IoT Opens a Pandora’s Box of Cyber-Attacks

Submitted by Kishore Jethanandani via The Mobility Hub   M2M devices had an isolated existence in industrial plants, utilities, hospitals, transportation, and smart buildings. Security from cyber-attacks was not a concern. As M2M devices are increasingly exposed to the larger world of the Internet with application programming interfaces, their ubiquity is haunting the IT world with the…

The Internet of Things business Index

The Economist Intelligence Unit recently published this report that provides an excellent synopsis of our industry. Report Summary The Internet of Things business index: A quiet revolution gathers pace is an Economist Intelligence Unit report, sponsored by ARM. It is intended to gauge the current and future use of the Internet of Things by the global…

Ei3 protects Machines & Devices

Recently the Shodan database has been getting a lot of press.  On April 9, 2013, CNN Money called it “The scariest search engine on the Internet”. In this interview the founder of the Shodan database, John Matherly, highlights the importance of following security best practices when connecting equipment and devices to the internet.  See TV…

Remote Monitoring

Web Service connects the Enterprise to Ei3

Ei3 provides developers and IT professionals with web 3.0 tools to access data from its Remote Monitoring Cloud   MONTVALE, N.J., Nov. 27, 2012 /PRNewswire-iReach/ — Ei3 Corporation announced that a fully featured Web Service is available allowing customers to use their plant floor equipment data in a wide range of computing applications. This Web Service builds…