Enterprise Internet of Things (IoT)
If IoT applications can help you grow your business, start developing distributed computing systems expertise in your business now.
With the proliferation of IoT devices, there is an obvious need of a data-filtering mechanism at the location of the data generator. Edge analytics fulfills that need.
Preventing events like last month's IoT DDoS attack is critical, as in the future they could impact not only a few devices, but our cars and homes.
Fear alone will not yield secure devices. A different approach to incentivizing IoT security -- one that makes it easier to deploy then before -- is critical.
A major study of smart city deployments around the world found most were in the pilot phase, though this is not always clear.
Recent advances in smart security and safety devices offer consumers new and expanded solutions to help them trade in worry for peace of mind.
IoT customers have three main barriers that prevent IoT adoption; innovators that understand what customers want will succeed the most in IoT.
Agile methodology is a proven approach; many IoT solutions are built via the agile development process by vendors that know iterative sprints.
As the IoT market continues to grow, so does the silicon chip market -- prompting a wave of mergers and acquisitions in the semiconductor market.
To prevent future attacks and vulnerabilities, embedded security must be added to IoT devices and included in the design of IoT ecosystems.
Just as with conventional printed circuit boards, there are three types of IoT PCBS, each with their own testing standards and processes.
Learn how Chinese multinational company Wanxiang is using blockchain technology not only as a manufacturer, but also in a smart city initiative.
Technologies like IoT and telematics provide huge opportunity for insurers to improve their products and the way they interact with their customers.
Those making or using connected devices, or objects electronically tagged and tracked, should begin prototyping Li-Fi-based alternatives today.
The recent Blockchain World Congress conference in New York City explored the implications of blockchain outside the financial services realm.
Deploying IoT in the workplace can improve employee productivity and employee satisfaction -- a win for both management and the company as a whole.
We all need to embrace and cultivate a data value chain, especially in the case of geospatial data, because the benefits are too large to ignore.
Defending against IoT attacks is different than what we're used to; there is need for a real paradigm shift in the development of defense measures for IoT.
A flexible and agnostic platform can connect IoT devices seamlessly, making sure that data flows as it's meant to.
The IoT revolution means change for people and companies. Your company must begin a digital transformation or you will go out of business.
Manufacturing companies are increasingly relying on location-based data for logistics. The Swiss Federal Railways is one such company.
Artificial intelligence or AI can help the next generation of IoT platforms be one that allows things to become thinking, learning objects.
Connected device security has been called into question in wake of the recent IoT botnet. Here are 11 key takeaways from attack.
There are six critical phases of the digital transformation journey, each critical for those working in the IoT sector to understand.
Internet-capable devices must be included in an enterprise's security strategy in order to protect company assets.
Far East IoT PCB fabrication may seem like an attractive option, but it isn't always the best when it comes to Class II and Class III projects.
As the internet of things grows, a tangible and continuous revenue stream also grows, the heart of which will be around voice and data.
There's a multiparty face-off regarding the future of OTT and the TV ecosystem. It's clear that the consumer is going to win regardless of who triumphs.
Accelerating smart home IoT adoption requires several key steps -- taken singularly and collectively -- by technology vendors and today's broader smart home ecosystem.
Without trusted data, we cannot act or bring about real change. In IoT, we have to close the loop in order to trust the data, trust the route and trust the information that is sent back.
We can't expect private key infrastructure to scale for the internet of things; it's time to look beyond PKI to keep IoT safe.
IoT often works in the background, quietly and unobtrusively making life better. But hidden IoT can be a liability when selling it to taxpaying residents.
It's essential IT and OT consider the other's expertise and point of view and work together toward the ultimate goal -- a secure, productive IIoT.
Learn about the standards behind 5G and why they are critical to building the framework for the future connection of a system of all things connected.
Explore considerations for IoT maintenance and upgrades in the three distinct phases of an IoT project: development, deployment and device exploitation in the field.