In the information technology space, IoT can be implemented into new and existing devices to track performance and alert staff in the case of unexpected behavior or incidents, saving companies the time it takes to recognize and damage-control a problem. Additionally, IoT can be used to automate processes to reduce the cost of highly manual and repetitive tasking and processes, improving ROI.
IT and Security
In the information technology space, IoT can be implemented into new and existing devices to track performance and alert staff in the case of unexpected behavior or incidents, saving companies the time it takes to recognize and damage-control a problem. Additionally, IoT can be used to automate processes to reduce the cost of highly manual and repetitive tasking and processes, improving ROI.
Roland Atoui
Jul 24, 2019
Volansys Technologies
Jul 18, 2019
Guest Writer
Jul 1, 2019
JC Gaillard
Jun 20, 2019
DornerWorks
Jun 17, 2019
Paessler AG
Jun 14, 2019
Cybersecurity
Anyone operating in the IoT space should be aware of the recent changes to the EU data protection program, GDPR.
Roland Atoui
Jul 25, 2019
Cybersecurity
IoT and GDPR: Challenges and Opportunities
Roland Atoui
Jul 25, 2019
Building Automation
Smart buildings bring numerous conveniences to property managers, but IoT, which allows buildings and devices to communicate, also exposes security issues.
Roland Atoui
Jul 24, 2019
Building Automation
Smart Building Security: Creating Your Digital Fortress
Roland Atoui
Jul 24, 2019
Cloud Software
As IoT devices proliferate, businesses need a solution to collect, store and analyze their devices' data. AWS provides several useful tools.
Volansys Technologies
Jul 18, 2019
Cloud Software
Design Practices: AWS IoT Solutions
Volansys Technologies
Jul 18, 2019
Hospitals
New healthcare apps are essential to achieving modern healthcare missions, so let’s look at the two challenges of leveraging cloud resources and orchestrating stakeholders to achieve successful rollouts.
Guest Writer
Jul 1, 2019
Hospitals
How to Improve Healthcare IT Rollouts
Guest Writer
Jul 1, 2019
Cybersecurity
Data is today’s most used currency. The business model developed by big tech firms over the past decade, by which consumers pay for services with their personal data instead of money, is being undermined by long-term social trends toward greater care for privacy. Do you own your personal data? Could you sell it instead of giving it away? How can trust be built in that type of transaction?
JC Gaillard
Jun 20, 2019
Cybersecurity
Toward a New Model of Data Ownership
JC Gaillard
Jun 20, 2019
Cybersecurity
When designing the network security for an IoT device, keep in mind these three basic concepts: identity, authentication and authorization.
DornerWorks
Jun 17, 2019
Cybersecurity
The 3 Basic Concepts of MQTT Security
DornerWorks
Jun 17, 2019
Integration Services
Infrastructure has always been talked about in IT, but will recent innovations in cloud, containerization and serverless change that forever?
Paessler AG
Jun 14, 2019
Integration Services
Will IT Soon Stop Caring About Infrastructure?
Paessler AG
Jun 14, 2019
Cloud Software
Cloud migration can be daunting, especially if you’re used to managing IT on-prem. Here's your complete cloud migration guide.
Guest Writer
Jun 10, 2019
Cloud Software
Your Guide to a Successful Cloud Migration
Guest Writer
Jun 10, 2019
Building Automation
The rapid spread of IoT makes product testing crucial to identify and fix security breaches before they happen and to lock in new customers.
Megan Nichols
Jun 4, 2019
Building Automation
Addressing the Challenges of IoT Testing
Megan Nichols
Jun 4, 2019
Cybersecurity
Hackers are an ever-present threat today. New code stylometry machine learning algorithms are able to de-anonymize hackers based on style.
Guest Writer
May 27, 2019
Cybersecurity
Code Stylometry: How AI Could End Anonymous Hacking
Guest Writer
May 27, 2019
Cybersecurity
Cybersecurity has always been seen as an equation between risk tolerance, compliance and cost. The “When-Not-If” paradigm changes that.
JC Gaillard
May 20, 2019
Cybersecurity
Cybersecurity in the “When-Not-If” Era
JC Gaillard
May 20, 2019
Cybersecurity
With continuous advances in IoT, people’s lives are becoming more connected, easier and better. Our committment to IoT security must grow with the trend.
Guest Writer
Apr 8, 2019
Cybersecurity
Securing the Internet of Things
Guest Writer
Apr 8, 2019
The Most Comprehensive IoT Newsletter for Enterprises
Showcasing the highest-quality content, resources, news, and insights from the world of the Internet of Things. Subscribe to remain informed and up-to-date.