Connected-device “platform-as-a-service” vendor adds Eu presence

October 05, 2015 // By Graham Prophet
Ayla networks is a company that provides infrastructure and data services to manufacturers and service providers working with all classes of connected devices; in effect, the “back office” of the IoT. The company has now extended its reach (it is California-based) to Europe.

Ayla provides all levels of data services “in the cloud” (it runs its services on the Amazon cloud). Its customers, say company representatives, span the range from device makers who realise they need a connected-device offering but have zero experience in managing the data aspects: through to corporations already well-versed in Internet-based service offering who can access more advanced “big data” analytics in addition to functional management of their products. More typically, says Ayla, its customers areless interested in “big data” than they are in “some data” - gaining insights into certain key metrics of their product or service.

Ayla offers a platform that allows the manufacturer of a device to get its product connected; and connected in multiple ways. The platform offers compete control of data, with the ability to control who can see which aspects of the data: and it gives manufacturers feedback to refine their product and/or service. Ayla expects the IoT to remain a fragmented market, and therefore structures its platform to be capable of servicing many different business models. Accordingly, its users can customise their access to the cloud by configuring the user interface of the cloud service.

At the level of the mechanics of connecting to the cloud, Ayla says it is working with WiFi silicon makers – you can obtain a Broacom WiFi modem with Ayla software flashed on it, as a catalogue part. Recognising that many users will use the smartphone as a UI, the company also has a team that can assist with app creation.

The company says it has built a high level of security into its platform, with a multi-layered approach. A key element is the approach of generating one (encryption) key per divice, and that key itself has a limited life after which it expires. On the subject Ayla comments, “We don’t believe we need to re-invent security [for the IoT] – existing best-practice should suffice.”

Ayla has