AI and Facial Recognition Improve Hospital Service and Security
Neonpass from startup Hoobox Robotics provides check-in services and access control, uses AI to predict where to allocate resources, and streamlines patient care.
- Author: Becca Freed
- August 4, 2022
- Vertical: Health
Guardians of the Infrastructure: Protecting OT from Cyber Attacks
Cyberattacks are becoming more common, and the impacts are too great to ignore. Industrial cybersecurity—from asset discovery to vulnerability mitigation—should be a fundamental component of network planning in all mission-critical environments.
- Author: Susan Biagi
- February 25, 2022
- Vertical: Industrial-manufacturing
Lobby Kiosks Provide Efficient Visitor Registration and Contactless Safety
A virtual visitor and lobby management system can help cut down on the risk of COVID-19 transmission. These multiuse platforms provide organizations with a smart and efficient way to welcome and register visitors, plus easily gather visitor data for reporting.
- Author: Peggy Bresnick
- February 25, 2021
- Vertical: Retail
Universities Implement Touchless Technology for Student Dining
Fueled by the COVID-19 pandemic, contactless dining and payment options at universities are on the rise, especially in high-traffic areas. Smartphone apps and biometric readers give students easy and safe dining hall access.
- Author: Susan Biagi
- February 10, 2021
- Vertical: Education
BrightSites Networked Poles Use IoT to Create Safer, Smarter Cities
Signify’s award-winning BrightSites smart poles transform the standard light pole into a smart network hub. With an array of integrated IoT technologies, real-time data monitoring, and energy-efficient innovations, cities can monitor critical environmental health and safety information to improve the lives of their citizens and gain an easy pathway to 5G infrastructure.
- Author: Susan Biagi
- June 2, 2020
- Vertical: Smart City
Securing IoT in the Smart Grid
As IoT and cloud technologies become more prevalent, security management for the utility industry is shifting toward finding an end-to-end approach for both IT and operations technology (OT).
- Author: Patricia Schnaidt
- May 4, 2017
- Vertical: Energy
IoT Security Requirements for OT
Distributed Denial of Service (DDoS) attacks that take down well-known websites are alarming wake up calls for organizations with limited security. Many of these attacks take advantage of vulnerabilities in home-connected IoT devices.
- Author: Patricia Schnaidt
- October 24, 2016
- Vertical: Security-safety
Find Intel® IoT Market Ready Solutions
Search the Intel® IoT partner ecosystem and discover 130+ end-to-end IoT solutions.
Become a Member of the Intel® Partner Alliance
If you are delivering repeatable and scalable IoT offerings using Intel technology, the Intel® Partner Alliance program gives you more opportunities to build your business. Get started.