Exosite Blog

Announcements, updates, news, and more.

Solving the IoT Puzzle: Billing and Payment Management

Solving the IoT Puzzle: Billing and Payment Management

September 6, 2016 2 min read
IoT Security: With Great Power, Comes Great Responsibility

IoT Security: With Great Power, Comes Great Responsibility

September 1, 2016 1 min read
Making Exosite's Quality Assurance Better, Faster, Stronger

Making Exosite's Quality Assurance Better, Faster, Stronger

August 30, 2016 1 min read
Front-End Development for your IoT Solution

Front-End Development for your IoT Solution

August 30, 2016 1 min read
End-to-End IoT Security for your Solution

End-to-End IoT Security for your Solution

August 24, 2016 1 min read
Designing User Experience for an IoT Solution

Designing User Experience for an IoT Solution

August 23, 2016 1 min read
IoT’s Ready for G’ma and G’pa (Inside Exosite: Business Series)

IoT’s Ready for G’ma and G’pa (Inside Exosite: Business Series)

August 17, 2016 3 min read
Understanding the Back-End Development of an IoT Solution

Understanding the Back-End Development of an IoT Solution

August 16, 2016 1 min read
IoT Security: Understanding Platform Features

IoT Security: Understanding Platform Features

August 11, 2016 1 min read
Hosting and Systems Administration of an IoT Solution: Build or Buy?

Hosting and Systems Administration of an IoT Solution: Build or Buy?

August 9, 2016 2 min read
The IoT Security Building Blocks: Data In Use

The IoT Security Building Blocks: Data In Use

August 4, 2016 1 min read
Creating Transformative Moments with IoT (Inside Exosite: Leadership Series)

Creating Transformative Moments with IoT (Inside Exosite: Leadership Series)

August 3, 2016 3 min read
Understand Edge-Device Ecosystems in the IoT Puzzle: Build or Buy?

Understand Edge-Device Ecosystems in the IoT Puzzle: Build or Buy?

August 2, 2016 1 min read
An Open Platform for the Future of Connected Businesses (Inside Exosite: Business Series)

An Open Platform for the Future of Connected Businesses (Inside Exosite: Business Series)

July 28, 2016 2 min read
The IoT Security Building Blocks: Data in Motion

The IoT Security Building Blocks: Data in Motion

July 27, 2016 1 min read

Exosite Blog

News, Articles, Thoughts, Product Information

September 6, 2016

Developing a scalable, secure, and functioning IoT solution can be a long journey. After understanding what kind of connected product you would like to develop, you should generate an IoT security strategy to ensure your data cannot be stolen. Once your data is secure you should consider developing a system for IoT data analytics, since data is the true currency of IoT. What about actual currency? How are you going to charge your potential customers?

September 1, 2016

In a short period of time, the Internet of Things has transformed from a buzzword to a household term. Those that were aware of IoT’s potential early foretold the billions of IoT connected devices we would soon see. The time is now upon us and with more use cases being thought of every day, it seems impossible to escape the fact that IoT is assimilating itself into every aspect of our lives. From large connected product deployments in industrial applications to consumer goods to ease our daily lives, new connected solutions are being developed to simplify daily tasks. But with so many devices and applications being connected every day, how secure are we?

August 30, 2016

With our breakthrough Murano platform release, Exosite’s Quality Assurance team has been hard at work creating and running tests to ensure that the released code is doing exactly what is expected and more importantly, what our customers expect. QA took a more modern approach to how we verify, validate, and release Murano builds by using continuous integration (CI). CI will help make developers and testers jobs a little easier and help improve Murano's overall quality, agility, and robustness.

August 30, 2016

A successful IoT solution has the ability to improve the user’s life in a number of ways. Whether it’s by increasing the security of a home or the efficiency of a factory, the goal of a connected product should be to add value to the customer’s life. A complete IoT strategy does not stop there, since a complete solution must include all of the back-end features while incorporating a clean and easy to use front-end. What’s the point of a connected product if users cannot smoothly integrate it into their routines?

August 24, 2016

When thoroughly developed and implemented properly, an IoT solution allows companies to optimize new revenue streams and increase efficiency. Crafting an effective and appropriate IoT security strategy is one of the most important things an OEM must do. In addition to using the standard IoT platform security features identified in the previous blog segment of our Security in IoT Systems white paper, there are additional security aspects that should be considered:

August 23, 2016

The Internet of Things is about easing people’s lives through connectivity and efficiency, which  empowers people by linking them to data through an IoT solution.  Enabling access to this data or improving efficiency can be hindered by one key element, the user experience (UX). Whether it is a large-scale connected product fleets or an individual consumer product, the ability for end-customers to easily learn, interact, and adapt product features into their lives can make or break the sales of a connected product.

August 17, 2016

Well, maybe not quite, but the Internet of Things (IoT) has surpassed buzzword level for most...it has slowly developed actual meaning–but not for everyone. Probably not for your grandparents and maybe not for your boss or your boss’s boss. When the iPod first came out it was met with a chorus of, "I’ll never need that. I have a cabinet filled with perfectly good CDs!”  Like all disruptive  technologies, the iPod eventually became ubiquitous because it could bring your music anywhere. Digital music players are now integrated with our telephones which are essentially personal computers in our pockets. We, at Exosite, believe IoT has this same transformative quality and here is why.

August 16, 2016

A pretty final product is an obvious goal of every enterprise IoT strategy. A beautifully crafted front end of an IoT solution ensures end-users that it will add value, create ease in tasks, or increase security in their lives. Although the front-end is important, the back-end within a connected product deployment is where the real value comes into play. As a leading consumer and industrial IoT platform provider, Exosite assists it’s clients in both facets of a connected product. In this blog segment however, we will breakdown the back-end development section of our white paper, Solving The IoT Puzzle: Build or Buy?

August 11, 2016

There are many pieces to developing successful connected product deployments and with so many moving parts it can be difficult to decide where to start. Companies often jump into the Internet of Things pool with a proven and tested connected product that lacks one major feature, IoT security. As a leading consumer and industrial IoT platform provider, Exosite is invested in ensuring the security of its clients.

August 9, 2016

It is a fact that the Internet of Things is allowing companies access to more data. Although this explosion of data is affording companies to increase efficiencies and create new revenue streams, it is also true that the amount of new data can be overbearing if companies are not prepared. An overload of data could mean stretched resources that lead to new security challenges. Just as a soldier would not go to battle without being properly armed with a protective aid, companies must also arm themselves with a server that can protect and manage their data.

August 4, 2016

In the past, the process of retaining data security relied on the fortification of one’s data in motion and at rest. This changed with the introduction of IoT, as unauthorized access of highly valuable data at rest becomes an issue. Developing a strong IoT security strategy becomes essential for companies both seeking to enter the industry and those companies that have already produced a connected device.

August 3, 2016

I remember the first time I saw the health of my off-the-grid solar-powered battery bank from 1,500 miles away–I knew that my investment in renewable energy was intact and had the peace of mind that should something go wrong, I had the data at my fingertips to make educated decisions to rectify the situation. The Internet of Things (IoT) was transformative to my experience as a remote property owner.

August 2, 2016

Developing an IoT strategy has quickly become the focus for both old and new organizations representing a vast amount of industries. When developed and implemented properly, an IoT product deployment can offer numerous benefits, including improved efficiency and new revenue streams. A key advantage of an IoT solution is the value added from data captured within an edge-device ecosystem.

July 28, 2016

As today's manufacturers look out at the changing and unpredictable business landscape, they are faced with both enormous risk and unprecedented opportunity. Economic uncertainty and digital disruption from savvy, agile competitors are forcing both senior executives and divisional managers to contend with a new set of challenges. Every day, business leaders are seeking answers to tough questions about how they can reduce costs, create new value in their market, and build a sustainable roadmap for growth in a turbulent world.

July 27, 2016

As a global consumer and industrial IoT platform provider, Exosite is deeply involved in securing sensors, devices, networks, cloud platforms, web applications, and mobile applications for diverse industries. As explained in our previous installment of the Security in Internet of Things Systems white paper blog segment, data can be thought of in three contexts. The second context is data in motion, and will be the focus of this IoT security blog segment.

Subscribe to Updates