Exosite

Posts by Exosite
Solving the IoT Puzzle: Billing and Payment Management

Solving the IoT Puzzle: Billing and Payment Management

September 6, 2016 2 min read
IoT Security: With Great Power, Comes Great Responsibility

IoT Security: With Great Power, Comes Great Responsibility

September 1, 2016 1 min read
Front-End Development for your IoT Solution

Front-End Development for your IoT Solution

August 30, 2016 1 min read
Experiences as a Judge at a Hackathon in Taiwan

Experiences as a Judge at a Hackathon in Taiwan

August 25, 2016 1 min read
End-to-End IoT Security for your Solution

End-to-End IoT Security for your Solution

August 24, 2016 1 min read
Designing User Experience for an IoT Solution

Designing User Experience for an IoT Solution

August 23, 2016 1 min read
Exosite and Microchip Technology Sponsor Creative IoT Solutions at HackNTU 2016 in Taiwan

Exosite and Microchip Technology Sponsor Creative IoT Solutions at HackNTU 2016 in Taiwan

August 19, 2016 2 min read
We Helped Victor Build a Better Mouse Trap- Literally

We Helped Victor Build a Better Mouse Trap- Literally

August 18, 2016 1 min read
Understanding the Back-End Development of an IoT Solution

Understanding the Back-End Development of an IoT Solution

August 16, 2016 1 min read
Exosite to Participate in Microchip’s 2016 MASTERs Conference

Exosite to Participate in Microchip’s 2016 MASTERs Conference

August 12, 2016 2 min read
Exosite brings IoT insight to Microchip MASTERs 2016

Exosite brings IoT insight to Microchip MASTERs 2016

August 11, 2016 1 min read
IoT Security: Understanding Platform Features

IoT Security: Understanding Platform Features

August 11, 2016 1 min read
Hosting and Systems Administration of an IoT Solution: Build or Buy?

Hosting and Systems Administration of an IoT Solution: Build or Buy?

August 9, 2016 2 min read
The IoT Security Building Blocks: Data In Use

The IoT Security Building Blocks: Data In Use

August 4, 2016 1 min read
Understand Edge-Device Ecosystems in the IoT Puzzle: Build or Buy?

Understand Edge-Device Ecosystems in the IoT Puzzle: Build or Buy?

August 2, 2016 1 min read

Exosite

Exosite:

September 6, 2016

Developing a scalable, secure, and functioning IoT solution can be a long journey. After understanding what kind of connected product you would like to develop, you should generate an IoT security strategy to ensure your data cannot be stolen. Once your data is secure you should consider developing a system for IoT data analytics, since data is the true currency of IoT. What about actual currency? How are you going to charge your potential customers?

September 1, 2016

In a short period of time, the Internet of Things has transformed from a buzzword to a household term. Those that were aware of IoT’s potential early foretold the billions of IoT connected devices we would soon see. The time is now upon us and with more use cases being thought of every day, it seems impossible to escape the fact that IoT is assimilating itself into every aspect of our lives. From large connected product deployments in industrial applications to consumer goods to ease our daily lives, new connected solutions are being developed to simplify daily tasks. But with so many devices and applications being connected every day, how secure are we?

August 30, 2016

A successful IoT solution has the ability to improve the user’s life in a number of ways. Whether it’s by increasing the security of a home or the efficiency of a factory, the goal of a connected product should be to add value to the customer’s life. A complete IoT strategy does not stop there, since a complete solution must include all of the back-end features while incorporating a clean and easy to use front-end. What’s the point of a connected product if users cannot smoothly integrate it into their routines?

August 25, 2016

As I write this, I am on a plane home from judging the HackNTU event hosted at National Taiwan University in Taipei. The event included over 600 participants, judges, and sponsors from around the world. This was Asia’s largest hackathon, with developers working for 40 straight hours on high-intensity development. These projects were then judged under 5 different categories, with prizes awarded to the most creative and well-executed ideas. It was a privilege to be a guest at this well-attended, organized, and energetic event!

August 24, 2016

When thoroughly developed and implemented properly, an IoT solution allows companies to optimize new revenue streams and increase efficiency. Crafting an effective and appropriate IoT security strategy is one of the most important things an OEM must do. In addition to using the standard IoT platform security features identified in the previous blog segment of our Security in IoT Systems white paper, there are additional security aspects that should be considered:

August 23, 2016

The Internet of Things is about easing people’s lives through connectivity and efficiency, which  empowers people by linking them to data through an IoT solution.  Enabling access to this data or improving efficiency can be hindered by one key element, the user experience (UX). Whether it is a large-scale connected product fleets or an individual consumer product, the ability for end-customers to easily learn, interact, and adapt product features into their lives can make or break the sales of a connected product.

August 19, 2016

Event hosts 600 teams of makers and hackers from the US, China, Europe, Israel, and Indonesia for 40-hour developing event

August 18, 2016

Since the creation and implementation of a successful IoT solution is multifaceted, as well as fairly time consuming, Exosite strives to clarify and accelerate the process for our customers. Because of this, we have helped some of the world’s leading companies to deploy thousands of connected products, utilize their data as never before, and get to market in a fraction of the time.

August 16, 2016

A pretty final product is an obvious goal of every enterprise IoT strategy. A beautifully crafted front end of an IoT solution ensures end-users that it will add value, create ease in tasks, or increase security in their lives. Although the front-end is important, the back-end within a connected product deployment is where the real value comes into play. As a leading consumer and industrial IoT platform provider, Exosite assists it’s clients in both facets of a connected product. In this blog segment however, we will breakdown the back-end development section of our white paper, Solving The IoT Puzzle: Build or Buy?

August 12, 2016

Hands-on engineering class gives Microchip customers access to Internet of Things (IoT) experts and resources for building connected products

August 11, 2016

Since summer is drawing to a close, are you looking to wrap it up with a bang? Join Exosite in Phoenix, Arizona, from August 17th - 20th and help celebrate Microchip MASTERs 20th year anniversary. This conference has proven itself as a first-rate event for engineers.  With classes on over 100 different topics, including a class taught by Exosite’s Patrick Barrett, this conference has something for everyone’s interests.

August 11, 2016

There are many pieces to developing successful connected product deployments and with so many moving parts it can be difficult to decide where to start. Companies often jump into the Internet of Things pool with a proven and tested connected product that lacks one major feature, IoT security. As a leading consumer and industrial IoT platform provider, Exosite is invested in ensuring the security of its clients.

August 9, 2016

It is a fact that the Internet of Things is allowing companies access to more data. Although this explosion of data is affording companies to increase efficiencies and create new revenue streams, it is also true that the amount of new data can be overbearing if companies are not prepared. An overload of data could mean stretched resources that lead to new security challenges. Just as a soldier would not go to battle without being properly armed with a protective aid, companies must also arm themselves with a server that can protect and manage their data.

August 4, 2016

In the past, the process of retaining data security relied on the fortification of one’s data in motion and at rest. This changed with the introduction of IoT, as unauthorized access of highly valuable data at rest becomes an issue. Developing a strong IoT security strategy becomes essential for companies both seeking to enter the industry and those companies that have already produced a connected device.

August 2, 2016

Developing an IoT strategy has quickly become the focus for both old and new organizations representing a vast amount of industries. When developed and implemented properly, an IoT product deployment can offer numerous benefits, including improved efficiency and new revenue streams. A key advantage of an IoT solution is the value added from data captured within an edge-device ecosystem.

Subscribe to Updates