Expert Insights

blog

Modern Applications



Leveraging Facial Recognition in your systems

Security is an important aspect of our lives and we use various means of security every day. At the end of the day, trust is what allows someone or a network system to allows for access. Imagine that you are a newborn baby. The first few things you learn to trust is the sound of your mother. ... just like infants, the computers can be taught to trust the good identifiable features from bad ones by reinforced training. Let's see how that is accomplished.

Lwin Maung by Lwin Maung

The Internet of Things is just getting started

The Internet of Things (IoT) is just getting started. Honestly though, if you think about it, IoT has always been here. In the beginning, we had the internet. Traditionally, the internet’s purpose was to allow devices to serve content from the internet. Now with IoT, we simply alter the paradigm and consider that the device is sending sensor data to the internet. In other words, we have always had the ability to do IoT, but what has changed is the notion around how devices and device data can be used.

Eric Franz by Eric Franz

Using IoT on a Beer Kegerator

Being born and raised in the great state of Wisconsin, beer has been a part of most of my adult life. Couple that with my love of technology, I always wondered how I could leverage some cool tech with a beer theme. Since the proliferation of inexpensive hardware and the Internet of Things (IoT), it has now become easy (and cheap!) to provide solutions that can be used to monitor (among other things) beer-related activities. This article will describe and detail the steps I took to create a solution for monitoring beer consumption on a beer kegerator.
 

John Adali by John Adali

Disabling Windows Update in Windows 10 IoT Core

If you’re working with Windows 10 IoT Core on your devices and have wondered how you can disable Windows Update, well wonder no more! This article will detail out the steps needed to disable this service.

John Adali by John Adali

IoT Device Security

IoT is a huge topic, especially for enterprises. Many have been doing it for years, and many more are interested in doing it for the first time. Companies like Target have proven that it is often these smaller and non-obvious machines that are being used to penetrate systems and cause havoc or steal information. Utilizing an air-gap or analog segregations only make manipulations more difficult to detect. Microsoft has created a very robust set of Azure services to mitigate any qualms about using their cloud services, but what about their connected devices? Could an infiltrator access these to penetrate the system, or modify their programming to cause malicious damage?

Carl Schweitzer by Carl Schweitzer