and the network overhead associated with security is generally not a major factor. Considering Industrial IoT Networks IIoT networks, on the other hand, can span many miles with potentially hundreds of thousands of data points. An IIoT network likely consists of small embedded devices with long lifespans, making it very efficient. However, they are generally not like the Windows operating system, which is consistently conducting massive updates. Some embedded technologies don’t allow any updates, making it essential to carefully select the best devices for a network. Having thousands of these edge devices is where organizations will begin to see IT/OT convergence – many more points in the field where threats could be coming into the IT network. Industrial organizations today are creating a connected infrastructure with IP-enabled sensors or IP/IIoT-enabled Access Gateways. The data generated by sensors at an asset location can be valuable to more than just the central control system. This might mean M2M communication with sensors talking directly to each other. It may mean that multiple systems consume the live, real-time sensor data directly from the field. It may even mean that operators connect their sensors directly to the cloud or other back office systems. If there is a way to share critical data while addressing security issues that can help provide information to key data users, then that information becomes increasingly valuable. Security Through Obscurity is Not a Solution IIoT solutions often utilize the widely deployed security technologies from the Internet to avoid the custom, one-off solutions of past industrial security, when it was used at all. IP technology makes it easier to deploy and talk to sensors, but it also makes it easier for intruders to see and snoop on valuable data streams. Security through obscurity is not a solution. There are many common attack vectors for industrial devices that become even more relevant when considering the IIoT infrastructures and fully networked, geographically dispersed projects.

Become a FreeWave Insider

Designed, manufactured and tested in the USA.

© 2024. FreeWave Technologies, Inc. All rights reserved.

HEADQUARTERS

5395 Pearl Parkway, Boulder, CO 80301

TOLL FREE

LOCAL

Designed, manufactured and tested in the USA.

© 2023 FreeWave Technologies, Inc. All rights reserved.

Did you find what you were looking for?

Please let us know if you didn’t find what you were looking for so we can help make the site better for you.