The world is producing greater amounts of data applied for increasingly smart applications which require massive amounts of processing and computing. These smart applications are utilizing a diversity of hardware with billions of connected devices in the world capturing and exchanging data in use cases across a spectrum of verticals. The Internet of Things has become nearly omnipresent in our environment. The new generation of smart IoT applications face challenges in legacy systems and require decision-makers to pursue optimizations to issues like latency, security, privacy, connectivity and cost.
A new generation of innovative technology solutions that lower latency are converging to empower an industrial transformation upon which tomorrow’s world will be iterated and dependent. This is driven by the need of seamless high data exchange applications that currently experience challenges in the latency of their network connectivity, meaning the amount of time it takes for data to travel between sender and receiver is too long. There is a growing portfolio of solutions aiming to lower latency making far-reaching new applications possible and existing use cases more efficient.
Security of IT infrastructures was never a joke. There were always bad actors that wanted to exploit it for personal or business gain. Today, when serious portions of data, and even whole infrastructures are migrated to the cloud, it’s especially important to take care of your resources.
Hopefully, the following list of the biggest cloud security breaches could be helpful. We will highlight the changing nature of attacks, as well as provide examples of the most famous ones. We will also go through current, most important threats.
If you are planning an IoT network, you have a couple of decisions to make. Both technical and business in nature. One of them is choosing the roles that your devices will be playing in the scheme. Should an IoT device act as a client or a server? And what if you could create an IoT server accessible through the internet on a microcontroller? A decentralized IoT?
Let’s save the best for last. For now, let’s focus on the roles themselves. Let’s face it – currently, almost all IoT devices on the market are clients, not servers. The server is singular, and it’s an IoT platform to which all clients are connecting to.
We have great news for many of you who like the idea of fast, peer-to-peer networks consisting of devices of any scale, but are sceptical of Husarnet's closed source policy.
Your feedback convinced us that going open source is the right decision. And therefore we are happy to officially announce that Husarnet Client is now open source and available on our GitHub page.
The goal of this blog post is to tell our story about what led us toward this big change.
Did you ever want to be in two places at the same time? Who wouldn’t want to do that? Being able to multiply and handle many things at the same time sounds like a fantastic idea. Teleportation is yet to come but the market developed the next best thing – telepresence robots.
You don’t have to look far for examples of telepresence robots. Medicine and education are natural choices here. The whole idea behind the concept is that a robot can be present in one room, one city, country, and sometimes even a continent, however the person operating it – someplace else. A doctor operating on a patient in the U.S while physically being in the U.K. A teacher launching an experiment in class while being on a semi-sick leave. That’s not the future, that’s 2021.
In a nutshell – a very cost-efficient business opportunity. It’s an evolution of the Internet of Things (IoT) which has a potential to change industrial, business, and social use cases and interactions. How will it work and how can you profit?