Manage
Learn to apply best practices and optimize your operations.
Manage
Learn to apply best practices and optimize your operations.
Analyzing streaming data starts with the right tools
As IoT data becomes more complex, businesses must use next-generation technologies such as streaming analytics, graph analytics and location intelligence to increase profit and efficiency. Continue Reading
Bring life to things to maximize your IoT investment
CIOs can maximize their IoT investments by bringing life to things to create powerful ecosystems and build new business models, delivering positive outcomes for their customers, employees and partners. Continue Reading
Understand IoT data management essentials
The flood of data from IoT devices requires careful planning of infrastructure and data management, and current processes might not be up to the task. Continue Reading
-
Monetizing IoT: Approaches to tie it together
There are many possibilities for monetizing an IoT solution. You must determine how to maneuver the three monetization levers and consider how your approach might change for different layers of the ... Continue Reading
The dos and don'ts of device management solution implementation
Device management is essential to deploying IoT devices. There are a few best practices that you should consider, such as formulating a plan to satisfy compliant standards and being aware of vendor ... Continue Reading
Make legacy IoT data protocols part of an IoT strategy
IT pros implement IoT devices to create and connect data; however, the lack of one IoT standard protocol counters the ability of IoT devices to work together.Continue Reading
What 2019's 'summer of outages' means for IoT
2019 was a tough year for cloud service providers as outages affected big companies such as Google and Apple, and businesses must implement several preventative steps to ensure their IoT devices ...Continue Reading
IoT requirements in a 5G world
As 5G gains popularity, businesses must adopt new IT strategies to get the most out of IoT data, such as taking advantage of event stream processing, adding new infrastructure and using machine ...Continue Reading
How to create a data strategy for IoT
There is no value in IoT data if organizations don't understand how to use it properly. These five tips will help organization better analyze their IoT data and use it to improve business operations.Continue Reading
5 ways to facilitate the convergence of IT and OT in IoT
Inherent differences between IT and OT teams can lead to conflict and a lack of cooperation. Learn how to align these two functions to ensure project success.Continue Reading
-
Drastically simplify your IoT data pipeline
IoT devices can quickly create a massive amount of data that seems unmanageable, but data lake engines can simplify the data pipeline and get greater value from IoT data.Continue Reading
3 NB-IoT use cases bring advantages -- and challenges
Narrowband IoT applications offer advantages for smart city, farm and factory data analytics, but organizations must still tackle connectivity and security issues.Continue Reading
IoT lays the pathway to smart cities of the future
Smart cities have the potential to efficiently maintain themselves with minimal human input and reduce risk with the help of IoT, but leaders must be cognizant of the challenges and their solutions.Continue Reading
How do IoT and blockchain for traceability simplify compliance?
Organizations can use IoT sensors and blockchain to confirm their traceability systems meet compliance requirements and get through customs efficiently.Continue Reading
ICIP IoT Training: Creating IoT value
Organizations can create greater value in IoT products by combining innovative design, proper maintenance and improved operations beyond just connecting a device to the internet.Continue Reading
Cybersecurity risks affect IIoT fog computing
Although fog computing can improve productivity, efficiency, and revenue, it also can put data at risk. The two-way cloud communications connect operational components via the internet in ...Continue Reading
ISA-95 for IIoT gives architects a standard for integration
The rapid growth of IoT technology has led to a common complaint about the lack of standards across IoT, but organizations can use the ISA-95 standard for IIoT.Continue Reading
IoT security regulations refocus data privacy best practices
New and old IoT regulations create a maze of rules and best practices that organizations must navigate to become more transparent about their IoT security practices.Continue Reading
What are traceability systems for IoT asset management?
Organizations can apply supply chain traceability to improve their IoT systems for identifying and tracking goods in any industry, such as pharmaceuticals.Continue Reading
The emergence of autonomous irrigation technology streamlines farming operations
As advancements in technology continues, agricultural farmers can take advantage of LoRa and automatic identification services to better automate and streamline agricultural operations.Continue Reading
What are the challenges of IoT in space?
Even though aging hardware is a problem all networks face at some point, satellite IoT networks boost some network challenges to a new level.Continue Reading
Unlock the benefits of a smart building
Smart buildings and technologies enable businesses to strategically control HVAC, security, lighting and building automation systems to better improve usage costs.Continue Reading
Remote device management of connected robots
Robot original equipment manufacturers and solution providers need to prioritize and build a scalable remote management solution that includes core functional features, security and additional ...Continue Reading
IoT and AI push tech ethics to the forefront of development
AI and IoT sensors have tied humans and machines closer than ever without much hesitation, but organizations must learn to apply ethics in technology development.Continue Reading
IoT security policy requires comprehensive, expansive visibility
Many IoT devices get overlooked as vulnerabilities for organizations because they are old hardware or mundane systems, such as HVAC. Plan with device visibility and network segmentation in mind to ...Continue Reading
3 more emerging attack surfaces need greater security
Remote networks, applications and Active Directory accounts are three attack surfaces that organizations must remember to secure through controls and an assumed-breach posture.Continue Reading
How to overcome IoT performance testing challenges
IoT that interacts with things -- rather than human users -- introduces new challenges in effective testing, but IT pros can use design best practices to ensure applications will scale.Continue Reading
Solve real-world challenges with IoT for smart cities
IoT devices can improve the quality of life for citizens of smart cities in many ways, whether the devices save lives, manage noise pollution or decrease response time to natural disasters.Continue Reading
3 E's of AI: Creating explainable AI
Organizations can use blockchain and explainable latent features to make AI understandable and push ethical, highly predictive AI technology into production more quickly.Continue Reading
Who has control of your control systems?
As cyberattacks become more common, securing control systems is essential. Otherwise, businesses risk exposing critical resources such as financial data to cybercriminals.Continue Reading
IoT devices push to move the workplace to the cloud
Organizations that incorporate more connected devices into their operations strategy must understand how to deploy, maintain and secure these devices to ensure the success of IoT devices.Continue Reading
3 experts discuss how to navigate the challenges of IoT
IoT has given organizations opportunities to improve processes and predict issues from the flood of data. How will advancements and its own limitations shape the future of IoT?Continue Reading
IoT technology helps feed the growing world population
As a result of growing population numbers, farmers and food manufacturers are facing a need for increased food production. But IoT tech can help extend the lifecycle of equipment and boost the ...Continue Reading
IoT data privacy forces organizations to rethink data ownership
Now more than ever, providers of IoT devices and experiences play an integral role in addressing IoT data privacy issues and influencing outcomes, market forces and societal health.Continue Reading
Ensure an effective IoT asset management initiative
IoT devices have boosted the real-time tracking game for items as diverse as tools, shipping containers and vehicles, though other uses of IoT might be more profitable.Continue Reading
Why IoT needs security regulation
As the number of connected devices continues to grow exponentially, default passwords pose a threat to overall IoT security. Michael Green, CEO of Enzoic, discusses the repercussions of default ...Continue Reading
When cars own the road: The future of IoT and connected vehicles
As it stands now, automakers have an opportunity to save money and build new revenue streams by pulling vast troves of data from connected vehicles through Message Queuing Telemetry Transport and ...Continue Reading
IoT, 5G and the need for smart streaming
Data architecture must keep up with the changes that new technologies -- including 5G and IoT -- bring to the edge. Dheeraj Remella explains how smart streaming is essential for data processing.Continue Reading
IoT data management requires mission-critical edge processing
To get the most out of edge data, IT pros must know how to use machine learning algorithms to designate data to real-time or traditional cloud processes.Continue Reading
IoT product design requires keeping people in mind
Software and AI have changed consumers' expectations of IoT products. IoT designers must incorporate new practices in order to enhance customer experience, instead of erode it.Continue Reading
How to make IoT data a performing asset
Some IoT data is left to sit in data lakes, undermining performance. Co-Founder and CEO of Dremio, Tomer Shiran, discusses how organizations can migrate this unused data into analytics tools.Continue Reading
IoT architecture layers and design change to address data deluge
The evolution of the entire digital landscape has shifted into high gear, thanks to IoT pushing new architecture layers and topologies into organizations.Continue Reading
Microsoft: IoT adoption in businesses is critical for success
Findings from a Microsoft report on the state of IoT in enterprises say businesses benefit from IoT implementation and that businesses need to increase IoT adoption now.Continue Reading
Top enterprise IoT initiatives that bring deployment success
Practice makes perfect when it comes to successful IoT deployments, but completing initiatives in the right order will lead to greater revenue, money saved and improved processes.Continue Reading
Managing IIoT security with cloud-based VPNs
Securing the operational technology and IIoT devices that allow technicians to remotely access and manage machine data is critical. NCP engineering's Julian Weinberger explains how a cloud-based ...Continue Reading
What the rise of industrial IoT means for cybersecurity
As industrial IoT becomes widespread, warns Kudelski Security's Andrew Howard, it's critical to understand the threats connected industrial systems will face and how to mitigateContinue Reading
Three challenges facing IT infrastructure in connected healthcare
The increasing use of IoT in healthcare puts major strain on IT infrastructure. Vertiv's Martin Olsen discusses three of the top challenges and discusses why rethinking healthcare IT infrastructure ...Continue Reading
IoT security and the new branch office
IoT deployments have become the new normal in branch offices and retail spaces. However, explains Fortinet's Peter Newton, these devices expand an enterprise's attack surface. Learn how SD-branch ...Continue Reading
Rethinking software development in the age of 5G
While the benefits of 5G are aplenty, companies will be faced with the challenge of delivering and maintaining the new digital experiences their users expect. Eggplant's Antony Edwards offers four ...Continue Reading
Saving this summer with IoT: Energy, water and light
IoT and building automation sensors are critical components to reducing energy, water and light consumption in homes, offices and commercial buildings. Semtech's Marc Pegulu discusses the benefits.Continue Reading
Evolving maintenance programs with prescriptive maintenance
Prescriptive maintenance will be a critical piece of the fourth Industrial Revolution, allowing organizations to apply maintenance before issues arise – and while systems are still operating. ...Continue Reading
An IoT security maturity model for IT/OT convergence
IT/OT security is a growing threat in connected environments. IIC author Sandy Carielli offers actionable advice to bolster the defenses of your IoT-enabled organization.Continue Reading
Secure healthcare IoT devices with network traffic analytics
Healthcare IoT devices are of particular interest to cybercriminals, but these devices are notoriously difficult to safeguard. Bitdefender's Gavin Hill explains how network traffic analytics fills ...Continue Reading
Capitalizing on the world's most valuable intangible asset: Data
Intangible assets are increasingly filling corporate balance sheets, up to 80% by some accounts. Vertica's Joy King outlines why data is a key differentiator, as well as why businesses must create ...Continue Reading
True IoT security in the energy industry requires continuous compliance
As electric grids and utility plants become increasingly connected, it's critical to assess IoT security measures and cyber-situational awareness. Lumeta Solutions at Firemon's Reggie Best ...Continue Reading
IoT, cloud, security and the IT professional: Transforming traditional roles
Today's IT professionals must do and know more than they ever had to before. Arcules' Andreas Pettersson outlines why additional skills and knowledge of security, IoT, cloud and collaboration are ...Continue Reading
How to have a safe connected cyber summer
Fortinet's Anthony Giandomenico offers seven tips to staying safe and connected while in the office or on vacation. From safe Wi-Fi to updating devices, follow these to prevent attacks on connected ...Continue Reading
IoT device manufacturers: It's time to secure our children's smartwatches
The very IoT devices people turn to for security and safety are inherently insecure, though they shouldn't be. VGS' Peter Berg outlines three solutions to the very real IoT security problem.Continue Reading
IoT battery outlook: Types of batteries for IoT devices
An IoT deployment won't get off the ground without the proper power supply. Learn about the different types of IoT batteries, as well as some newer battery technologies and alternatives.Continue Reading
How to mitigate the IoT attacks that are increasing at 217.5%
Every year the IoT attacks ratio is escalating. Learn how these cyberattacks on IoT devices will continue to grow in numbers, as well as how to prevent them.Continue Reading
Intelligent network automation holds promise for operators
Operators must make the move from network management to intelligent network automation. Altran's Ben Pietrabella discusses how to transition to an automated network management system and the impact ...Continue Reading
Hospitality IoT checks in to Royal Park Hotel
By integrating smart hotel technology, one Michigan hotel hopes to revolutionize the guest experience, while optimizing business processes.Continue Reading
3 companies successfully monetizing IoT data
While many companies use IoT to increase efficiencies and save money, some are revamping their business model and monetizing IoT data via subscription services and digital products.Continue Reading
It's time to get serious about securing the internet of things
IoT devices require a mature, proven security mechanism such as public key infrastructure. DigiCert's Dan Timpson discusses the benefits of PKI for IoT and offers the four C's to finding the best ...Continue Reading
How do nanotechnology, virtual reality and augmented reality mix?
Nanotechnology plays an integral role in virtual reality tech's hardware, communications and power. IEEE member Saumya Sharma outlines how the two intersect to create a more immersive end-user experience.Continue Reading
Voice assistants, AI and the cloud: An illusion of performance and privacy
Voice assistants often rely on the cloud for AI, which opens a number of security and privacy holes. Snips' Joseph Dureau outlines why voice assistants don't need the cloud, and discusses the ...Continue Reading
The common misnomer about recent Nest hack reports
It's important to note that the recent hacks on Nest devices aren't the next Mirai. In fact, says Minim's Alec Rooney, they are much different -- and easy to mitigate with one key security mechanism.Continue Reading
Due diligence and compliance in IoT with digital twins and mirrors
As digital twins and mirrored worlds become more commonplace, security managers must consider the risks associated with these virtualized clones. EmeSec's Maria Horton offers best practices for ...Continue Reading
Can California legislation save the world from IoT security risks?
IoT security legislation introduced in California aims to provide 'reasonable' security mechanisms to mitigate threats, such as default passwords. But is it enough? NSFOCUS' Guy Rosefelt discusses.Continue Reading
Where do IoT and nanotechnology intersect?
Nanotechnology in IoT has an effect not only on the size of the physical devices, but also the way data is processed and communicated. IEEE member Saumya Sharma discusses.Continue Reading
Comparing IoT mesh network protocols: What's the difference?
With so many available, how does an organization choose which IoT mesh network protocol to use? Sift through the noise and learn about four options and their benefits.Continue Reading
Why continuous testing is the digital world's new normal
Rolling out updates to mission-critical IoT environments offers no room for error. Eggplant's Antony Edwards explains why continuous testing in IoT using digital twins is essential.Continue Reading
How can connected car security issues be detected and mitigated?
IEEE senior member Alexander Wyglinski discusses why the vehicular tech industry needs to shift gears to put the brakes on connected car security threats.Continue Reading
Securing the IoT edge
IoT security requires a consistent and comprehensive security strategy. Fortinet's John Maddison discusses five crucial elements of IoT edge security and explains how, tied together, they build a ...Continue Reading
Protecting the exploding attack surface: A blueprint for government agencies
To protect the ever-expanding attack surface caused by IoT and cloud, Lumeta at Firemon's Reggie Best suggests government agencies adopt cyber-situational awareness in tandem with intent-based ...Continue Reading
What are the benefits of IoT for utilities and their consumers?
Saving energy and optimizing distribution are benefits of IoT for utilities. But, without consumer buy-in, IEEE senior member Shawn Chandler said, utilities' efforts are for naught.Continue Reading
ICIP IoT training: IoT and big data analytics
In this podcast lesson, ICIP instructor Bruce Sinclair outlines the benefits of IoT and big data analytics, exploring how they affect digital twins, the types of analytics available and more.Continue Reading
IoT smart contracts bring opportunities and challenges
Smart contracts for IoT are the talk of the town. But whether they're all ready for action -- legally or otherwise -- can be debated.Continue Reading
Emerging frameworks for cross-silo IoT data models
Having a standardized approach to understanding and interpreting IoT data is key to preventing silos. OneM2M's Chonggang Wang discusses frameworks available for IoT data modelling.Continue Reading
Three strategies for vendor success in IoT markets
Focusing on fewer industries to develop more comprehensive IoT systems, while removing customer barriers, can increase chances for success in this burgeoning market. Bain & Company's Ann Bosche ...Continue Reading
Connected cars: The roles of app developers and car manufacturers are changing
High Mobility's Kevin Valdek outlines the roles of connected car manufacturers and connected car app developers, and how these two often co-dependent groups are coming together to change the industry.Continue Reading
Medical wearables offer new hope for diabetes patients
The internet of healthcare things and medical wearables are offering new hope, allowing diabetes patients to not only monitor their blood levels more easily, but also save costs and prevent other ...Continue Reading
Combatting the continued expansion of IoT threats
IoT threats have topped the Fortinet Threat Landscape Report for the past year. FortiGuard Labs' Anthony Giandomenico offers insights into the fundamental shifts organizations must take with IoT ...Continue Reading
Book excerpt: Building blocks of an IIoT security architecture
The following is an excerpt from 'Practical Industrial Internet of Things Security: A practitioner's guide to securing connected industries' by author Sravani Bhattacharjee and published by Packt.Continue Reading
Top 3 enterprise IoT challenges to overcome to ensure success
The benefits of IoT are aplenty, but not every organization is ready to deploy it yet. MOBI's Josh Garrett offers three primary challenges your organization should be ready to overcome to ensure ...Continue Reading
Securing IoT: Whose responsibility is it?
There's no shortage of opinions on where to place the blame for IoT security events. However, as IEEE member Kayne McGladrey explains, the onus is on both manufacturers and consumers.Continue Reading
Overcome the cybersecurity skills gap to embrace the digital transformation power of IoT
Securing IoT is critical, but with a major security skills shortage, recruiting talent is challenging to say the least. Fortinet's Jonathan Nguyen-Duy offers insight into finding – or cultivating – ...Continue Reading
With an IoT digital twin, security cannot be forgotten
While digital twins can improve the security of IoT devices and processes, it is critical to consider the security of the twins themselves when implementing one.Continue Reading
Identity and access management is a top IoT security concern
One of the biggest concerns in an IoT ecosystem is identity and access management – not just of humans, but also devices and applications. Ericsson's Bodil Josefsson offers key factors to consider ...Continue Reading
Strong security can unleash the promise of the industrial internet of things
Industrial IoT is set to make a worldwide economic impact. However, without strong security, IIoT efforts are for naught. DigiCert's Dan Timpson explains why PKI and digital certificates are key to ...Continue Reading
How to manage IIoT authentication and protect machine identities
To monitor and manage the data communications of authenticated remote IIoT devices, implementing enterprise-grade virtual private networks is critical. NCP Engineering's Julian Weinberger discusses.Continue Reading
Top challenges of IoT adoption in the enterprise
CIOs share the top IoT implementation challenges they've faced and how they're overcoming them as they move forward with their enterprise IoT initiatives.Continue Reading
Smarter networks mean smarter students
The success of edtech is reliant on the network powering it. Extreme Networks' Mike Leibovitz explains how integrating smart networks with AI, machine learning and IoT makes for a stronger skilled ...Continue Reading
Why digital twins need AI-driven testing
Digital twins are becoming a critical component of today's IoT systems. However, their added complexity requires intelligent testing driven by AI and machine learning. Eggplant's Antony Edwards ...Continue Reading
Avoid tech's valley of death: Advanced R&D lessons on scaling IoT proofs of concept
To scale your IoT proof of concept, says Deloitte's Helena Lisachuk, learn from the successes of advanced R&D. Here, Lisachuck explains why promising proofs die -- and what to do about it.Continue Reading
Navigating the IoT security minefield: API security
The growth of IoT and subsequent rise of API adoption presents a number of security challenges to enterprises. Threat X's Andrew Useckas offers five tips for designing, building and connecting ...Continue Reading
Is IoT getting more secure?
New survey data is showing some promising signs when it comes to IoT security, but there's still a long way to go. Gemalto's Gorav Arora outlines how IoT security is improving, where the government ...Continue Reading
Taking back network control in the IoT era
IoT security isn't something to worry about later – it's here today. Lumeta's Reggie Best outlines three best practices which, combined with specialized network visibility technologies, can help ...Continue Reading
Looking ahead: Security implications of 5G and IoT
The impact of 5G and IoT on business and networking strategies will be transformational. Yet, as Fortinet's Jonathan Nguyen-Duy explains, there are important security considerations 5G and edge ...Continue Reading
The manifold dangers of IoT devices and their foreign platforms
Pepper IoT's Scott Ford offers insights into how smart homes spy on their users – as well as why retailers and manufacturers are key to mitigating the danger.Continue Reading