Rio 2016 Olympic Games: IoT Technologies Win

The 2016 Olympics recently concluded were the most digitally connected Olympics ever. Numerous Internet of Things (IoT) technologies were applied during the games to ensure an interconnected world.

According to Machinedesign.com, the Olympics introduced new IoT security features. The Brazilian manufacturer Altave introduced security balloons with high-resolution cameras to support the security system at the games. The devices send images produced by a total of 13 cameras in real time to the Center for Integrated Regional Command and Control. This security feature proved successful, and plans are in place for them to be adopted at the 2020 Olympics in Tokyo.

An NBC Sports app live streamed every single athletic event, providing actual live transmissions and not only replays or highlights. In addition, the Rio Games employed new cameras, sensors, and display technology to provide instant scores and coverage. The app and other technological innovations combined to provide an enriched view of the Olympics.

Users could stream individual sports or else tune into the main Gold Zone channel and view four sports occurring simultaneously.

The new Scan ‘O’ Vision MYRIA cameras from Omega captured the photo finishes as runners cross the line. The camera can take 10,000 digital photos per second.

Swimmers benefited from new underwater lap counters that helps them keep track of how much of the race is left. The lap count would update each time a swimmer touched the wall, helping them focus on the race.

Archery competitions benefited from new sensors placed under the classic paper targets. These located the exact spot where an arrow hit the target within an accuracy of 0.2 mm, and would instantly display them on the screen within one second for spectators.

These games have brought a new side of technology to sports and for the viewers at home.

I-HLS: 

 

« SWIFT Discloses More Bank Thefts
Thai Cyber Bank Fraud Gang Busted »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Gurucul

Gurucul

Gurucul predictive security analytics protects against insider threats, account compromise and data exfiltration on-premises and in the cloud.

IMS Networks

IMS Networks

IMS Networks specializes in the design and management of high criticality networks and telecoms services including network security and Managed Security Services.

CISPA Helmholtz Center for Information Security

CISPA Helmholtz Center for Information Security

The CISPA Helmholtz Center for Information Security is a German national Big Science Institution within the Helmholtz Association. Our research encompasses all aspects of Information Security.

Communications Authority of Kenya

Communications Authority of Kenya

The Authority is responsible for facilitating the development of the information and communications sectors including; broadcasting, telecommunications, electronic commerce and cybersecurity.

Styra

Styra

Styra allows companies to secure cloud environments and applications, including those built on the popular Kubernetes open-source cloud platform.

Eco Recycling (Ecoreco)

Eco Recycling (Ecoreco)

Eco Recycling is India's first and leading professional E-waste Management Company that has set industry benchmarks with its innovative & environment friendly disposal practices.

Predatech

Predatech

A cyber security consultancy offering a range of services, including CREST accredited penetration testing, vulnerability assessments and certifications incl. Cyber Essentials & Cyber Essentials Plus.

MVP Tech

MVP Tech

MVP Tech designs and deploys next generation infrastructures where Security and Technology converge.

Bleam Cyber Security

Bleam Cyber Security

Bleam is a leading provider of Managed Cyber Security Services and Information Security consulting. We deliver enterprise class security services to UK SME’s to stop data breaches.

Wazuh

Wazuh

Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.

Debevoise & Plimpton

Debevoise & Plimpton

Debevoise & Plimpton LLP is a premier law firm with market-leading practices in areas including Data Strategy & Security.

HCS

HCS

HCS is an IT Company and Telecoms provider with an experienced team who are dedicated to ensuring our clients business systems are protected.

SecureChain AI

SecureChain AI

SecureChain are combining blockchain and AI technology to create a smarter blockchain platform especially in terms of security.

BARR Advisory

BARR Advisory

At BARR Advisory, we build trust through cyber resilience. We help protect the world’s data, people, and information networks through a human-first approach to cybersecurity and compliance.

HP Wolf Security

HP Wolf Security

HP Wolf Security protects your organization and devices from cyberattacks no matter where, when or how you work.

ThreatView by Turaco Labs

ThreatView by Turaco Labs

ThreatView combines extensive experience in digital forensics with advanced analytics and threat detection capabilities to protect eCommerce websites.