IoT Platforms for Cities: a Comparative Survey

January 1, 2019

Thousands of city governments all over the world are currently running their first Internet of Things (IoT) smart city projects. As they do so, software platforms get introduced that help manage data flows, support application development, and provide basic analytics. However, the IoT platform selection process is challenging and differs per community – that is if the selection process exists at all, with many customers of IoT solutions accepting the vertically integrated software that comes with a given vendor, putting cities at risk of vendor lock-ins. Some city governments prefer to collaborate with smaller IoT platform vendors that can provide strong support and appear sufficiently agile to customize to local requirements and ecosystems better and faster; other cities prioritise the scalability, end to end security, and usability offered by larger technology vendors. Either way, most public and many private organizations emphasize the need for an open ecosystem approach.

Spotlight

IOActive, Inc.

IOActive is the only security consultancy with a global presence and deep expertise in hardware, software, and wetware assessments. Our mission is to make certain your enterprise is more secure in an era of pervasive and emerging threats. Passion and pride through quality client work is something money simply can't buy. IOActive has spent more than a decade searching for the required blend of characteristics and work ethic that comprise a world-class, international security services team. We are firmly committed to staying on the competitive edge and offering unrelenting value; it's something our customers have come to rely on over the years and can depend on in the future. In fact, IOActive is the only firm in our industry that offers a 100% service satisfaction guarantee.

OTHER WHITEPAPERS
news image

Achieving pervasive security above and below the OS

whitePaper | October 11, 2022

Keeping business data secure is a challenging task, complicated by the proliferation of endpoints operating outside of the organizational network and the constant evolution of threat vectors

Read More
news image

How to process data securely on third-party infrastructure

whitePaper | December 14, 2022

Confidential computing is a technology that shields computer workloads from their environments and keeps data encrypted even during processing. The vast and previously unsolved problem that confidential computing addresses is the following: How to process data on a computer that is potentially compromised? This computer could be operated by yourself, your company, or a third party like a cloud provider.

Read More
news image

Networking for the unforeseeable future

whitePaper | February 23, 2022

When it was introduced, MPLS was an ideal option for organizations that ran multiple business-critical applications at multiple locations. Operated and managed by a single carrier, MPLS converges voice and data traffic over connections that are isolated from the public Internet, while offering rudimentary control over applications.

Read More
news image

Data Infrastructure and Analytics Software

whitePaper | September 28, 2022

Houlihan Lokey is a preeminent advisor in data infrastructure and analytics software, with deep knowledge in the field and extensive experience advising on M&A and capital-raising transactions.

Read More
news image

ScaleN: Elastic Infrastructure

whitePaper | September 19, 2022

Emerging data center models are based on flexibility and non-disruptive, on-demand scalability. Infrastructure must not only support these capabilities, but be able itself to provide these same benefits and capabilities. F5 ScaleN is a breakthrough in high availability and scalability, offering the robust capabilities required to enable multi-tenant solutions, elastic applications, and infrastructure for any environment.

Read More
news image

CORD Physical Infrastructure Deployments: Designs, Considerations, and best practices

whitePaper | December 3, 2022

Panduit and Prysmian Group have collaborated to clarify how to effectively deploy physical infrastructure for Central Office Re-architected as a Data Center (CORD). Both companies bring expertise in the enterprise, data center, and Telco marketplaces to contribute to the development of the CORD initiative. This paper is the second of a three paper series on CORD deployments

Read More

Spotlight

IOActive, Inc.

IOActive is the only security consultancy with a global presence and deep expertise in hardware, software, and wetware assessments. Our mission is to make certain your enterprise is more secure in an era of pervasive and emerging threats. Passion and pride through quality client work is something money simply can't buy. IOActive has spent more than a decade searching for the required blend of characteristics and work ethic that comprise a world-class, international security services team. We are firmly committed to staying on the competitive edge and offering unrelenting value; it's something our customers have come to rely on over the years and can depend on in the future. In fact, IOActive is the only firm in our industry that offers a 100% service satisfaction guarantee.

Events