Menu

Whitepaper Library

IoTEvolutionWorld offers this extensive library to help you productively perform research and analysis. Using simplified search criteria, this archive puts actionable, relevant information about communications and technology at your fingertips.

If you are interested in contributing your White Paper into the IoTEvolutionWorld White Paper Library, please contact us.

Title:
Categories:
Company:
 

The Rise of Machine Data:  Are you prepared?

IBM | 7/20/2015 11:32:50 AM

The amount of machine data available requires complex analysis and correlation across different types of data sets. Companies that can perform this analysis stand to reap the rewards. IBM’s big data approach can help you gain business insights and visibility into the customer experience.

FREE PDF DOWNLOAD

Monitoring the mobile business

Vodafone | 3/26/2015 11:10:20 AM

Asset tracking enables companies to track the physical location and status of any asset owned, managed or manufactured by their business. It has been typically associated with logistics and shipping firms, who use this type of M2M connectivity to track delivery vehicles and containers. Vodafone Mobile Asset Tracking gives the organizations complete visibility and control of any asset that’s valuable to your business.

FREE PDF DOWNLOAD

Harnessing new levels of business insight

Vodafone | 3/26/2015 11:04:00 AM

Demand for water is rising fast. The global population — which increases by three people every second — places obvious demands on water supply. This paper outlines how M2M can help water companies take control of their supply networks through better visibility into water levels, current demand and losses. This paper is for all organisations operating in the water industry, including suppliers and water services companies.

FREE PDF DOWNLOAD

A better way to secure your business

Vodafone | 3/26/2015 10:40:02 AM

Imagine if security devices could keep you constantly informed about an asset’s status, wherever it is. With M2M, they can. M2M security is connected security. M2M has enabled a step change in functionality in three security applications: alarm systems, CCTV and asset tracking. This paper is specifically aimed at manufacturers and distributors of security equipment, but will also be relevant for enterprises with significant or specific in-house security needs.

FREE PDF DOWNLOAD

Vodafone Helps to Keep Lively Subscribers Connected

Vodafone | 1/14/2015 3:18:19 PM

Lively, a company which offers a solution to aide senior citizens to live independently, offers customers sensors which track movement and an emergency alert watch. The sensors measure movement and can be placed on a multitude of surfaces to provide remote parties visibility into the daily activities of the senior citizens. Additionally, the emergency alert watch deliv¬ers superior functionality in a more attractive form factor, which increases the use of such devices

Ensuring these solutions work and that the connectivity to support them is affordable, available, and reliable is of key importance. That’s why Lively chose Vodafone’s machine-to-machine technology.

FREE PDF DOWNLOAD

Gartner Emerging Technology Analysis: Software Licensing & Entitlement Management is the Key to Monetizing the Internet of Things

Flexera | 6/2/2014 11:23:27 AM

The Key to Monetizing the Internet of Things
Simply selling more device units will not result in the massive spike in profits manufacturers are hoping for as they make a play to compete in the Internet of Things (IoT). This is the conclusion of the new Gartner Emerging Technology Analysis Report, Software Licensing & Entitlement Management is the Key to Monetizing the Internet of Things.

According to the report, manufacturers will have to reinvent their business models to profit from the Internet of Things. In addition to selling more Internet-connected devices, businesses will also have to figure out how to make money from the software they develop that flexibly configures their devices and powers functionality - and they'll also have to leverage software licensing and entitlement management as the mechanism to capture those additional revenues.

More Products, More Services, More Revenue
- Less Costs

Licensing and entitlement management technology serves as the key mechanism that enables manufacturers to protect and monetize the embedded intellectual property running as software on these connected devices or the external software applications associated with them.

Read this report for other key findings and recommendations, including:

- Defining the Internet of Things
- Applying licensing to the Internet of Things
- Licensing and entitlement management-components, models and meters
- Licensing lifecycle management and the relationship of entitlement management to licensing
- Usage-based licensing models
- Technology adoption and impact
- Actions to take now and within the next 12-18 months

FREE PDF DOWNLOAD

Enhancing Mobile Development with Klocwork Checkers for Android

Klocwork | 5/20/2014 5:08:33 PM

Over half of all smartphones sold today use Android, and it's a popular choice for embedded systems. Developers in various parts of the Android stack have unique security and error detection needs - areas where static code analysis can help. While many analysis tools fail to understand the Android stack, Klocwork has a knowledge base of every function call in the platform, helping developers produce more secure code with fewer defects. This white paper explains these checkers using real code examples.

FREE PDF DOWNLOAD

Challenging Some the Myths About Static Code Analysis

Klocwork | 5/20/2014 5:07:07 PM

Static code analysis is the analysis of whole-program source code without actually executing the program. It has many benefits - fewer defects, faster delivery times, better standards compliance - but a number of interpretations and misconceptions about the technology have emerged over time. This white paper addresses some of the myths associated with SCA and provides examples of how it provides you, the developer, with real value.

FREE PDF DOWNLOAD

Fleet and Asset Management: Transforming Logistics with Machine-to-Machine Communications

Vodafone | 3/21/2014 5:02:26 PM

M2M has already had a massive impact in the global transportation sector. It's becoming a mainstay of transport operations where freight needs to be delivered rapidly and safely. It's helping logistics companies manage global fleets to ensure that consignments arrive in optimum condition. M2M has taken tracking to a new and much more sophisticated level, creating new possibilities for companies wishing to track freight and vehicles.

FREE PDF DOWNLOAD

Manufacturing Industry Brochure

Vodafone | 3/21/2014 4:54:09 PM

M2M technology can save you time and money while transforming the way you run your business - from design through to post-production. M2M solutions provide you with real-time data to help you optimize each stage of your product lifecycle - enabling you to drive down costs and serve your customers better. Find out how manufacturers are already using our M2M solutions to improve processes, cut costs, and offer a better service to their customers.

FREE PDF DOWNLOAD

Connected Revolution

Vodafone | 3/21/2014 4:36:32 PM

With competitive pressures intensifying and the pace of innovation accelerating, recognizing key trends, understanding their implications and, where appropriate, responding decisively is essential to remain successful.

This paper describes our thinking relating to understanding the impact of the connected revolution. If you are interested in topics such as the growth of the Internet of things and machine-to-machine (M2M), the opportunity it represents for businesses and the requirements for success, then you will find this of interest.

FREE PDF DOWNLOAD

10 Signs That You're Paying Too Much for Cellular M2M Service

Aeris | 3/13/2014 10:52:08 AM

From inflexible contracts to hidden fees, cellular operators have many ways to drive your bill up each month. You need to be aware of these items in order to negotiate and insulate yourself from unnecessary cost. This industry brief documents the ten most common fees that you can avoid by asking the right questions.

FREE PDF DOWNLOAD

GSM v. CDMA: Technical Comparison of M2M Technologies

Aeris | 3/13/2014 10:51:16 AM

GSM and CDMA are similar technologies but understanding their differences is crucial for determining the right solution for your M2M program. This whitepaper compares the GSM and CDMA technology families, including technology deployment paths for each; encoding protocols and differing data rates; and the depth of physical coverage in the United States.

FREE PDF DOWNLOAD

Defend Against Injection-based Attacks

Klocwork | 1/7/2014 4:52:28 PM

It goes without saying that as software becomes more prevalent in our daily activities, it becomes imperative that we implement that software in the most secure manner possible.

Software is everywhere and touches everything we do - from the computers we work on to life-saving insulin pumps and pacemakers. Software controls and manages the embedded systems that provide us with electricity, water, natural gas, transportation, communications, and more. Increasingly, all these devices and systems are connected to each other behind the scenes, resulting in a growing "network effect".

Couple this with end-users that expect devices to work properly and don't want to think about the technical ramifications of the software being used and we begin to realize how important it is to write code that is resistant to malicious attack.

This first in a series of white papers explores the most common security vulnerabilities currently plaguing the software development industry, and presents different ways in which Static Code Analysis, or SCA, can detect them. When you download "Defend Against Injection Based Attacks" you will learn:

- A detailed description of the weakness
- How each weakness presents itself to the end user and the developer
- An explanation of the mitigation strategies to help resolve each issue

FREE PDF DOWNLOAD

3 Must Follow Guidelines for Mitigating M2M Software Security Risks

Klocwork | 12/2/2013 10:27:58 AM

Everywhere we turn today, we find software embedded in our lives – from our smart phones and cars to the planes we fly in and the life saving equipment in hospitals. As all these systems continue to evolve and become more connected to each other and to the internet, the risks associated with unsecured code grow too. And not always from malicious hacking attempts; faulty code in many of these applications can present significant security risks.

Download the “Three Must-Follow Guidelines for Mitigating M2M Software Security Risks” whitepaper from Klocwork and learn why embedded software teams need to follow just a few critical guidelines to protect their systems, including:

• Why address security early, and how to take defensive measures against security threats
• How and why to build security in at the development stage
• How to protect systems against unauthorized changes and malware attacks

FREE PDF DOWNLOAD
First 1 2 Last