CAP Anomaly Spotter for Security and Much More
Fog computing is a clever word play for computing that happens closer to IoT devices themselves than traditional cloud computing. Adding fog or edge computing to IoT device cluster makes a lot of sense in some applications as it allows to the individual sensors and devices to remain simple and low power while still providing on premises computational capacity. You would not want your self driving car to stop working just because it lost connectivity to the cloud computing node, would you? How about traffic lights?
In a previous post we discussed how mobile network operators can provide AI based IoT security services. Now it is time to look how fog computing can benefit from AI.Read more..
CAP Data Technologies teamed up with researchers from University of Jyväskylä to automatically process medieval magic texts. The goal of the project was to identify similarities between documents, namely alchemical instructions from old books written in the Latin language.
The texts were prepared by Lauri Ockenström, researcher at the Department of Music, Art and Culture Studies. His research interests include imagery of magic and astrology, renaissance magic, hermetic tradition and history of occultism.Read more..
Internet of things phenomenon has brought countless new connecting devices to mobile networks and the trend will most likely continue in the future. The fact that IoT devices are often designed to have low computational capacity to achieve as small power consumption as possible, combined with poor design choices in many of the early IoT devices, has lead to IoT having a bad reputation on the security front.
In this post we will explore what is the current state of IoT security and how mobile network operators can help IoT devices to achieve security while maintaining desirable power consumption.Read more..