Last week, Ed Hightower gave an excellent high-level overview of popular Low Power Wide Area Networks (LPWAN) and Smart City initiatives, including what’s going on in Dallas area. You can watch the recorded presentation below.
Our friends at Multitech remind us about impending 2G/3G sunset with the US carriers.
Replacing the cellular-based sensor infrastructure takes time and good planning. Don’t be caught off-guard.
LoRa is a proven, low-cost alternative to LTE, especially for Smart Ag applications. Zenseio has had LoRa sensor solutions deployed on fields for the last year, and customers are happy to dramatically reduce their recurring connectivity costs.
What will happen when you lock a bunch of hackers, entrepreneurs, and mentors into a room for two full weekends, give them powerful tools, dangle a valuable prize, and ask them to come up with an idea for an industrial IoT product? This was an experiment masterminded by my dear friend from college days, Tahir Hussain, who heads a tech accelerator – Collide Village in the Dallas metroplex. And, it was executed just recently.
On a fall afternoon last year, Tahir told me about his hackathon idea and asked me to provide mentorship as well as to sponsor Zenseio IoT hardware for the event. He was lining up the leading IoT companies as partners and successful local businessmen/entrepreneurs as mentors. It sounded like an interesting idea, so I jumped on it without hesitation. More info
Researchers just published a startling discovery we’d never want to read about. It turns out that 100 Million Volkswagen vehicles sold since 1995 can be relatively easily hacked to open doors wirelessly without having the key.
It turns out 100 million vehicles used only a handful of private shared keys. Once a single private key is breached, millions of vehicles are compromised. The way cryptography based on Pre-Shared Key (PSK) works is that two devices (a vehicle and a key fob, in this case) share a secure private key that was programmed at a factory or at a dealership. This private cryptographic key, along with a rolling code are used for encrypted wireless transmission of authenticated commands to open/close doors.
Ever heard of the “epoch time”? I’m not talking here about history periods or geology. Epoch time is simply a standardized time and date reference used in UNIX and many other computers. It defines time, measured in seconds, starting from January 1, 1970 epoch. This is based on an arbitrary, somewhat historical epoch, but, what matters is that it is a commonly followed standard. More info