Our WLan is secured with WEP2 protocol because it is much harder to break due to the 128-bit key it uses, even with this protocol we had a security breach after one of our workers gave the key to one of his friends. Now we are working on a system that would allow the information to be instantly available anywhere across the enterprise, the company we are working with also have great BPM systems that are worth trying.
What are the engineering and design challenges in creating successful IoT devices? These devices are usually small, resource-constrained electronics designed to sense, collect, send, and/or interpret data. Some of the devices need to be smart enough to act upon data in real time, 24/7. Specifically the guests will discuss sensors, security, and lessons from IoT deployments.