In the information technology space, IoT can be implemented into new and existing devices to track performance and alert staff in the case of unexpected behavior or incidents, saving companies the time it takes to recognize and damage-control a problem. Additionally, IoT can be used to automate processes to reduce the cost of highly manual and repetitive tasking and processes, improving ROI.
IT and Security
In the information technology space, IoT can be implemented into new and existing devices to track performance and alert staff in the case of unexpected behavior or incidents, saving companies the time it takes to recognize and damage-control a problem. Additionally, IoT can be used to automate processes to reduce the cost of highly manual and repetitive tasking and processes, improving ROI.
Yitaek Hwang
Apr 10, 2017
Yitaek Hwang
Mar 14, 2017
James Schaefer
Mar 9, 2017
Yitaek Hwang
Feb 26, 2017
Yitaek Hwang
Feb 10, 2017
Yitaek Hwang
Feb 7, 2017
Cybersecurity
Machine learning programs can now guess a four-digit pin number with 100% accuracy by the fifth attempt based on the orientation of your phone.
Yitaek Hwang
Apr 17, 2017
Cybersecurity
Machine Learning Just Made it Really Easy to Break into Your Phone
Yitaek Hwang
Apr 17, 2017
Cybersecurity
Sopris - Here are the 7 properties of highly secure devices and how Microsoft implemented all 7 in low-cost microcontrollers.
Yitaek Hwang
Apr 10, 2017
Cybersecurity
Sopris: Microsoft’s Solution to IoT Security Problems
Yitaek Hwang
Apr 10, 2017
Data Analytics
Protecting your digital footprint is important, so I used a Chrome extension called Data Selfie to find out what Facebook knows about me.
Yitaek Hwang
Mar 14, 2017
Data Analytics
Digital Footprint - What Facebook Knows About Me
Yitaek Hwang
Mar 14, 2017
Consumer Products
As we've seen with the Ring doorbell vulnerability, all stakeholders in an IoT company must make security their top priority.
James Schaefer
Mar 9, 2017
Consumer Products
Huge Vulnerability Discovered in the Ring Doorbell
James Schaefer
Mar 9, 2017
Cybersecurity
An excellent report by Kaspersky Lab exposes several weak points in our smart city technology stack — including hilarious hacks of electronic road signs.
Yitaek Hwang
Feb 26, 2017
Cybersecurity
Smart City Security - Touchscreen Kiosks Get Hacked
Yitaek Hwang
Feb 26, 2017
Cybersecurity
What are CryptoNets? CryptoNet is Microsoft Research's neural network that is compatible with encrypted data.
Yitaek Hwang
Feb 10, 2017
Cybersecurity
CryptoNets: Neural Networks for Encrypted Data
Yitaek Hwang
Feb 10, 2017
Cybersecurity
No description found for this article. Please try again later
Yitaek Hwang
Feb 7, 2017
Cybersecurity
You’re Being Sold on the Internet
Yitaek Hwang
Feb 7, 2017
Cybersecurity
Security in IoT is absolutely critical, but faces a myriad of issues. Here are some possible solutions for consumers, businesses, and governments alike.
Calum McClelland
Feb 2, 2017
Cybersecurity
Security in IoT - How to Address IoT Security Issues
Calum McClelland
Feb 2, 2017
Cybersecurity
Smart cities will have higher standards of living, increased safety, etc.. But will we trade privacy for these benefits? Let's look at smart city privacy.
Calum McClelland
Nov 26, 2016
Cybersecurity
Smart City Privacy - Potential Challenges as Our Cities Become More Connected
Calum McClelland
Nov 26, 2016
Cybersecurity
No description found for this article. Please try again later
Calum McClelland
Nov 5, 2016
Cybersecurity
Every Vote Counts, but not Every Vote is Counted.
Calum McClelland
Nov 5, 2016
The Most Comprehensive IoT Newsletter for Enterprises
Showcasing the highest-quality content, resources, news, and insights from the world of the Internet of Things. Subscribe to remain informed and up-to-date.