Sign Up

Have an account? Sign In Now

Sign In

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask question.

Forgot Password?

Need An Account, Sign Up Here
Sign InSign Up

IIEC Alumni

IIEC Alumni Logo IIEC Alumni Logo

IIEC Alumni Navigation

  • Alumni Learning
  • Get Qualified!
  • Programs
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Alumni Learning
  • Get Qualified!
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Latest Activity
  • Trends
  • Users
  • Help
  • Alumni Learning
  • Get Qualified!
  • Programs
Programs/ Questions/Q 1147
Next
In Process
Kjell Sadowski
Kjell Sadowski

Kjell Sadowski

  • 3 Questions
  • 9 Answers
  • 0 Best Answers
  • 19 Points
View Profile
  • 4
Kjell Sadowski
Industrial Internet of Things (IIoT)
Asked: April 18, 20192019-04-18T01:23:42+00:00 2019-04-18T01:23:42+00:00

Which edge devices has your company used to establish an IIoT hardware node?

  • 4

Which edge devices have you tested or implemented in order to establish a IIoT node?

companyconnecteddeviceedgehardwareiiotimplementiotnode
  • 4 4 Answers
  • 459 Views
  • 0 Followers
  • 0
Answer
Share
  • Facebook

    4 Answers

    • Voted
    • Oldest
    • Recent
    1. vajoorbi mohammad

      vajoorbi mohammad

      • ramachandrapuram, India
      • 0 Questions
      • 7 Answers
      • 0 Best Answers
      • 76 Points
      View Profile
      vajoorbi mohammad
      2020-04-17T17:29:22+00:00Added an answer on April 17, 2020 at 5:29 pm

      edge devices on their own can prove to be prone to attacks and hacks. This is something that should be kept in mind while designing security architectures.
      Together, Cloud and Edge computing architectures can store and process data more effectively.so Securing Sensor Data must be provided

      • 1
      • Reply
      • Share
        Share
        • Share on Facebook
        • Share on Twitter
        • Share on LinkedIn
        • Share on WhatsApp
    2. mohamed khamis ahmed

      mohamed khamis ahmed

      • port saied, Egypt
      • 0 Questions
      • 9 Answers
      • 0 Best Answers
      • 90 Points
      View Profile
      mohamed khamis ahmed
      2020-07-27T20:36:10+00:00Added an answer on July 27, 2020 at 8:36 pm

      Edge Computing Security

      The level of security with respect to Edge computing is generally higher since data isn’t sent to the cloud over their network. In edge computing, data is decentralized, which makes it harder for the data to be compromised.

      Since edge computing is a relatively new technology, old problems remain, including weak log-in credentials, zero-day vulnerabilities, lack of updates and a less than optimal network architecture.

      • 0
      • Reply
      • Share
        Share
        • Share on Facebook
        • Share on Twitter
        • Share on LinkedIn
        • Share on WhatsApp
    3. mohamed khamis ahmed

      mohamed khamis ahmed

      • port saied, Egypt
      • 0 Questions
      • 9 Answers
      • 0 Best Answers
      • 90 Points
      View Profile
      mohamed khamis ahmed
      2020-07-27T20:34:06+00:00Added an answer on July 27, 2020 at 8:34 pm

      Situated at the “edge” of an IIoT network near a number of sensors, machines and other data sources, the gateway serves as a medium that bridges connected devices on the local network and the data center on the remote cloud server. All data moving to the cloud or to another network must first go through and communicate with the gateway. IIoT gateways perform the following critical tasks:

      • 0
      • Reply
      • Share
        Share
        • Share on Facebook
        • Share on Twitter
        • Share on LinkedIn
        • Share on WhatsApp
    4. vajoorbi mohammad

      vajoorbi mohammad

      • ramachandrapuram, India
      • 0 Questions
      • 7 Answers
      • 0 Best Answers
      • 76 Points
      View Profile
      vajoorbi mohammad
      2020-04-17T17:51:04+00:00Added an answer on April 17, 2020 at 5:51 pm

      edge devices on their own can prove to be prone to attacks and hacks. This is something that should be kept in mind while designing security architectures.
      Together, Cloud and Edge computing architectures can store and process data more effectively.Securing Sensor Data must be provided.

      • 0
      • Reply
      • Share
        Share
        • Share on Facebook
        • Share on Twitter
        • Share on LinkedIn
        • Share on WhatsApp

    Leave an answer
    Cancel reply

    You must login to add an answer.

    Forgot Password?

    Sidebar

    Related Questions

    • syahira

      Is there any limitation of sensor/hardware use in oder to ...

      • 0 Answers
    • Nurmaisarah

      what is the different between industry 4.0 and (IIOT)?

      • 0 Answers
    • Nurmaisarah

      what is different between industry 4.0 and internet of thing?

      • 0 Answers
    • nurjannah

      in your opinion, what are the suitable IIOT for the ...

      • 0 Answers
    • raghubabuvarada

      drawback

      • 0 Answers
    • Angel Berniz

      How is business IoT (IIoT) exclusive from the internet of things (IoT)?

      • 5 Answers
    • Gajanan Shirnewar

      Which MCU Platform supports the best way to implement IIoT?

      • 4 Answers
    • Angel Berniz

      How does Industrial Internet of Things (IIoT) work?

      • 1 Answer
    • Angel Berniz

      What is Industrial Internet of Things (IIoT)?

      • 4 Answers
    Ask A Question

    Stats

    • Questions 38k
    • Answers 2k
    • Best Answers 10
    • Users 64k

    Recent posts

    • Active Learning • The Definitive Guide
      • On: February 14, 2019
      • Comment: 1

      Active Learning • The Definitive Guide

    • How Can Businesses Track Employee Digital Skills?
      • On: February 3, 2019
      • Comments: 6

      How Can Businesses Track Employee Digital Skills?

    Explore Our Blog

    Trending Topics

    academic ai anxiety therapist in palm beach blockchain business cara meng­gu­gur­kan kan­dun­gan fleet gps tracking solutions gps tracking for trucks gps tracking devices gps tracking solutions health iiot industry4.0 industry 4.0 iot leon288 mental health therapist in palm beach ml obat penggugur kandungan robotics therapist in palm beach gardens

    Explore

    • Alumni Learning
    • Get Qualified!
    • Questions
      • New Questions
      • Trending Questions
      • Must read Questions
      • Hot Questions
    • Polls
    • Latest Activity
    • Trends
    • Users
    • Help

    Footer

    IIEC Alumni

    Alumni | IIEC Business School

    Alumni is the #1 Active Learning Platform (ALP) for Qualification in Future Skills, which help you improve your knowledge, connect with other people, and earn certifications. Learning, Sharing, Growing, all in one place.

    About Us

    • Meet The Team
    • Blog
    • About Us
    • Contact Us

    legal Stuff

    • Terms of Use
    • Privacy Policy
    • Cookie Policy

    Help

    • Knowledge Base
    • Support

    Social Media

    © 2021 Discy. All Rights Reserved
    With Love by 2code.