The internet of shadowy things is a shady place to be – until the proper security measures are put in place. MobileIron's Ojas Rege offers tips for tackling IoT security challenges.
What if you could pair a conversational chatbot with the plethora of sensor data from IIoT to help manage a response or activity based on a predictive outcome? Progress' Mark Troester discusses.
IoT requires a critical technology infrastructure reinvention, which can be enabled only by HTAP powered by in-memory computing. GridGain Systems' Nikita Ivanov explains.
Because the IoT market could mean any number of things, it will remain fragmented for a very long time, says Particle's Zach Supalla.
Large, complex IoT systems can be like the board game Mousetrap, says Red Hat's James Kirkland. The moment something is off, a chain reaction can lead to system failures.