Ships that Sail Themselves

Is it time for ships to sail off on a journey by themselves? As the Internet of Things (IoT) connects the world, while the robotics industry continues to innovate, man and machine are merging together like never before. Unmanned aerial vehicles (UAVs) have impacted a number of industries from agriculture to security. If recent news is correct, it won’t be long before autonomous cars are traveling roads alongside us. Now, organizations and government agencies around the world are actively working to bring autonomous vessels to our oceans. What can we expect from unmanned ships operating in our largest bodies of water? IoT and robotics are being considered for a variety of commercial and military purposes at sea. For most of the world, it seems autonomous ships are in the testing phase, but there are big plans in the works around the globe: The British engine maker Rolls Royce Holdings, PLC is leading the Advanced Autonomous Waterborne Applications initiative with several other organizations and universities. The company is eyeing a timeline of remotely controlled ships setting sail by 2030 with completely autonomous ships in service by 2035. The timeline will be heavily dependent upon automation technologies’ ability to carry large amount of data from ship to shore to ensure safe operations. Recently, the UK’s Automated Ships Ltd and Norway’s Kongsberg Maritime, unveiled plans for a light-duty ship for surveying, delivering cargo to offshore installations and launching and recovering smaller remote-controlled and autonomous vehicles. “This ship is considered the world’s first unmanned ship for offshore operations and is being eyed for many uses including offshore energy, fish farming and scientific industries.” In the U.S., the Navy has begun to consider autonomous ships for a number of applications, but is cautiously approaching these new technology advancements. According to National Defense Magazine, “The Navy for now appears to be in no hurry to pour big money into drone ships and submarines. And there is little tolerance these days for risky gambles on technologies.” However, the article acknowledges that robots at sea could help do the jobs that are dangerous or costly for human operators, such as hunting enemy submarines, detonating sea mines, medical evacuations and ship repairs. The European Union (EU) appears to have a vested interest in sea robotics. As infrastructure costs rise for improving rails and roads, they have begun to seek alternative ways to move large quantities of cargo. According to Maritime Executive they have, “had a long-term goal of making short sea shipping more competitive with road and rail transport, which is under stress from the transportation bottlenecks caused by increasing volumes of internal trade.” As the EU faces massive infrastructure costs to upgrade road and rail, there is increased attention and effort directed at the “motorways of the sea.” The Defense Advanced Research Projects Agency (DARPA) has been testing a robotic ship called the “Continuous Trail Unmanned Vessel,” and has been running sea trials on its radar system. The radar is fastened to a parasail that enables heights of 500-1,500 feet. These are just a few of the autonomous vessel projects in the works. In order for unmanned vessels to operate, it is clear the ability to transport data in massive amounts will play a critical role in the success and safety of those sharing the sea with autonomous ships. As technologies evolve to meet these big data needs, we can eventually expect to see more unmanned vessels in the sea, improving offshore applications, making human jobs safer, and creating new efficiencies for organizations looking to optimize international trade.

IIoT Top News: What the Industry Experts Say

Living in a 24-7 news cycle, it is best to take a break from all your favorite news outlets and go back to the basics. Industry analysts today are charged with giving their audience an unbiased report of their findings, that’s why this week’s top IIoT news is dedicated to seeking out some of the industry expert opinions in this ever-changing digital world. Let’s start by looking at Ovum’s 2015 key theme for the oil & gas industry. According to Ovum, more modernization of IT platforms will continue to help reduce the disconnect from the IT stone-age equipment to the modern real-time IIoT, thus allowing companies to improve their overall decision making process. A closer look at Forrester, we find security topping the list for 2016. In a recent report, Forrester is quick to call out the shortsighted firms for not realizing the importance of implementing proper security measures to protect the collection of data. It is recommended that firms stop focusing on the lowest possible cost to secure data, and turn the focus into the best way to keep and maintain quality information safely. On another digital front, Gartner predicts that by 2016 6.4 billion IoT devices will be in use, and only sees that number soaring with an estimated 20.8 billion things connected by 2020. Overall, we heard about the need to bring ethics to data, and predictions of how data will be turned into insight and action in the coming year. Other reports included the top digital trends and how those trends fit into the new digital mesh landscape. Additionally, we learned about revolutionary IIoT operational ideas for the future and a big data forecast for 2016 and beyond. Hope you enjoy this week’s research related reading! Bringing ethics to data, a board-level agenda item (OVUM) The challenge facing companies today is, what practices should be put in place to handle the large scale, data being collected. Tom Pringle reiterates the assertive stance Ovum has taken when it comes to the ethics of big data, “If data holds the potential to benefit many, it also has the potential to harm many (as an unexpected outcome, or purposefully negative).”   Forrester’s 2016 Predictions: Turn Data into Insight and Action In the 2016 Forrester predictions, Brian Hopkins, Enterprise Architecture Professional has broken the it up with three major shifts, that will help turn data into insight and action. Hopkins is quoted as saying, “Machine learning will replace manual data wrangling and data governance dirty work.”   Top Ten Digital Trends Signal the Digital Mesh (Gartner) David Clearley, vice president and Gartner fellow details the top digital trends and how those trends fit into the new digital mesh landscape. The fifth trend on Gartner’s list is advanced machine learning, Clearley believes that, “Advanced machine learning is what makes smart machines appear “intelligent” by enabling them to both understand concepts in the environment, and also to learn.” This area is quickly evolving, now is the time to figure out what technologies your company needs so you can have the competitive advantage.   Convergence in the Plant Asset Management (PAM) Market (Frost & Sullivan) In this detailed plan from Frost & Sullivan, they see IoT driving the next generation of improvements with predictive analytics. Furthermore, in the plant asset management (PAM) market Frost & Sullivan sees the, “Industry initiatives, including Industry 4.0, Smart Manufacturing, and applications of Internet of Industrial Things (IoT) technologies are revolutionizing operations and maintenance, enabling the cost-effective connectivity of a wide variety of asset classes.”   New IDC Forecast Sees Worldwide Big Data Technology and Services Market Growing to $48.6 Billion in 2019 A new report from IDC forecasts the enormous expansion of both big data worldwide and the services market by 2019. IDC predicts that, “The Big Data market continues to exhibit strong momentum as businesses accelerate their transformation into data-driven companies.”  

Big Data: Election Analytics and More

During the 2016 election season, we’ve seen considerable media coverage on big data and predictive analytics.  The access to massive quantities of data has played an increasingly important role not only for predicting the election winner, but also for driving candidates’ campaigns. During the 2012 election we saw political data science and big data leveraged by campaign managers to tap into the public opinions of the candidates. The information garnered from those data points led to decisions that shaped campaign strategies. Since 2012, we’ve seen substantial advancements in political data analytics. A recent Forbes article explains this well, “In recent years, political data analytics has advanced from simple micro targeting to true predictive data science, and the track record is good. Some of the brightest minds in the field are using massive amounts of data, complex models and advanced algorithms to determine the best way to appeal to big swathes of the electorate without alienating possible converts.” A GOP strategist recently claimed that analysts have about 400 data points stored for the average American voter and noted that they are constantly querying the database for insight. Predictive Analytics is an increasingly useful and complex practice — and it is not limited to presidential elections. It can be used in almost every industry to drive intelligent and informed business decisions. First, let’s define predictive analytics in relation to this post. This definition from TechTarget highlights the role of statistical analysis and machine learning to arrive at an actionable model: “Predictive analytics is a form of advanced analytics that uses both new and historical data to forecast future activity, behavior and trends. It involves applying statistical analysis techniques, analytical queries and automated machine learning algorithms to data sets to create predictive models that place a numerical value, or score, on the likelihood of particular events happening.” Beyond the Election With the rise of the Internet of Things (IoT) we are currently seeing predictive analytics leveraged for applications across industries to help organizations make better operating decisions. Here are a few application examples recently highlighted in Forbes: Models designed to predict where crimes will be committed Predicting the price of oil Insight into how upcoming events might influence a business Predicting the probability of success for a startup Identifying trends in the academic literature Predictive Analytics and S2S Communications Today, there are technology solutions designed for intelligence-enabled decision making. Sensor-2-Server (S2S) communication solutions in particular, help meet the increasing demand for data. S2S by definition is an intelligent communication that begins at the sensor level and targets servers for specific reasons. With an intelligent communication system to enable predictive analytics, operators can leverage new technology to improve the profitability of their businesses. As an example, let’s look at the one of the predictive analytics use cases listed above– a model for predicting the price of oil.  If an oil and gas company has an intelligent system in place, it can respond in real-time to its oil production levels. The data can help operators determine if production should be increased or decreased in certain areas to maximize profitability. Predictive Analytics Recap Predictive analytics engines allow organizations to analyze more data, faster. Key decision makers gain insight into trends and patterns that may be otherwise overlooked. They can make intelligent predictions that shape business operations and strategy. With the right techniques in place, an organization will make better decisions, cut costs and increase profitability. And for those who are running for public office? They now have more insight into the opinions and trends for voters than ever before. This has changed the game in a lot of ways because campaigns can be tailored to an audience based on specific data.

Is Sensor-2-Server Technology the Next Big Wave for Oceanic Monitoring?

The National Geographic Society defines oceanography as, “an interdisciplinary science integrating the fields of geology, biology, chemistry, physics, and engineering to explore the ocean.”  A brief history of oceanography, laid out by the National Geographic  Society, begins with the first oceanographic studies completed by the H.M.S. Challenger Expedition from 1872-1876, which was the first voyage that collected data related to the oceanic environment. The more advanced forms of oceanography did not begin until World War II when the U.S. Navy studied the oceans to gain communication advantages across the Atlantic for submarine warfare. In the 1950s and 1960s, submersibles were introduced and ultimately became the technology that revolutionized oceanographic exploration. Modern technology has enabled more in depth exploration of the ocean. It offers tools to observe the environment, study the living beings living within it, and explore the unexplored. With the increasing adoption of the Internet of Things (IoT), it is safe to say that more innovation will continue to drive oceanic research and exploration as we are able to connect more sensors and devices to the equipment that helps us learn more about the vast and expansive oceans. IoT technology allows researchers to take a scientific approach to the examination of the ocean through recorded and analyzed data. Some of the technologies already in use today include, vessels and submersibles, observing systems and sensors, communication technologies, and diving technology. Sensor-2-Server Technology for Oceanic Monitoring As IoT adoption rapidly expands, and in many ways changes the way things work – researchers continue to find new and innovative ways to explore the ocean. Some technology manufacturers are offering Sensor-2-Server solutions (S2S) for monitoring and data collection. S2S is defined as intelligent communication that begins at the sensor level and targets servers for specific reasons. The concept of S2S is about creating intelligent transmission from a specific location back to the appropriate server with the appropriate intelligence to drive action for change. For oceanographic purposes, this type of technology unlocks the opportunity to incorporate more data points than ever before. Some Sensor-2-Server solutions offer platforms to host third-party applications in addition to creating the communication links for devices. This new class of wireless IoT communication solutions is starting to be adapted for oceanographic research today. Below are some real-life applications that leverage modern Sensor-2-Server technology: Communication with an ROV on the ocean over a distance of about two miles Vessel telemetry for units that operate in a variety of changing environments from quayside to middle of ocean Remote access to GPS stations in Alaska over approximately 13 miles to optimize the quality of data transfer for ocean mapping. Connecting remote coastal radar systems measuring ocean surface currents around Coral reefs during an upcoming experiment along the very remote NW Australian Coast. S2S technology will continue to lead to new and exciting ways for researchers to uncover some of the ocean’s mysteries, understand how it works, and learn the behavior of its creatures.

Hacking: A Cybersecurity Top News Edition

Hacking became a scary reality last week as we all witnessed Twitter, Airbnb, Amazon, PayPal, CNN, Spotify and Reddit simultaneously get hit with a massive Denial of Service (DoS) attack. This attack also interrupted hundreds of other sites and internet connected devices from functioning properly.  For months, we’ve been hearing about the need to protect and secure our networks and devices. As the world steps further into the digital landscape, it’s clear that new advancements around cybersecurity tactics and strategies need to be addressed. Many are calling for standardization as a means to collectively thwart attacks and identify problem areas. Due to the proliferation of IoT technology and billions of connected devices, our critical infrastructure projects are those that may deserve the most attention in the short term. Read on for this week’s top cybersecurity news highlights that shine a light on the hacking aftermath and the inherent cybersecurity risks we should all be aware of in the IoT space. Exposed to Hacking Cybersecurity Experts are calling for Internet of Things Standards in Wake of Massive Attack By @ethanbaron | Published on @mercnews “In the assault Friday that blocked access to hundreds of websites, including Twitter, Airbnb, Amazon, PayPal, CNN, Spotify and Reddit, thousands of hijacked “internet of things” devices  bombarded a New Hampshire company called Dyn with traffic.” The Lessons From the East Coast CyberAttack By @josephinecwolff | Published on @Slate “This is an important lesson of online security and often an incredibly difficult one to impress upon users: Even the accounts and computers and machines that you don’t care about being.” Why Businesses Need to Secure Connected Devices to Win Consumer Trust By @jeffjohnroberts | Published on @FortuneMagazine “The issue now is whether the government should do more to regulate the Internet of things (IoT), or if we can instead trust companies and the market to solve the problem.”   This Attack Was Different–Cyber Threat Draws Utility Warnings By @BlakeSobczak | Published on @EENewsUpdates “Department of Homeland Security officials, who say they are investigating the attack on Dyn with the FBI, have warned that some smart-grid devices could be inadvertently swept up into attacks on other websites or key internet infrastructure.” Top Five Biggest Threats to IoT Security By Hannah Williams | Published on @cbronline “Hackers have recently been able to obtain access to a wide variety of connected devices, which has prompted new concerns over the security threats of the Internet of Things.”   Cybersecurity: The Biggest Threat to Automated Trucking By @AaronHuffCCJ | Published on @CCJnow “A single point of failure, or security breach, in a supply chain has far-reaching effects for all parties. Transportation companies must therefore think beyond their own IoT network perimeter, he advises, as the march towards automation continues.” As we conclude another round of top news highlights, we hope to have opened your eyes to modern cybersecurity considerations. As technology continues to evolve, we must continue to learn how to better protect our IoT interests upon exposure to hacking.

Industrial IoT Weekly Highlights

It’s time for another edition of Industrial IoT (IIoT) weekly highlights! Robots seem to be taking over this round of updates – by air, land and sea. Don’t fret, we haven’t stepped into a Sci-Fi movie just yet. Aside from machines, we gathered the latest information about fog computing, and why this trending concept is needed in the enterprise. The possibilities for machine innovation spurs thinking that we are just scratching the surface of digital transformation. What will people think of next? Sit back, relax and get ready to enjoy another round of weekly IIoT highlights! Weekly Highlights Breakdown What Is Fog Computing? And Why It Matters In Our Big Data And IoT World By @BernardMarr | Published on @Forbes “Fog computing, also sometimes called edge computing, solves the problem by keeping data closer “to the ground,” so to speak, in local computers and devices, rather than routing everything through a central data center in the cloud.” Farm 2026: The Robots Are Coming By @hiyamckidd | Published on @FGInsight “Lettuce thinning is still done manually at lower cost, but robots are likely to reach break even with human labour within 12 years.”   Digital Technology to Transform Oil, Gas Hiring Practices By @KarenBoman | Published on @Rigzone “When oil and gas companies start hiring again, they will need to prepare for a workforce of college graduates who want to work off a cell phone or tablet.”   Manufacturers Struggle to Woo Software Developers By @AndrewTangel | Published on @WSJ “Nearly every industry is looking to hire software engineers and developers. But the manufacturing sector is having particular trouble attracting potential recruits.”   The 10 Coolest Drones at the Worlds Biggest Robot War Games By @David_Hambling | Published on @PopMech “Unmanned Warrior is the world’s biggest robot war game, currently taking place for two weeks off the coast of Scotland. It was proposed by First Sea Lord Admiral George Zambellas to give airborne, surface, and underwater drones from various suppliers a chance to show off their prowess. Unmanned Warrior is part of Joint Warrior, an exercise involving 30 warships and submarines from 18 nations. But for the newly inaugurated robot portion, the U.S. is a strong presence, with teams from the Office of Naval Research (ONR).”   As we conclude our Industrial IoT weekly highlights, we hope you were entertained and enlightened. Technology continues to change at a fast pace, let’s find common ground with our robotic pals. Tune in next time for more IoT innovation!

Industrial Communications and Security Go Way Back

Industrial communications and security have a long standing history. In 2016, industrial network operators can collect more data from geographically dispersed field assets than ever before. As we head towards fully connected systems through the Industrial Internet of Things (IIoT), communication technology manufacturers continue innovating and creating enhanced solutions that will meet the Big Data demands of today and the future.  Data has become one of the most valuable assets an organization can own.  It can help operators improve operational decisions, save manpower and improve employee safety by keeping them out of dangerous environments. Industrial Communications  Industrial communications networks have more access points than ever before and we will continue to see more IIoT devices in service as connectivity improves in challenging environments. The IP-based technology incorporated into Industrial IoT communiations make it easier to deploy and talk to sensors, but it also makes it easier for intruders to see and snoop on valuable data streams. Anytime we talk about the collection and transfer of large amounts of critical data, security becomes an important part of the conversation.  If you’re a manufacturer, you are probably nodding your head in agreement or maybe even thinking that is an obvious statement.  However, based on the major cyber-attacks that have occurred in industrial networks over the past decade it is clear that a security focus from design to deployment isn’t always the case. Take a look at this infographic, “A History of IIoT Cyber Attacks and the Future of Security,” to see just how many huge scale cyber-attacks have impacted a variety of industries. While the infographic offers insight into major IIoT security breaches we’ve seen in the past decade or so, it does not provide the entire picture of industrial communication technology history and security practices. It does not highlight the fact that industrial operations networks have been using communication devices for decades and many industrial systems have been “online” since well before 2007. In fact, wireless machine-to-machine (M2M) communication solutions have owned the command and control of field assets for decades. Looking Closer at Solutions Top-tier industrial communication solution manufacturers have been leveraging security to prevent cyber-attacks and vulnerabilities on data long before the first major breach identified in the infographic. For years, these manufacturers have used a variety of techniques beyond physically securing the devices, including frequency hopping spread spectrum (FHSS) based devices with security standards like TLS/SSL and basic AES-128 data encryption. Some communication technology providers created solutions that are trusted by the US military for secure mission critical data transmission and have been used for more than 20 years. If one thing is clear in the efforts to protect data over time, it is that a critical infrastructure project is only as reliable and secure as the technology serving it. Security will ultimately be the limiting factor on how much IIoT technology is deployed.  A modern operator striving for an IIoT network must look at SCADA security, the convergence of Operations Technology (OT) and Information Technology (IT), and make a thorough assessment of what will allow them to achieve a secure data communications network and where they want to be in this triangle.  As the industry has evolved, so have the security practices. But what hasn’t changed is that an operator looking to build an IIoT network must carefully select their technology and look for the solutions that are focused on security.

IoT Evolution Podcast Recap: Edge Computing Future

Edge computing has become a topic of hot conversation as the technology capable of supporting sensor-2-server data transport has matured. The realization of true edge computing is accompanied by a host of benefits, including real-time data transmission, maintenance needs and considerable savings for operational expenses. Is edge computing the cut-and-dry future? Ken Briodagh, editorial director with IoT Evolution, plays devil’s advocate on a recent podcast with FreeWave Technologies CMO Scott Allen. He asks, essentially, “If companies focus resources on the real-time data transport at the edge – sending small packages of data at a time in the interest of speed – are we losing the benefits of big data? Do we lose the information that big data sets can provide in terms of predictive analytics and, ultimately, machine learning if we discard bits and pieces of data at the edge that we’ve deemed irrelevant?” Listen to the podcast below for Allen’s response! Overall, edge computing has three main drivers: latency–our need to have the data in milliseconds; loss of communication–able to solve the factory problem without shutting down the entire plant; proximity–sensors in the field monitor the data back to the edge. Edge Computing Solution Depending on the industry, a mixed bag of both programmable and edge computing solutions is an answer to Briodagh’s question. In some cases, especially with the oil and gas industry, companies rely on a sensor-2-server stream of communication, where they need to have the information in real-time, and if there is a problem, be able to act locally and fix the issue before anything drastic happens. The network is a combination of radios communicating with sensors that pass the data to a gateway and up to a cloud system. The network uses only small data sets to transmit a continuous flow of intelligent, sensor-based information, optimizing bandwidth in situations where latency is crucial. Next for the Edge There will come a time when using edge technology will just become a regular line item expense needed to do business in this modern age. Some early adopters have already started using gateway systems as a cookie cutter roll-out for all future expansions. Many worry the cost of entry is still too high to integrate, even though the need for transmission is great. As our digital age grows, infrastructure complexity and the desire to implement the latest technology grow along with it. Altogether, edge computing is still in its infancy stage, so no one really knows what data  we deem irrelevant today will be vital tomorrow.

Securing Assets with Outdoor Wi-Fi

The video surveillance market is anticipated to grow to $42B by 2019. Many industries today are using video monitoring as part of their physical security efforts to protect assets.  As the Internet of Things (IoT) is increasingly adopted by more industries, careful consideration must be made when leveraging Sensor-to-Server (S2S) solutions for video-based security applications.  From a technology perspective, IoT is beneficial for video security because it enables more data collection to drive intelligent business and security decisions that will better protect assets. However, with more sensors and devices connected to an IT network comes increased exposure for cyberattacks. It was inevitable that IoT would cross over into the physical security space, but the idea of security devices connected into an IoT network is concerning to many security professionals. In 2015, HP reported that up to 70 percent of IoT devices are vulnerable to cyberattacks. Any intelligent communication that is leveraged in an IoT environment must be designed with security in mind and have the ability to protect the network against cyber-attacks. Without ample security in the environment, companies risk severe consequences such as compromised data or denial of service. Outdoor Assets Protected Some outdoor shorthaul, Wi-Fi-based S2S networks are now designed to securely monitor and transmit voice, video, data and sensor (VVDS) information for asset monitoring and control. Additionally, any industry looking for an outdoor network robust enough to provide Wi-Fi connectivity may also benefit from these outdoor Wi-Fi solutions. From emergency communications to municipalities, industrial networks to golf courses or campgrounds, and more, there are numerous use cases where Wi-Fi is beneficial for connectivity and also for high-speed shorthaul communications needed to enable VVDS data. In IoT environments there are sensors on every single asset, constantly pulling data, so they need to make sure that security features are part of the technology’s design. For the operator seeking outdoor Wi-Fi to connect physical security devices and enable video monitoring, it is important to be familiar with the technology they are selecting. The Wi-Fi networks best suited for outdoor environments will have a rugged design with proven reliability in extreme environmental conditions. When the right security measures are in place, these solutions can ensure that data is protected through a variety of means including encryption, authentication, virus and intrusion protection, and by being physically tamperproof. Although robust, outdoor Wi-Fi can provide the connectivity needed for VVDS applications, but it needs to be able to withstand and prevent cyber security attacks. When the right technology is selected and enabled, asset protection can be enhanced through video. How are you protecting your assets?

IoT is for Automotive

The Internet of Things (IoT) has made an appearance in just about every industry (including automotive) that uses automation and has opened the door for the automation of pretty much anything and everything. Today, there are more devices than people and by 2020 there is expected to be 26 Billion – 50 Billion internet connected devices being used throughout the world. If one thing is true – and if the staggering stats above are any indication – we’re headed towards a fully connected world at a very high speed. Think about everything we can do now that wasn’t possible just a few years ago. We can lock our doors and shut off the thermostat from an app on our phone. At the push of a button, we can buy laundry detergent and have it shipped to our home. Industries with geographically dispersed and remotely located assets can cost-effectively add sensors and smart devices to every single network endpoint – to automate systems and drive intelligent business decisions locally and from afar. Racetracks are the next place IoT is surfacing, while automobiles with infotainment systems (connected by the IoT) continue to fill the streets. Autonomous Automobiles In the tech world, you’ve probably seen industry buzz and research data that verifies the reality of autonomous (or at least semi-autonomous) vehicles commonly traveling our roads in the near future. In fact, a few of the most innovative car manufacturers have already released vehicles with some autonomous features. If anything is for sure it is that the driverless car is much more than a fantasy today– there are people working to develop these vehicles right now. In the meantime, IoT has already begun to leave its mark on the automotive industry. So, what are some real life examples of unique ways that IoT communication solutions are being used in the automotive industry today? The Racing Industry The auto racing industry can automate many systems and processes for drivers and also generate data to support real-time decision making with IoT communication solutions. In one use case, IoT technology enables video data and high speed connections through a point-to-point system. With the data made available to drivers, they are able to adjust their racing strategy in real-time and make smarter decisions that decrease risk and save time. Electronic Car Testing For one electronic car manufacturer, IoT communication solutions are being used for engine testing and maintenance by using real time kinematics (RTK) base station communications to improve data and correlation. What Helps Drive the IoT for Automotive? Sensor-to-Server (S2S) communications have emerged as an essential solution for IoT networks in a variety of industries from industrial settings like oil and gas, to environmental monitoring, to the automotive industry. S2S solutions that are designed specifically for industrial-grade IoT networks, offer high speeds and extended distance connectivity via RF technology that can also support third-party applications. These solutions meet the demanding needs for collecting, protecting, transporting and controlling data from network end points all the way back to the server. As the world around us becomes more connected on a daily basis, we’ll continue to see new innovations released in many different marketplaces. In the automotive industry, IoT is leading to the inevitable release of autonomous vehicles. We can expect to see S2S communications play an increasingly important role for auto manufacturers looking to improve innovation and connect the network devices that were previously not connected.

Become a FreeWave Insider

Designed, manufactured and tested in the USA.

© 2024. FreeWave Technologies, Inc. All rights reserved.

HEADQUARTERS

5395 Pearl Parkway, Boulder, CO 80301

TOLL FREE

LOCAL

Designed, manufactured and tested in the USA.

© 2023 FreeWave Technologies, Inc. All rights reserved.