We had an interesting presentation last month given by Allan Pead from Microsoft on the open source platform from Microsoft Azure Sphere – a secure IoT platform.
Allan Pead.
Allan is currently an Xamarin MVP (most valuable professional), a Microsoft Azure MVP and a Microsoft Development Technologies MVP. He is based in Cape Town and is a systems architect and software developer with more than 20 years’ experience. What excites him is any project that involves mobile or IoT-related devices.
Allen started by explaining the risks involved when using an IoT platform. One of the examples he showed was an attack where a hacker hijacked thousands of devices to do a denial-of-service attack on the US government. The attackers targeted specific services and used each device to request information from that service. As multiple devices were used, the service was easily overloaded preventing other users from accessing it.
He then explained how Azure Sphere technology was developed by Microsoft, utilising hardware certification and built-in firewalls to secure devices. It is regularly updated with new security features, which Microsoft will support for many years to come, allowing designers to develop more secure solutions.
He then started explaining where and how a person would start when developing a new application. This included an overview of the applications used to develop the software and a short introduction to some of the developer kits available.
This interesting presentation informed attendees about the Azure Sphere Technology and what they might need to start their own secure projects. The branch thanks Allan for presentating and Microsoft for making the presentation possible.
MESA Africa Summit has been expanded and rebranded SAIMC Supplier Advisory Council
SAIMC
We are writing to share some exciting developments regarding the evolution of the MESA Africa Summit, which has been a cornerstone event in industrial automation and manufacturing excellence.
Read more...How to claim CPD points SAIMC Supplier Advisory Council
SAIMC
SAIMC makes it possible for you to claim CPD points for attending courses and technical meetings, or completing an online quiz on a SA Instrumentation & Control magazine.
Read more...SAIMC: From the office of the CEO:Slaughtering AI holy cows SAIMC
SAIMC
A couple of sessions at various dealers, a wrong delivery, a failed holiday plan, a two-week unplanned vacation and 32 kg of steel on the back seat awaited us as we left South Africa on a dream holiday. But let me start at the beginning.
Read more...SAIMC: Secunda branch SAIMC
SAIMC
At the most recent SAIMC Secunda technical evening, Jenine Jansen van Vuuren, sales account manager from Comtest Technologies, gave a presentation on the calibration of process instruments.
Read more...SAIMC: Durban branch SAIMC
SAIMC
The Durban branch of the SAIMC held its October technology meeting, not on the first Wednesday of the month as usual, but on the second Wednesday to accommodate the very interesting presenter, Nico Erasmus from Abacus Automation.
Read more...SAIMC: Johannesburg branch SAIMC
SAIMC
The October Technology Evening was hosted by Pepperl+Fuchs. Patience Moila, the enterprise mobility expert for sub-Saharan Africa, presented on ‘Lone Worker Protection for the Mobile worker 4.0’.
Read more...SAIMC: It’s not black and white SAIMC
Editor's Choice SAIMC
Grey imports are a problem worldwide, not least in the automation industry in South Africa. The Supplier Advisory Council (SAC) operates under the umbrella of SAIMC, and is tackling this problem head-on.
Read more...How to claim CPD points SAIMC Supplier Advisory Council
SAIMC
SAIMC makes it possible for you to claim CPD points for attending courses and technical meetings, or completing an online quiz on a SA Instrumentation & Control magazine.
Read more...SAIMC: From the office of the CEO: The real damage of fake news SAIMC
SAIMC
People depend on accurate information and their own reasoning and belief systems to draw conclusions or make decisions. However, when they are inundated with fake news, the reliability of the information they receive is compromised.