Internet of Things (IoT) Strategy
Given the sheer variety of IoT devices and opportunities to exploit them, IoT attack trends will develop in several directions.
Creating deeper and more consistent engagement between academic institutions and employers will go a long way toward ending the skills gap.
Geolocation mapping -- which enables us to use maps in revolutionary ways -- will become increasingly important to IoT.
There are five qualities and skills essential to being a successful IoT developer in today's fast-paced age of "connected everything" -- do you have them?
Explore the top five benefits of real-time business intelligence for utility companies, from optimizing asset performance to boosting customer satisfaction.
Bots can help companies apply ambient computing to smart devices, but before doing so the issue of bot brawls must be solved.
Unlike today's internet, the amazing diversity of applications in dozens of industries cannot be easily addressed by a single IIoT connectivity technology.
Internet of things products using NFC technology came up big at the NFC Forum Innovation Awards – learn more about the winners and finalists.
Every single person and thing has a stake in the other's UX, giving rise to a new term we can refer to as the user/stakeholder or U/S.
The third wave of mobile apps is upon us. For it to perform reliably, the connected mobile app wave requires proper security and governance.
To become a smart city prepared for disaster, cities should take every opportunity to leverage smart technology in ways that will make citizens safer.
Sharing economy apps can thrive and disrupt incumbent industries. Explore the five top markets that could become the next frontier of digital disruption.
2016 was a record-setting year in terms of IoT M&A activity, seeing a nearly 60% increase in transaction volume compared to 2015.
Check out a list of the top 10 hot topics and buzz phrases witnessed at Mobile World Congress 2017, including hearables, eSIMs and, of course, IoT.
We must have a plan B for when security breaks down. Approaching IoT as an architecture in which devices are protected behind a gateway is a good start.