This white paper intends to do just that. When you’re done learning how you can save time in building M2M applications with the Axeda Platform, check out the M2M App Garage at
http://developer.axeda.com/M2Mappgarage for videos, blog entries and other helpful resources.
Find out why Axeda Connexion is a premiere event for Elekta as Martin Gilday, Vice President of Service for Elekta explains the value in attending. Check out the IoT event of the year at connexion.axeda.com.
By attending this webinar you will understand how by combining Axeda Go kits, ARM-based intelligent connected devices and the hardware and software building blocks for rapid development from the mbed™ project, can enable you to quickly create new "connected prototypes”.
The Axeda and Hytec N3 Solution is a set of technology and services that enables medical product manufacturers to manage products installed within hospitals and other public health care organizations via the NHS N3 network.
Join Axeda and Machina Research to learn the following: What is the definition of an IoT platform? What is driving the business need for IoT Platforms? What security and privacy features are “must haves”? What connectivity and device management features are critical? How do platforms process, store and integrate data from machines and sensors? How do platforms manage software and configurations on things? What development and integration tools should you expect?
This paper discusses the core components of an IoT platform and architecture. It summarizes the major features and explains how they simplify and speed the process of developing and deploying IoT/M2M solutions while minimizing infrastructure and development costs.
In extremely security-conscious environments, such as financial, retail, healthcare, or research facilities, customers often insist on the ability to control and set policies on which service actions can be remotely performed on the device. The Axeda Policy Server enables authorized customer administrators of your devices to establish and enforce the privacy and access policy for their devices, and also provides an audit log for compliance purposes.