Manufacturers, service providers and consumers need to protect their connected devices, IP and sensitive data. Trustonic's Richard Hayton explains how trusted execution environments can help.
Fleet vehicles and managers, get ready for an upgrade. Jooycar's María Paz Gillet Martín explains three ways big data and IoT are affecting fleet management.
A successful industrial IoT deployment requires the right mix of customer experience and data utilization. Voxpro's Brian Hannon offers advice to help customer experience teams prepare support for ...
To achieve the full benefits of an IoT deployment, says Karina Popova, using a programming language for embedded development and a programming language for web server development is critical.
Though there are several recommended properties for built-in security, says NCP engineering's Julian Weinberger, encrypting communications with VPNs is essential.
Embedded SIMs and soft SIMs are gathering pace, says Tata Communications' Tim Sherwood, helping IoT device manufacturers quickly and seamlessly connect devices worldwide.
Is IoT an evolution or revolution? OIES Consulting's Francisco Maroto explains why it's critical to look at the Age we are living in to take part in the debate.
AI coverage is everywhere, but there are many misunderstandings about it. Aricent's Ben Pietrabella looks at four enduring myths and explains why businesses need to reboot their thinking.
Today's auto manufacturers are using IIoT in response to demands for more customization. Infor's Jeff Nedwick explains.
When you combine blockchain, AI and automobiles, an auditable 'time chain of events' can be recorded. FICO's Scott Zoldi discusses the uses and benefits.
While IoT has revolutionized healthcare, says Netscout's Eileen Haggerty, expanding threats and increasingly innovative tech make the need for complete visibility and service assurance critical.
Security cameras are visual sensors by nature, so why not add analytics and benefit further? Cisco Meraki's George Bentinck offers advice on adopting IP-enabled security cameras.
The opportunities of IoT in e-commerce logistics are unlimited. Aankhen's Subhash Chowdary explains, offering examples of success and an IoT case study.
Behavioral eManipulation, explains Independent Security Evaluators' Ted Harrington, is an attack methodology in which attackers use technical exploits to influence human behavior.
The TV industry needs to move toward personalized, targeted real-time advertising and abandon the traditional way of gathering viewer analytics. EyeSight's Ran Baror explains how.