IoT Agenda

Recent Posts

  • Remote connectivity for edge computing in IoT

    Guest Contributor Chetan S Kumar - Aikaan Labs 03 Oct 2019
  • The rise of edge computing means having reliable remote connectivity is more urgent than ever. Organizations must understand how edge computing will process the expanding data pools created by ...

  • Medical IoT devices lead to patient safety concerns

    Guest Contributor Leon Lerman - Cynerio 02 Oct 2019
  • Medical device cybersecurity is a must, but it requires cooperation from several departments. A combination of training, sensible policies, enforcement and automation can help keep patients safe ...

  • 5G and the effects on IoT product design

    Guest Contributor Mitch Maiman - Intelligent Product Solutions (IPS) 02 Oct 2019
  • Even though 5G could bring some new capabilities to IoT devices with real-time communication and increased bandwidth, it will not be necessary for all IoT applications.

  • The IT/OT divide: Why OT is from Mars and IT is from Venus

    Guest Contributor Richard Beeson - OSIsoft 01 Oct 2019
  • The divide between the IT and OT departments is one that remains within many companies. Understanding the reasons for the rift can help you come to terms with their conflicting decisions.

  • IoT devices push to move the workplace to the cloud

    Guest Contributor Daniel Jackson - Crestron Electronics 30 Sep 2019
  • Organizations that incorporate more connected devices into their operations strategy must understand how to deploy, maintain and secure these devices to ensure the success of IoT devices.

  • Driving IoT innovation

    Guest Contributor Vicki Livingston 26 Sep 2019
  • No one can deny the IoT market has been growing rapidly, but why? Fourteen market drivers of cellular IoT -- including 3GPP standards and machine learning -- have begun revolutionizing society.

  • 4 ways to minimize IoT cybersecurity risks

    Guest Contributor Thomas Ryd - 26 Sep 2019
  • Social media has made it easy for anyone to call out the mistakes in products that tech developers create. Basic cybersecurity practices can prevent IT pros from becoming the next viral sensation ...