Categories
Articles Internet of Things

Embedded Wireless Devices IoT Security Vulnerabilities

Embedded Wireless devicesonce thought to be too small to include their own security, undergo a more thorough analysis beginning with firmware testing. The software inside the chip is just as important as the application controlling it. Both need to be tested for security and quality. Some of the early IoT botnets have leveraged vulnerabilities and features within the device itself.

Embedded wireless devices really are one of the most common devices on the Internet, and the security of these devices is terrible.” Those were the words of network security expert H.D. Moore, the developer of the penetration testing software Metasploit Framework, when discussing an illicit attempt to survey the entire internet.

Consumer Based Embedded Wireless Devices

 

Dan Goodin of Ars Technica tells the tale of a guerrilla researcher who collected nine terabytes of data from a scan of 420 million IPv4 addresses across the world. “The vast majority of all unprotected devices are consumer routers or set-top boxes which can be found in groups of thousands of devices,” wrote the anonymous researcher in his 5,000-word report. “A lot of devices and services we have seen during our research should never be connected to the public Internet at all.”

embedded-wireless-and-IoT-devicesHackers can do a lot of damage, and with billions of IoT devices forecast to be connected in the next few years, embedded devices security should be more than an afterthought.

In 2015, two white hat hackers demonstrated that they could break into late model Chrysler vehicles through the installed UConnect, an internet-connected feature that controls navigation, entertainment, phone service, and Wi-Fi.

By rewriting firmware on a chip in an electronic control unit (ECU) of a Jeep Cherokee, they were able to use the vehicle’s controller area network (CAN) to remotely play with the radio, windshield wipers, and air conditioning — even kill the engine.

The cybersecurity risks are real.  Alan Grau writes on the IEEE Spectrum website about three significant incidents affecting the health care industry. A report by TrapX Labs called “Anatomy of an Attack–Medical Device Hijack (MEDJACK)” describes how hackers were able to target medical devices to gain entry to hospital networks and transmit captured data to locations in Europe and Asia. “Stopping these attacks will require a change of mindset by everyone involved in using and developing medical devices,” says Grau.

Another notorious embedded wireless devices security intrusion is described in an article on The Verge, “Somebody’s watching: how a simple exploit lets strangers tap into private security cameras” . Strangers were able to watch live streams of unwitting security camera owners within their homes. The vulnerabilities of existing firmware allowed for egregious invasion of privacy.

Embedded Wireless Devices and IoT Vulnerabilities

 

Many of the hackable embedded wireless devices now on the market were created without much consideration for security. “Security needs to be architected from the beginning and cannot be made an option,” says Mike Muller, CTO of ARM Semiconductors, at a seminar he gave at the IoT Security Summit 2015.  Muller believes that very few developers have any real understanding of security. ·“We cannot take all of the software community and turn them into security experts.  It’s not going to work.” The answer is that best practices for embedded security must be established and followed. That includes splitting memory into “private critical and private uncritical” and creating device-specific encryption keys. “You have to build systems on the assumption that you’re going to get hacked,” warns Muller.

 

Identifying potential IoT vulnerabilities requires robust testing before putting devices into production. In 2014, the Open Web Application Security Project (OWASP) published a list called Internet of Things Top Ten:  A Complete IoT Review. They recommend testing your IoT device for:  

  1. Insecure Web Interface (OWASP I1)
  2. Poor Authentication/Authorization (OWASP I2)
  3. Insecure Network Services (OWASP I3)
  4. Lack of Transport Encryption (OWASP I4)
  5. Privacy Concerns (OWASP I5)
  6. Insecure Cloud Interface (OWASP I6)
  7. Insufficient Security Configurability (OWASP I8)
  8. Insecure Software/Firmware (OWASP I9)
  9. Poor Physical Security (OWASP I10)

 

As with any testing, well-written test cases will help manufacturers ensure the security of embedded wireless devices. Better to run through possible scenarios in the lab that to have major issues with customers later.   In November 2016, Dan Goodin of Ars Technica reported that a “New, more-powerful IoT botnet infects 3,500 devices in 5 days”. Goodin writes that “Linux/IRCTelnet is likely only the beginning of what could be a long line of next-generation malware that steadily improves its capabilities.” And he laments the defenselessness of IoT devices that proliferate across the web. It’s a sentiment that’s shared by many.

What about your experiences with IoT security and embedded wireless devices? Any stories to tell? What are your recommendations for making things safer? Feel free to post your comments here.

 

Categories
Articles Artificial Intelligence Internet of Things Wireless Ecosystems

Smart Objects: Blending Ai into the Internet of Things

It’s been more than a decade since the time when the number of internet-connected devices exceeded the number of people on the planet. This milestone signaled the emergence and rise of the Internet of Things (IoT) paradigm, smart objects, which empowered a whole new range of applications that leverage data and services from the billions of connected devices.  Nowadays IoT applications are disrupting entire sectors in both consumer and industrial settings, including manufacturing, energy, healthcare, transport, public infrastructures and smart cities.

Evolution of IoT Deployments

 

During this past decade IoT applications have evolved in terms of size, scale and sophistication. Early IoT deployments involved the deployment of tens or hundreds of sensors, wireless sensor networks and RFID (Radio Frequency Identification) systems in small to medium scale deployments within an organization. Moreover, they were mostly focused on data collection and processing with quite limited intelligence. Typical examples include early building management systems that used sensors to optimize resource usage, as well as traceability applications in RFID-enabled supply chains.

Over the years, these deployments have given their place to scalable and more dynamic IoT systems involving many thousands of IoT devices of different types known as smart objects.  One of the main characteristic of state-of-the-art systems is their integration with cloud computing infrastructures, which allows IoT applications to take advantage of the capacity and quality of service of the cloud. Furthermore, state of the art systems tends to be more intelligent, as they can automatically identify and learn the status of their surrounding environment to adapt their behavior accordingly. For example, modern smart building applications are able to automatically learn and anticipate resource usage patterns, which makes them more efficient than conventional building management systems.

Overall, we can distinguish the following two phases of IoT development:

  • Phase 1 (2005-2010) – Monolithic IoT systems: This phase entailed the development and deployment of systems with limited scalability, which used some sort of IoT middleware (e.g., TinyOS, MQTT) to coordinate some tens or hundreds of sensors and IoT devices.
  • Phase 2 (2011-2016) – Cloud-based IoT systems: This period is characterized by the integration and convergence between IoT and cloud computing, which enabled the delivery of IoT applications based on utility-based models such as Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). During this phase major IT vendors such as Amazon, Microsoft and IBM have established their own IoT platforms and ecosystems based on their legacy cloud computing infrastructures. The latter have alleviated the scalability limitations of earlier IoT deployments, which provided opportunities for cost-effective deployments. At the same time the wave of Big Data technologies have opened new horizons in the ability of IoT applications to implement data-driven intelligence functionalities.

 

AI: The Dawn of Smart Objects using IoT applications

 

 

Despite their scalability and intelligence, most IoT deployments tend to be passive with only limited interactions with the physical world. This is a serious set-back to realizing the multi-trillion value potential of IoT in the next decade, as a great deal of IoT’s business value is expected to stem from real-time actuation and control functionalities that will intelligently change the status of the physical world.

Smart-Objects-blending-Ai-into-IoTIn order to enable these functionalities we are recently witnessing the rise and proliferation of IoT applications that take advantage of Artificial Intelligence and Smart Objects.  Smart objects are characterized by their ability to execute application logic in a semi-autonomous fashion that is decoupled from the centralized cloud.

In this way, they are able to reason over their surrounding environments and take optimal decisions that are not necessarily subject to central control. Therefore, smart objects can act without the need of being always connected to the cloud. However, they can conveniently connect to the cloud when needed, in order to exchange information with other passive objects, including information about their state / status of the surrounding environment.

Prominent examples of smart objects follow:

  • Socially assistive robots, which provide coaching or assistance to special user groups such as elderly with motor problems and children with disabilities.
  • Industrial robots, which complete laborious tasks (e.g., picking and packing) in warehouses, manufacturing shop floors and energy plants.
  • Smart machines, which predict and anticipate their own failure modes, while at the same time scheduling autonomously relevant maintenance and repair actions (e.g., ordering of spare parts, scheduling technicians visits).
  • Connected vehicles, which collect and exchange information about their driving context with other vehicles, pedestrians and the road infrastructure, as a means of optimizing routes and increasing safety.
  • Self-driving cars, which will drive autonomously with superior efficiency and safety, without any human intervention.
  • Smart pumps, which operate autonomously in order to identify and prevent leakages in the water management infrastructure.

The integration of smart objects within conventional IoT/cloud systems signals a new era for IoT applications, which will be endowed with a host of functionalities that are hardly possible nowadays. AI is one of the main drivers of this new IoT deployment paradigm, as it provides the means for understanding and reasoning over the context of smart objects. While AI functionalities have been around for decades with various forms (e.g., expert systems and fuzzy logic systems), AI systems have not been suitable for supporting smart objects that could act autonomously in open and dynamic environments such as industrial plants and transportation infrastructures.

This is bound to change because of recent advances in AI based on the use of deep learning that employs advanced neural networks and provides human-like reasoning functionalities. During the last couple of years we have witnessed the first tangible demonstrations of such AI capabilities applied in real-life problems. For example, last year, Google’s Alpha AI engine managed to win a Chinese grand-master in the Go game. This signaled a major milestone in AI, as human-like reasoning was used instead of an exhaustive analysis of all possible moves, as was the norm in earlier AI systems in similar settings (e.g., IBM’s Deep Blue computer that beat chess world champion Garry Kasparov back in 1997).

Implications of AI and IoT Convergence for Smart Objects

 

This convergence of IoT and AI signals a paradigm shift in the way IoT applications are developed, deployed and operated. The main implications of this convergence are:

  • Changes in IoT architectures: Smart objects operate autonomously and are not subject to the control of a centralized cloud. This requires revisions to the conventional cloud architectures, which should become able to connect to smart objects in an ad hoc fashion towards exchanging state and knowledge about their status and the status of the physical environment.
  • Expanded use of Edge Computing: Edge computing is already deployed as a means of enabling operations very close to the field, such as fast data processing and real-time control. Smart objects are also likely to connect to the very edge of an IoT deployment, which will lead to an expanded use of the edge computing paradigm.
  • Killer Applications: AI will enable a whole range of new IoT applications, including some “killer” applications like autonomous driving and predictive maintenance of machines. It will also revolutionize and disrupt existing IoT applications. As a prominent example, the introduction of smart appliances (e.g., washing machines that maintain themselves and order their detergent) in residential environments holds the promise to disrupt the smart home market.
  • Security and Privacy Challenges: Smart objects increase the volatility, dynamism and complexity of IoT environments, which will lead to new cyber-security challenges. Furthermore, they will enable new ways for compromising citizens’ privacy. Therefore, new ideas for safeguarding security and privacy in this emerging landscape will be needed.
  • New Standards and Regulations: A new regulatory environment will be needed, given that smart objects might be able to change the status of the physical environment leading to potential damage, losses and liabilities that do not exist nowadays. Likewise, new standards in areas such as safety, security and interoperability will be required.
  • Market Opportunities: AI and smart objects will offer unprecedented opportunities for new innovative applications and revenue streams. These will not be limited to giant vendors and service providers, but will extend to innovators and SMBs (Small Medium Businesses).

Future Outlook

 

AI is the cornerstone of next generation IoT applications, which will exhibit autonomous behavior and will be subject to decentralized control. These applications will be driven by advances in deep learning and neural networks, which will endow IoT systems with capabilities far beyond conventional data mining and IoT analytics. These trends will be propelled by several other technological advances, including Cyber-Physical Systems (CPS) and blockchain technologies. CPS systems represent a major class of smart objects, which will be increasingly used in industrial environments.

They are the foundation of the fourth industrial revolution through bridging physical processes with digital systems that control and manage industrial processes. Currently CPS systems feature limited intelligence, which is to be enhanced based on the advent and evolution of deep learning. On the other hand, blockchain technology (inspired by the popular Bitcoin cryptocurrency) can provide the means for managing interactions between smart objects, IoT platforms and other IT systems at scale. Blockchains can enable the establishment, auditing and execution of smart contracts between objects and IoT platforms, as a means of controlling the semi-autonomous behavior of the smart object.

This will be a preferred approach to managing smart objects, given that the latter belong to different administrative entities and should be able to interact directly in a scalable fashion, without a need to authenticating themselves against a trusted entity such as a centralized cloud platform.

In terms of possible applications the sky is the limit. AI will enable innovative IoT applications that will boost automation and productivity, while eliminating error prone processes.  Are you getting ready for the era of AI in IoT?

 

Categories
Articles Internet of Things

Industrial IoT Predictive Maintenance – a Killer Application

Industrial IoT predictive maintenance is expected to generate the large scope of B2B transactions that require data analysis.  Indeed, IIoT is on such a growth pattern many of the billions of connected things in the coming years will be industrial assets, which will be deployed in settings like factories, agricultural, oil refineries and energy plants.

According to McKinsey the Industrial Internet has the potential to deliver up to $11.1 trillion on an annual basis by 2025 and 70% of this is likely to concern industrial and business-to-business solutions i.e. the Industrial IoT is expected to be worth more than twice the value of the consumer internet.

NextGen Global Executive Search

The Industrial IoT is at the heart of the fourth industrial revolution (Industry 4.0), which is driven by the interconnection of all industrial assets and the ability to collect and analyze data from them. In the scope of the Industrial IoT, assets are cyber-physical systems, which enable the control of physical devices through their cyber representations and the processing of digital data about them.

The applications of cyber-physical systems span a very broad range, including production control, process optimization, asset management, integration of new technologies (such as 3D printing & additive manufacturing), as well as various industrial automation tasks. Nevertheless, the most prominent application is the ability to continually monitor, predict and anticipate the status of assets, with emphasis on industrial IoT predictive maintenance using predictions about when a piece of equipment should be maintained or repaired.

Industrial IoT Predictive Maintenance Key to Industry 4.0

 

Maintenance and Repair Operations (MROs) are at the heart of industrial operations, as they involve repairing mechanical, electrical, plumbing, or other devices as a means of ensuring the continuity of operations. Nowadays, the majority of MRO operations are carried out on the basis of a preventive maintenance paradigm, which aims at replacing components, parts or other pieces of equipment, prior to their damage that could catastrophic consequences such as low production quality and cease of operations for a considerable amount of time. However, in most cases preventive maintenance fails to lead to the best usage of equipment (i.e. optimal Operating Equipment Efficiency (OEE)), as it maintenance is typically scheduled earlier than actually required.

In industrial IoT predictive maintenance (PdM) alleviates the limitations of preventive approaches. PdM is based on predictions about the future state of assets, with particular emphasis on anticipating the time when an asset will fail in order to appropriately schedule its maintenance.

PdM is empowered by models that estimate when the cost of maintenance becomes (statistically) lower that the cost that is associated with the risk of equipment failure.

Based on an optimal scheduling of maintenance, PdM leads to improved OEE, enhanced employee productivity, increased production quality, reduced equipment downtime, as well as a safer environment where failures are anticipated and repairs proactively planned. McKinsey & Co. estimates that the economic savings of predictive maintenance could total from $240 to $630 billion in 2025.

Nevertheless, there are still many industries that dispose with preventive maintenance, since they have no easy way to integrate and analyze data sets from thousands of heterogeneous sensors that are typically available in their plant floors. As a result only a fraction (i.e. 1% according to McKinsey & Co) of the available data is used, which is a serious setback to unlocking the potential of predictive maintenance applications, such as maintenance as a service, on-line calculation of OEE risk, maintenance driven production schedules and more.

The advent of Industrial IoT predictive maintenance is gradually unlocking the potential of PdM technologies facilitate the collection and integration of data from thousands of different sensors, while at the same time providing the means for unifying the semantics of the diverse data sets. Furthermore, IoT analytics technologies (notably predictive analytics) facilitate the processing of IoT data streams with very high ingestion rates based on machine learning and statistical processing techniques that can predict the future condition of components and equipment.

In several cases, IoT data are processed by Artificial Intelligence based techniques such as deep learning, in order to identify hidden patterns about the degradation of assets. Deep learning techniques are capable of leveraging (multimedia) data from multiple maintenance modalities such as vibration sensing, oil analysis, thermal imaging, acoustic sensors and more. Moreover, advanced deployments of industrial IoT predictive maintenance are not limited to deriving predictions about the future state of assets. Rather, they are able to close the loop down to the plant floor, through for example changing configurations in production schedules, altering the operational rates of machines or even driving automation functions.

Rise of Industrial IoT Predictive Maintenance Products and Services

 

PdM is looming as one of the killer applications for the Industrial IoT, which is evident not only on its potential savings but also on the rise of relevant IoT-based products and services. Most vendors have been recently releasing IoT-based solutions for PdM. In addition to empowering data collection and analytics, vendors are striving to enhance their products with added-value functionalities that help them stand out in the market. For example:

  • IBM predictive maintenance solution is able to perform root cause analysis in a holistic way, including predictions about where, when and why asset failures occur.
  • Software AG’s solution for industrial IoT predictive maintenance integrates with ERP and human resources systems to automatically plan the optimal allocation of tasks to technicians.
  • SAP integrates predictive maintenance information with business information (e.g., CRM and ERP systems) and enterprise asset management (EAM) systems. To this end, it benefits from its strong presence and installed base in the ERP market.
  • Microsoft offers PdM solutions over its Azure IoT suite in a way that offers preconfigured solutions (templates) for monitoring assets and analyzing their usage in real-time.

Recently, the DataRPM platform has been also established by a consortium of different vendors and manufacturers. DataPRM claims ability to deliver Cognitive Predictive Maintenance (CPdM) for Industrial IoT, based on the use of Artificial Intelligence for automating predictions of asset failures and closing the loop to ERP, CRM, and other business information systems.

Other major players in industrial engineering and automation, such as SIEMENS and BOSCH are offering their own platforms, while all major IT consulting enterprises have relevant services in their portfolio. Nevertheless, it is indicative of the market momentum of PdM and its positioning as one of the most prominent applications in the growing Industrial IoT predictive maintenance market.

Categories
Articles Blockchains & Cryptocurrency Internet of Things

Blockchain Technology Securing IoT Infrastructure

The growth of the Internet-of-Things (IoT) paradigm begs the question if blockchain technology securing IoT infrastructure properly or not?  Currently propelled by an unprecedented increase in the number of internet-connected devices. Even though the Cisco’s 2011 projection about 50 billion devices in 2020 is not ending up being very accurate, more recent estimates by Gartner and IHS confirm the tremendous growth of the number of IoT devices.

Blockchain Technology Securing IoT infrastructure

 

 

The need to support billions of devices in the years to come is inevitably pushing IoT technologies to their limits. Despite significant progress in blockchain technology, the specification and implementation of IoT technologies for identification, discovery, data exchange, analytics and security, the future scale of IoT infrastructure and services is creating new challenges and ask for new paradigms.

As a prominent example, IoT security is usually based on centralized models, which are centered round dedicated clusters or clouds that undertake to provide authentication, authorization and encryption services for IoT transactions. Such centralized models are nowadays providing satisfactory protection against adversaries and security threats.

Nevertheless, their scalability towards handling millions of IoT nodes and billions of transactions between them can be questioned, given also recent IoT-related security attacks which have manifested the vulnerabilities of existing infrastructures and illustrated the scale of the potential damage.

In particular, back in October 2016, a large scale Distributed Denial of Service (DDoS) attack took place, which affected prominent Internet sites such as Twitter, Amazon, Spotify, Netflix and Reddit. The attack exploited vulnerabilities in IoT devices in order to target the infrastructures of dyn.com, a global infrastructure and operations provider, which serves major Internet Sites.

The incident is indicative of the need for new IoT security paradigms, which are less susceptible to attacks by distributed devices and more resilient in terms of the authentication and authorization of devices. In quest for novel, decentralized security paradigms, the IoT community is increasingly paying attention to blockchain technology, which provides an infinitely scalable distributed ledger for logging peer to peer transactions between distrusted computing nodes and devices.

Most of the people that are aware of the paradigm to blockchain technology securing IoT perceive it as the main building block underpinning cryptocurrencies such as the well-known BitCoin. Indeed, the main characteristic of Bitcoin transactions is that they are not authenticated by a Trusted Third Party (TTP), as is the case with conventional banking transactions.

In the case of the BitCoin, there is no central entity keeping track of the ledger of interactions between the different parties as a means of ensuring the validity of the transactions between them. Instead, any transaction occurring between two parties (e.g., A paying 1 Bitcoin to B) is kept in a distributed ledger, which is maintained by all participants of the BitCoin network and which is empowered by blockchain technology. Among the merits of this distributed ledger approach is that it is very scalable and more robust when compared to traditional centralized infrastructure.

This is due to the fact that the validation of transactions is computationally distributed across multiple nodes, as well as due to the fact that the validation requires the consensus (“majority vote”) of the whole network of communicating parties, instead of relying on a centralized entity. In this way, it is practically impossible for an adversary to attack the network, since this would require attacking the majority of nodes instead of one or a few parties.

Can-blockchain-technology-secure-IoT-data-and-devices

The scalability and resilience properties of the blockchain approach have given rise to its applications in other areas such as electronic voting or IoT transactions. The principle remains the same:

Transactions are logged in the distributed ledger and validated based on the majority of nodes, even though in the case of voting and other transactions Bitcoin units are replaced by votes or credits.

This results in a trustful and resilient infrastructure, which does not have a single point of failure.

Based on the above principle, blockchain is deployed as an element of IoT infrastructures and services, which signifies a shift from a centralized brokerage model, to a fully distributed mesh network that ensures security, reliability and trustworthiness. Blockchain technology securing IoT infrastructure facilitates devices to authenticate themselves as part of their peer-to-peer interactions, while at the same time increasing the resilience of their interactions against malicious adversaries. Moreover, this can be done in a scalable way, which scales up to the billions of devices and trillions of interactions that will be happening in the coming years.

Cases IoT Blockchain Technology Securing IoT

 

 

The development of secure mesh IoT networks based on blockchain technology is no longer a theoretical concept. During the last couple of years several companies (including high-tech startups) have been using blockchain technology in order to offer novel IoT products and services. The most prominent implementations concern the area of supply chain management. For example, modum.io is applying blockchain in the pharmaceuticals supply chain, as means of ensuring drug safety.

The company’s service uses the blockchain technology in order to log all transactions of a drug’s lifecycle, starting from its manufacturing to its actual use by a health professional or patient. Recently, the retail giant Wal-Mart Stores Inc. has announced a food products track and trace pilot based on blockchain technology. The pilot will document all the steps associated with tracking and tracing of pork, from the farm where the food is grown, to the supermarket floor where it is shipped. This pilot is a first of a kind effort to validate the merits of the blockchain outside the scope of the financial services industry.

Beyond supply chain implementations, novel products are expected to emerge in the areas of connected vehicles, white appliances and more. Several of the applications are expected to benefit from blockchain’s ability to facilitate the implementation of monetization schemes for the interaction between devices. In particular, as part of blockchain implementations, sensors and other IoT devices can be granted micropayments in exchange of their data.

The concept has already been implemented by company tilepay, which enables trading of data produced by IoT devices in a secure on-line marketplace. At the same time, cloud-based infrastructures enabling developers to create novel blockchain applications are emerging. As prominent example Microsoft is providing a Blockchain-as-a-Service (BaaS) infrastructure as part of its Azure suite.

Overall, blockchain technology is a promising paradigm for securing the future IoT infrastructures. Early implementations are only scratching the surface of blockchain’s potential. We expect to see more and more innovative products in the next few years.

In this direction, several challenges need also to be addressed, such as the customization of consensus (i.e. “majority-voting”) models for IoT transactions, as well as efficient ways for carrying out the computationally intensive process of transaction verification. Solutions to these challenges will certainly boost the rapid uptake of this technology in the IoT technology landscape.

 

Categories
White Papers Internet of Things

Industrial IoT Automation Digital Wave Whitepaper

Industrial IoT automation dictates that all predictive maintenance systems hinge on the processing of data from many IoT devices, which renders predictive maintenance one of the most common applications.

Industrial IoT Automation Challenges

 

 

Industrial-IoT-Automation-whitepaper

Moreover, as predictive maintenance leads to improved OEE, reduced labor for performing the maintenance and better planning of related supply chain operations, it is increasingly considered one of the killer applications for IIoT.

IIoT reconfigurations take place at the cyber world based on digital technologies rather than at the physical world where processes are much more tedious and time consuming.

This ensures that changes in the IT configurations are properly reflected on the field.

 

 

Extensive Whitepaper on Industrial IoT Implications

This whitepaper discusses IIoT Disruption and Digital Transformation.  It defines the business cases, predictive maintenance, flexibility in Industrial IoT Automation, optimal Supply Chain operations and how to improve the quality of operations.

Moreover, we identify the simulation of complex processes, technology enablers and building blocks, as well as IIoT’s deployment challenges.  Discover the adaptation and migration of legacy systems; security, privacy, and trust, and leveraging standards in Digital Transformation.

As experts in recruiting senior executives and functional leaders for Internet of Things data and devices, LED lighting, and industrial IoT automation, in this whitepaper we also reveal the talent Gap in IIOT technologies.  The talent gap is evident in senior engineering and executive levels.  Riding the Industry Digitization Wave with IIoT:Challenges and Implications whitepaper.  Click here to view and download.

How to Evaluate an Executive Search Firm
Receive the latest news

Subscribe To Our Newsletter

Get notified about new articles, videos, seminars and all the breaking industry news as it happens