Mirai was a wake-up call; worse attacks are possible. It's time for device makers and data stakeholders to assess the importance of IP support in IoT.
In IoT, start small and demonstrate return; don't attempt to implement the internet of everything. Instead shoot for the "internet of (some) things."
As fog computing has to play a role in an IoT world, we need to start talking about the business opportunities and disruptions fog computing will bring.
Potentially the biggest opportunity in the definition and use of the internet of things will be in the effort for suppliers to increase customer intimacy.
Simplifying your network topology by deploying distributed digital edge nodes will help organizations embrace IoT and succeed in digital transformation.
Machine learning stands to have an incredibly powerful opportunity to transform the way we globally produce and consume energy.
Determine what business value you can expect from IoT; diving in for the sake of participating in the next "hot" tech will only lead to disappointment.
IoT requires owner-controlled PKI to provide independent security control, but it doesn't take device manufacturers out of the security equation.
When it comes to data privacy regulations, change is on the horizon, especially as it relates to organizations analyzing internet of things data.
Autonomous drones have the limelight, but cannot fly in most places because they lack command and control and identification needed by regulators.
This IoT security cheat sheet offers real-world steps to take to ensure your organization stays secure as the IoT wave continues across industries.
Get clarity around acronyms related to the internet of things and IoT devices from Blue Hill Research's Ralph Rodriguez and Charlotte O'Donnelly.
Far too many organizations stop after collecting IoT data. To be successful, it is critical to integrate that data into your analytics strategy.
IoT privacy and security advocates must discuss the real risks and offer solutions to a problem that is vague, threatening and of colossal scale.
Hardware device businesses must work intelligently and diligently to control, secure and monetize their devices and deter grey market production.
Don't confuse data with information. Data, by itself, isn't necessarily useable. The power of IoT is its ability to gather and synthesize data.
IoT complexity can be mastered using a building-block approach built upon a platform whose solid basis is an OS that is both configurable and modular.
Given the sheer variety of IoT devices and opportunities to exploit them, IoT attack trends will develop in several directions.
There is a tremendous amount of potential in wearable technology to collect data from the foot; enter textile pressure sensor applications in socks.
Creating deeper and more consistent engagement between academic institutions and employers will go a long way toward ending the skills gap.
Geolocation mapping -- which enables us to use maps in revolutionary ways -- will become increasingly important to IoT.
There are five qualities and skills essential to being a successful IoT developer in today's fast-paced age of "connected everything" -- do you have them?
Explore the top five benefits of real-time business intelligence for utility companies, from optimizing asset performance to boosting customer satisfaction.
Bots can help companies apply ambient computing to smart devices, but before doing so the issue of bot brawls must be solved.
Unlike today's internet, the amazing diversity of applications in dozens of industries cannot be easily addressed by a single IIoT connectivity technology.
When it comes to securing IoT, we have a lot to learn from the ICS/SCADA professionals who, for decades, have been protecting our critical infrastructures.
The lack of standardization for internet communication protocols has limited the ability for developers to create new IIoT apps.
Spirited panels on IoT security ended the MIT Connected Things 2017 event, exposing the tradeoffs involved in security devices outside of IIoT environments.
Businesses of all shapes and sizes are investing in smart LEDs, as intelligent buildings are helping cut energy costs -- and the way the business operates.
Internet of things products using NFC technology came up big at the NFC Forum Innovation Awards – learn more about the winners and finalists.
Securing IIoT systems with VPN management will help enterprises stay ahead of future cybersecurity threats against connected systems.
While news of wearable hacks is making headlines, don't tear the device off your wrist just yet. Let's assess the likelihood of an attack on authentication sensor data.
IoT is having a profound impact on healthcare, as experienced at HIMSS17. Its success depends on an organization's ability to harness machine data securely.
Every single person and thing has a stake in the other's UX, giving rise to a new term we can refer to as the user/stakeholder or U/S.
IoT can change the way we live, but only if a platform like blockchain protects your privacy and data in an accessible, scalable fashion.
The third wave of mobile apps is upon us. For it to perform reliably, the connected mobile app wave requires proper security and governance.
Many people consider automation and intelligent systems as ways to save a company money, but the benefits go much further than that.
To become a smart city prepared for disaster, cities should take every opportunity to leverage smart technology in ways that will make citizens safer.
The IoT-enabled smart home of the future will use machine learning and artificial intelligence to run the dishwasher -- and end domestic violence.
Sharing economy apps can thrive and disrupt incumbent industries. Explore the five top markets that could become the next frontier of digital disruption.
2016 was a record-setting year in terms of IoT M&A activity, seeing a nearly 60% increase in transaction volume compared to 2015.
Check out a list of the top 10 hot topics and buzz phrases witnessed at Mobile World Congress 2017, including hearables, eSIMs and, of course, IoT.
We must have a plan B for when security breaks down. Approaching IoT as an architecture in which devices are protected behind a gateway is a good start.
Achieving and maintaining IoT security takes a village, one that works together in close cooperation with the other players in the security ecosystem.
A holistic risk management approach allows you to develop and deploy a critical, hyper-connected IoT infrastructure without compromising security.
Check out three critical steps operations and IT managers must consider as they make their IIoT investment decisions.
Whatever internet of things pilot or strategy your organization chooses, compliance and security operations must drive your capabilities.
The future of IoT in healthcare is a reality, with experimentation of IoT entering the body increasing as healthcare and miniaturization advances.
With some technical skill, free monitoring tools and a small amount of money in parts and equipment, most anyone can make their home "intelligent."
The internet of me, or IoMe, is about wearing biometric sensing garments that measure specific metrics important to the individual.
Cisco Jasper announced its Narrowband IoT foray at Mobile World Congress, along with new partnerships with Honda, Korea Telecom and Jupl.
Learn about cloudlets and their relevance as an enabler of the smart edge, an emerging trend in the internet of things.
If manufacturers and healthcare systems can together tackle the connected medical device security challenge, it will create a safer environment for patients.
For IoT to really take off and deliver the efficiencies it promises, devices need to be able to communicate easily and seamlessly through open standards.
Every step in the agri-food supply chain can benefit greatly from IoT in logistics, all the way from farmers maximizing output to reducing food wastage.
As more and more organizations embark on a digital transformation journey and turn to IoT for a competitive edge, business assurance will be key.
To realize the full benefits of IoT, stakeholders must rely on three critical components: reliable connectivity, trusted security and an agile monetization framework.
The IoT edge lets developers move application logic to exactly where the data is located at any moment in time for performance, reliability and security.
In the future, the agriculture industry can help accelerate IoT development as data from the field holds valuable insights for smart precision farming.
While BI technology is reasonably mature, we are yet to see exactly where the IoT train is headed and how it will manifest itself in the business world.
Knowing where data resides in an IoT world is critical; consider the benefits of identifying data, keeping it available and using it for more efficient use cases.
Integrated and intelligent services are changing how organizations interact with connected data, representing a global reality: an IT/OT convergence.
The combination of IoT and big data brings many opportunities to the enterprise, especially when it comes to boosting your security strategy.
A smart transit system is helping the fastest growing region in the U.S. combat traffic woes and the first mile/last mile problem while optimizing routes.
The rise of the internet of things combined with a fast-changing regulatory environment requires a new mindset on consent and privacy -- and soon.
Identifying and defining key characteristics of a cloud-based IoT monetization engine will help businesses succeed not just today, but for years to come.
Digital transformation is making short work of organizations that do not evolve. However, to be successful, leadership and current skills are a must.
Shifting the culture of an industrial company to more quickly adopt and embrace digitization will be one of the biggest factors in a successful digital transformation.
When cities apply IoT to the larger challenges facing them, they will improve sustainability while implementing solutions that improve the urban experience.
In part one of this two-part Q&A, Whit Diffie weighs in on the privacy risks in an unprotected IoT world and explains why he doesn't own a Nest thermostat.
Blockchain, while still an emerging solution, is one of the more intriguing technologies with potential to set us down the road towards a secure IoT world.
To secure the exploding number of IP connected created by IoT, big data and cloud services, connections must be underpinned by encryption and a VPN.
While many sessions at IoT Evolution Expo focused on wider-area, lower-data-rate standards, there wasn't much agreement over which is best.
Fostering innovation and cross-divisional collaboration along with a keen focus on services and data, organizations can embrace IoT for long-term success.
The promise of IoT is to not only light up dark parts of the supply chain, but also to fundamentally change how our supply chains operate.
Overcoming the internet of things security challenge requires the work of consumers, vendors and governments alike.
If you would like to rely on a wearable as a source of identity verification, there are some key things to keep in mind.
2016 saw some of the largest individual funding rounds for commercial and industrial internet of things companies. Review a list of some of those companies.
It's important to shift the focus of discussion to the solutions required to drive clear, tangible business value with IoT and BI.
A functioning internet of things requires everyone to take security seriously; learn the part a secure platform has to play.
Internet of things security is a rightful concern, but jumping into regulating IoT may not be the best move for the IoT market as a whole.
NFC, IoT and CES. Three three-letter acronyms that belong together. Check out some of the coolest NFC and IoT implementations at CES 2017.
With an IoT platform and smart streetlight software, Oklahoma Gas and Electric is ready to throw new light on customer service.
Many technologies ride the popularity wave and subsequently become a channel -- and not core to business needs. Will IoT follow the same path?
Testing smart device performance is one piece of the puzzle; IoT requires a paradigm shift in the way products and solutions are developed and tested.
A number of products and technologies on display at CES 2017 pushed boundaries and are helping fuel innovation, especially as they relate to IoT.
There are a variety of actions manufacturers, service providers and consumers alike can take to work towards greater overall IoT security.
As we look to 2017 and beyond, we'll see IIoT continue to revolutionize organizations, with the biggest transformations being led in three key areas.
The rapid influx of potentially insecure connected devices poses more targets for cyberattacks, upping the ante for cybersecurity.
Small businesses are uncertain as to the extent they are affected by IoT security issues. It's time to become a trusted security advisor to your customers.
With proper planning and intelligent design, IoT can be approached in a manner to minimize risk and deliver increasing benefits through the entire value chain.
Secure connectivity infrastructure in an IoT-enabled world includes a few basic building blocks that every organization should be aware of.
The ISDN switch-off is inevitable. Currently there is a need to find an appropriate alternative. IoT and M2M communication could be used in this case.
In IoT, killer apps represent solutions to real business problems, solutions that are obvious, immediate and easy to understand.
There are four strategies for the IoT industry to consider as it seeks to connect and realize the full potential of connected home.
While voice recognition is much improved and its place in IoT architectures is perceivable, it can still be hard to communicate.
Take a look at some of the innovative concepts witnessed at the National Retail Federation's Big Show, including four major wins and misses.
When it comes to enhancing customer experience with the internet of things, it's all about striking the right balance.
The industrial internet is ushering in a new wave of mobile apps. Along with the benefits comes a number of considerations IIoT companies must face.
Learn how IoT can be an effective tool in cognitive science research and help effectively proctor online courses to impart credibility for online education.