Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
Dead zones in cellular service take on renewed importance in IoT
Dead zones can become a potential roadblock for new product offerings and revenue streams in IoT. ADRF's Greg Najjar explores this connectivity risk and why it's affecting many utility companies. Continue Reading
The unseen killer of IoT devices
IT pros have many obstacles to overcome in IoT deployments, but the biggest one that gets overlooked is insufficient bandwidth in measurement instruments. Keysight Technologies' Cheryl Ajluni ... Continue Reading
Protect IoT bare dies and wire bonds for high reliability
The protection of bare dies and wire bonds for IoT devices ensures high reliability and long lasting products. NexLogic's Zulki Khan covers die and wire bond methodologies for increased protection. Continue Reading
-
Solve real-time analytics challenges across operational and data lake data
Waves of data can make real-time analysis difficult, but in-memory computing, explains GridGain Systems' Nikita Ivanov, can drive business processes with real-time insights into live and historical ... Continue Reading
Protect expanding smart cities from cyberthreats with cloud to flash
Smart city growth will soon outpace city planners' ability to protect them. Cloud-to-flash technology, advises Nanolock Security's Yoni Kahana, helps build cities as safe as they are smart. Continue Reading
Security concerns remain a drag on the internet of things
Security concerns continue to hinder enterprise IoT adoption. Bain & Company's Syed Ali outlines four steps manufacturers should take to start addressing IoT security concerns.Continue Reading
Is your organization in IoT for the short or long haul?
Focusing on a horizontal or vertical platform doesn't always provide an optimal IoT. More With Mobile's Ken Figueredo analyzes why IoT strategy is more important than IoT technology in the long haul.Continue Reading
Should connected devices carry an IoT security-star rating?
IoT security is a consumer, manufacturer and government concern. To combat the issue, recommends Nordic Semiconductor's Svein-Egil Nielsen, it's time to put an IoT security-star rating in place. ...Continue Reading
The future of IoT requires a cybersecurity standard
The number of IoT devices being deployed is skyrocketing. To ensure security and privacy in an IoT world, says Spirent Communications' Sameer Dixit, it is critical to adopt an IoT cybersecurity ...Continue Reading
How is dynamic spectrum access used by connected cars?
With spectrum scarcity, connected cars can't communicate -- which can be disastrous. IEEE senior member Alexander Wyglinski explains how dynamic spectrum access solves the problem.Continue Reading
-
Mastering IoT compliance in a GDPR world
A year after the General Data Protection Regulation went into effect, Lumeta's Reggie Best takes a look at how it has prompted organizations to take IoT security more seriously.Continue Reading
The realities of enterprise data lakes: The hype is over
For the last decade, we have seen an interest expand to an obsession: grab the data, store the data, keep the data. The software industry saw an opportunity to capitalize on this obsession, leading ...Continue Reading
Limiting bias and inexperience in AI-powered factories of the future
Bias and inexperience can greatly limit the success of AI-powered factories. Petuum's Saranyan Vigraham outlines why and offers tips to reach the full potential of industrial AI systems.Continue Reading
Protecting the modern infotainment system
As recent demonstrations have proven, an infotainment system can be the gateway into attacking a car. Karamba Security's David Barzilai discusses the technologies available to protect infotainment ...Continue Reading
Thinking IoT? Might want to mix in some modernization
When an enterprise deploys an IoT application, it's critical consider the corresponding app architecture. Progress' Mark Troester discusses why modernization must be considered, and where a ...Continue Reading
Why are connected devices leaving UK businesses as vulnerable as ever in 2019?
Collective consciousness about IoT risks and the consequences of IoT security breaches is growing, but still many organizations remain susceptible to attack. Forescout's Myles Bray discusses the ...Continue Reading
Competing at the industrial edge
Generating business value from IoT requires well-architected technologies at the edge which cloud developers may be unfamiliar with. Bright Wolf's James Branigan outlines how to get it right at the ...Continue Reading
Monetizing IoT networks using a multi-application approach
Many IoT product companies provide customers with single, dedicated vertical applications. New Global Software's Stephen Page and GlobalSign's Diane Vautier explain why a multi-application IoT ...Continue Reading
An IoT DIYer's story of managing Type 1 diabetes, part 2: DIY to the rescue
PubNub's Jeremy Pollock offers the ins and outs of the DIY Type 1 diabetes IoT application he uses to manage his daughter's health, from the software used to the lightbulb he added to help him ...Continue Reading
IoT grows when standards and partnerships share
IoT isn't a single technology. As such, says NFC Forum's Paula Hunter, it requires an ecosystem of standards and partnerships to expand applications and use cases.Continue Reading
For IoT and facilities management, the destination matters as much as the journey
The best facilities managers use automation and IoT to efficiently handle work orders. ServiceChannel's Hugues Meyrath explains why facilities managers need to stay on top of their IoT data to reap ...Continue Reading
The top 3 IoMT challenges keeping healthcare IT up at night
IoT technology is being deployed in life-critical situations, placing added pressure on health IT teams to mitigate new risks. Extreme Networks' Mike Leibovitz outlines the top three risks of IoMT ...Continue Reading
What are the challenges of designing virtual reality experiences?
Designing virtual reality, augmented reality and mixed reality experiences isn't without its challenges. IEEE member Todd Richmond outlines three issues to overcome.Continue Reading
Time to get prepared for IoT security issues
If you don't have a strategy to cope with IoT security issues yet, what are you waiting for? With billions of connected devices around the globe, there's no time to waste.Continue Reading
Best practices to overcome an IoT security challenge
The internet of things poses numerous security challenges, but with the proper preparation and tools, your enterprise can mitigate the threats.Continue Reading
Breaking down the silos to enable full potential of IoT
Siloed IoT applications result in data and vendor interoperability. Deutsche Telekom and oneM2M's Andreas Neubacher outlines why standardization is key to IoT success.Continue Reading
How blockchain meets IoT at the data
Blockchain doesn't inherently represent the state of the world. It takes IoT, says Red Hat's Gordon Haff, to represent physical objects more completely, automatically, timely and resistant to ...Continue Reading
How the equipment rental industry is rethinking maintenance with IoT
IoT is about more than just collecting real-time data. ThingTech's Tim Quinn explores how IoT enables predictive maintenance, and offers three key checkpoints to include as part of your predictive ...Continue Reading
Optimizing BLE for high-volume data
Building high-volume data IoT apps with Bluetooth and Bluetooth Low Energy isn't without its challenges. Exadel's Jonathan Fries and Travis Bolinger outline best practices of developing a BLE-based ...Continue Reading
How can a security automation tool help mitigate unknown threats?
Security automation tools help ease the deluge of alerts security teams receive, according to IEEE member Kayne McGladrey, letting them focus on more interesting aspects of IT security.Continue Reading
What are the challenges of building a smart agriculture system?
Building a smart agriculture system isn't as easy as placing some sensors in a field. IEEE senior member Shawn Chandler offers insights into the challenges and outlines tips for a successful deployment.Continue Reading
New IoT security laws and proposals are a good start, but we need to do more
While new IoT security laws and proposals are a step in the right direction toward securing IoT, there is a lot more to be done to ensure a safe connected environment, says GlobalSign's Nisarg Desai.Continue Reading
Machine learning is transforming brand protection
Counterfeit products and gray market imports stem from a lack of supply chain visibility. EVRYTHNG's Niall Murphy explains how mass-scale product digitization coupled with machine learning can ...Continue Reading
From push cart to smart cart: IoT offers control over ice cream carts
Distribution management is about to get a makeover thank to the internet of things. Autoplant's Venky Nayar offers insights into the benefits IoT has to offer ice cream carts, bringing efficiency ...Continue Reading
IoT can create serious security vulnerabilities, so what should you do?
IoT security is no joke; even the most innocuous connected device can threaten the entire network. Thales eSecurity's John Grimm discusses the risks and how PKI can help address them.Continue Reading
2019: Getting serious about IIoT security
As 2018 draws to a close, it's critical to make one major resolution for 2019: IIoT security. Greenwave Systems' Leon Hounshell discusses IIoT threats and why there is hope on the horizon for a ...Continue Reading
For smarter buildings, we need to bridge the IT-facilities divide
To get the most from IoT projects, we need to bridge the IT-facilities divide. ServiceChannel's Hugues Meyrath explains why and offers tips to help bring IT and facilities together.Continue Reading
Commercial IoT design challenges
Commercial IoT lies between consumer and industrial on the IoT spectrum and has unique design challenges. Rigado's Justin Rigling explains how to best design an edge system for commercial IoT.Continue Reading
IoT innovation brings complexity and risk: Learning from past mistakes
To secure IoT in the future, it is critical to learn from past IoT security mistakes. Comodo CA's Damon Kachur describes the kill chain for most cyberattacks and offerings insight into preventing ...Continue Reading
Take the bite out of industrial IoT device cost
Connecting IIoT devices while ensuring performance, coverage, scalability and security -- without breaking the bank -- requires the proper wireless standard. Keysight Technologies' Cheryl Ajluni ...Continue Reading
Getting to advanced-class IoT
To graduate from the 'AOL stage' of IoT to advanced-class IoT, we have to do work in three key areas, as well as ensure inherent trust. Dell Technologies' Jason Shepherd discusses how.Continue Reading
6 signs you need data science services
Data scientists provide the expertise needed to increase ROI from IoT deployments. Yet, as Bsquare's Dave McCarthy explains, filling the role internally can be a challenge. Learn how data science ...Continue Reading
The real reason why mobile operators fail to monetize IoT
Despite the touted benefits of IoT for mobile operators, few are reaping them. Openwave Mobility's Aman Brar offers three areas mobile operators should hone in on to successfully monetize IoT.Continue Reading
Coding ethics and accessibility into IoT
Sage's Klaus-Michael Vogelberg offers some guiding principles to help create accessible enterprise IoT technologies that place a premium on ethics and inclusion.Continue Reading
Professional services industry and IoT: The tech problems this industry faces
Most professional services organizations are stuck in the earliest stages of adopting IoT. MOBI's Josh Garrett explains why this industry is challenged by IoT.Continue Reading
Internet of threats: Managing risk and governing it
Huge strides toward addressing the ever-increasing need for IoT security regulation in the U.S. and globally have been taken over the past few months. Portnox's Ofer Amitai offers insight into ...Continue Reading
Deeper than deep sleep: Creating a zero-load microcontroller standby
Even in a standby state, microcontrollers siphon off some amount of power. Arrow Electronics' Jeremy S. Cook outlines how to turn your microcontroller into a zero-load standby.Continue Reading
Offloading smart car data: 5G can only stem the tide
By 2025, automated cars will create a $25 billion industry. However, to be successful, says ADRF's Greg Najjar, carriers must maintain a diverse network and work closely with auto manufacturers.Continue Reading
Three ways open source software makes IoT stronger
Open source software has never been more valuable than it is today. And its effect on IoT, says MOBI's Josh Garrett, allows advanced initiative investments to pay off in three disruptive ways.Continue Reading
Three predictive capabilities that move the needle for business
The ability to predict the future is powerful knowledge for any business. Bsquare's Dave McCarthy discusses three predictive capabilities to consider, as well as tips for getting started.Continue Reading
Protect against IoT device hacking
Instances of hacking IoT devices are making the news on a regular basis. Attack surfaces, updating, risk assessments and even involving trusted hackers are key to preventing the risk.Continue Reading
Enterprise opportunities in the adoption of consumer IoT
Consumer IoT presents an incredible opportunity for enterprises to engage experiences and create new sources of digital revenue. CSG International's Chad Dunavant discusses.Continue Reading
IoT for me: How the internet of things is personalizing medicine
While personalizing medicine with IoT in healthcare is revolutionizing experiences for doctors and patients alike, Deloitte's Helena Lisachuk explains why connected health is not without its ...Continue Reading
Paranoia and personas: The secure foundation for IoT
Security in IoT cannot be an afterthought. Gemalto's Gorav Arora explains why a healthy level of paranoia and using a persona-based approach are key to securing IoT.Continue Reading
Five tips for tackling the internet of shadowy things
The internet of shadowy things is a shady place to be – until the proper security measures are put in place. MobileIron's Ojas Rege offers tips for tackling IoT security challenges.Continue Reading
The inevitable fragmentation of IoT
Because the IoT market could mean any number of things, it will remain fragmented for a very long time, says Particle's Zach Supalla.Continue Reading
Mitigating enterprise IoT security risks
With a lack of cohesive standards, it's hard to see where to start when it comes to securing IoT. ThingStream's Neil Hamilton offers questions to consider when assessing security requirements of ...Continue Reading
Five ways adaptive diagnostics improves repair of mission-critical equipment
Bsquare's Dave McCarthy discusses five critical ways adaptive diagnostics is helping improve repair of mission-critical equipment.Continue Reading
Challenges and changes: A look at today's healthcare IoT
Why has healthcare struggled to make IoT safe? MOBI's Josh Garrett discusses two primary healthcare IoT challenges: device manufacturer priorities and network access security.Continue Reading
Preventing IoT data waste with the intelligent edge
Nearly 99% of all IoT data collected is wasted – but why? HarperDB's Stephen Goldberg explains why the data management industry must transform to solve the problem.Continue Reading
IoT devices and systems, are they 'gateways' to cyber events?
IoT growth is estimated to be tremendous. However, meeting the need for IoT security controls, says Cytellix's Brian Berger, will be a massive undertaking.Continue Reading
Connecting AI and IoT with blockchain-based platforms
Blockchain-based platforms are emerging as one of many options to securely connect artificial intelligence with IoT at the network edge.Continue Reading
Five key factors for building killer IoT visualizations and reports
Bsquare's Dave McCarthy offers five key factors to consider when building IoT reports and visualizations to make it easier to understand what you and your peers want to learn from your connected ...Continue Reading
IoT is revolutionizing natural disaster prediction
While natural disasters are outside the control of humans, IoT is being used to minimize the adversity resulting from natural occurrences and save lives.Continue Reading
Smart farming: The future of agriculture
Many pressures are being placed on today's farmers. MOBI's Josh Garrett explains how IoT and smart farming is helping solve these challenges.Continue Reading
Why IoT product design is not just the product team's job
Successful IoT product design must be a cross-functional effort spanning everyone from strategy to sales to support and beyond.Continue Reading
IoT privacy and security: It's time for the conversation to get real
IoT privacy and security advocates must discuss the real risks and offer solutions to a problem that is vague, threatening and of colossal scale.Continue Reading
The future of the IoT-enabled smart home
The IoT-enabled smart home of the future will use machine learning and artificial intelligence to run the dishwasher -- and end domestic violence.Continue Reading
Enterprise IoT security: Is the sky truly falling?
Horror stories in the consumer market have cast a shadow over the Internet of Things. Are enterprise IoT deployments even more at risk?Continue Reading
Sensors offer big data users an operational analytics edge
Big data analytics processes on data from sensors and log files can propel users to competitive advantages, but a lot of refining is required first.Continue Reading