Vmoksha IoT Bootcamp for VIT University Professors and Lecturers

Vmoksha organized a 2-day Hands-on IoT Bootcamp for University Professors and Lecturers at Vellore Institute of Technology, Tamil Nadu. About VIT VIT University was founded in 1984 with the aim of providing quality higher education on par with international standards. It currently offers 62 degree programs to over 29,000 students in its 2 campuses at Vellore and Chennai. They are among the Top Universities in the country with the quality of their Teaching, Learning, and Research. Why VIT chosen Vmoksha? Dr. Rajashekara Babu, the Program Manager of SCOPE (School of Computing Science and Engineering), VIT has attended the 2-day Vmoksha [...]
Read more
FacebookTwitterGoogle+Share
Posted by
No Comments

6 Scenarios for Testing Beacon Integrated Application

What is Beacon? Beacons are small Bluetooth-powered radio transmitters that can trigger real-world actions by relaying contextual information to nearby smart devices. Beacon Identifiers The parameters UUID, Major, and Minor are the Beacons identifiers. These parameters together makeup iBeacon’s unique identifier and plays a key role in beacon deployment. UUID: The purpose of the UUID is to distinguish beacons in your network from all other beacons in networks outside your control. Major: The major field identifies and distinguishes a group, for example, all beacons in on a certain floor or room in your venue could be assigned a unique major [...]
Read more
Posted by
No Comments

Over 200 Participants Were Trained at Vmoksha IoT Bootcamp

We are glad to share that Vmoksha has successfully completed its 17th IoT Bootcamp. On completion of this Bootcamp, we have passed an important milestone i.e. over 200 participants were trained at our IoT bootcamp. This has empowered us to train more participants effectively in the future. We would like to thank every participant for their enormous support. All our bootcamps were assembled by participants from absolute beginners to the technical professionals from various domains such as Engineering, Medical science, and Management. We are elated to find that our training has helped candidates in developing their knowledge and skill to [...]
Read more
Posted by
1 Comment

Vmoksha at IoT SHOW INDIA 2017 – Profit From IoT

We never miss an opportunity that can augment our business network. IoT SHOW is one such opportunity for Vmoksha to meet 3000+ delegates from IoT domain. The event was organized at Bangalore by EFY group with the support of Ministry of Electronics & Information Technology, India. It was a 3-day event, where the participants will get to see cutting-edge IoT components, solutions, and technology as well as meet engineers who create amazing products. As suggested by the tagline, “Profit From IoT,” the event benefits all the stakeholders with valuable insights gathered from the most popular vendors of IoT components that [...]
Read more
Posted by
No Comments

Sensor Characteristics

The sensor is a transducer that converts a physical property into an electrical signal. The physical property can be Weight, Temperature, Pressure, Percentage Composition, Force, Electric or Magnetic or Electromagnetic, Position and Orientation, etc. The sensors are classified as active sensors and passive sensors based on their working principle. The active sensors use an external or self-generated signal to measure. For example, RADAR emits a series of intense radio waves for a short time and waits for the radio waves or signal to return and calculate the distance of the distant object using the signal flight time. The passive sensors [...]
Read more
Posted by
No Comments

Wireless Protocols for Internet of Things

If you are planning to do an IoT project, you need to take decisions on sensors or actuators to use, hardware for edge device( node), and hardware for Gateway (Gateway connects your node to the internet). For communication, decisions should be made on wireless protocol (Node to Gateway), Network Protocol, Communication Channels (gateway to the cloud), and IoT cloud platform to be used. In this article, I will be briefly discussing wireless communication protocols that are widely used in IoT scenario. For each protocol, a brief description of the protocol followed by Pros & Cons, technical features, application areas, and [...]
Read more
Posted by
No Comments

Working with MQ2 Gas Sensor

The MQ-2 Gas Sensor module detects gas leakage in home and industry. The MQ series of gas sensors use a small heater inside with an electrochemical sensor. They are sensitive to a range of gasses and are used indoors at room temperature. The output is an analog signal and can be read with an analog input of the Arduino. Features Wide detecting scope High sensitivity and fast response Long life and stable Simple drive circuit   Due to its fast response time and high sensitivity, measurements can be taken as soon as possible. The sensor sensitivity can be adjusted by [...]
Read more
Posted by
No Comments

A Look at the AWS IoT Ecosystem

The Internet of Things (IoT) enables smart objects to link with various information services that are based on the internet. The IoT cloud platform provides a framework to host applications that link smart objects to internet based services. The IoT cloud platform also provides a way to control smart objects with other smart objects. AWS IoT is a cloud platform that not only provides an easy way to connect to IoT-enabled devices to the cloud but also can store, analyze and visualize data by making sense out of it. AWS IoT AWS IoT provides a platform where the sensor grids, [...]
Read more
Posted by
No Comments

Exploring IoT Through a Use Case

The Internet of Things (IoT) is much more than attaching sensors to things and controlling them through the internet. The concept of IoT holds long-term application capabilities as our day-to-day lives are influenced by smart technologies and people are investing brains to make them a reality, which can only be accomplished by IoT. Here is an example that explains IoT use case for a logistic company. IoT Use Case A logistic company is transporting fish long distances in refrigerated containers. They transport the fish with the utmost care because the fish may spoil if not handled properly during the transit. [...]
Read more
Posted by
No Comments

Security Technologies behind SSL

Since the early age, computers have been used to transmit confidential and sensitive messages. But, sometimes people intercept and use these messages for their gain. Therefore, to safeguard the important messages such as credit/debit card information, different methods of encryption have been implemented. Cryptography or Cryptology is the study and practice of techniques for secure communication in the presence of third parties called adversaries. In general, cryptography is about constructing and analyzing protocols that prevent adversaries or the public from reading private messages. Symmetric Encryption: Symmetric cryptography is a cryptographic system which uses a single key to encrypt and decrypt [...]
Read more
Posted by
No Comments