1. Articles in category: Internet of Things

    1-24 of 259 1 2 3 4 ... 9 10 11 »
    1. Cybersecurity Landscape: Putting Threats into the Context of Technology Infrastructure Trends

      Cybersecurity Landscape: Putting Threats into the Context of Technology Infrastructure Trends

      Organizations today are facing cybersecurity challenges that are multi-faceted, with a threat landscape that is rapidly evolving. Threats are intelligent, autonomous and increasingly difficult to detect, with new ones emerging and old ones returning with enhanced capabilities. Malicious actors work hard to keep innovating, and their persistence pays off.

      Read Full Article
    2. 10 Principles for Leading the Next Industrial Revolution

      10 Principles for Leading the Next Industrial Revolution

      How can you prepare your company -- whether it is large or small -- to play a leading role in the next industrial revolution, the one that is caused by large-scale digital technology? How can you take advantage of your existing strengths while developing the digital prowess and personal skill that you need? 10 principles can help senior executives navigate the opportunities and uncertainties.

      Read Full Article
    3. 12M connected cars gives General Motors a massive IoT fleet

      12M connected cars gives General Motors a massive IoT fleet

      Steve Schwinke has worked on OnStar at GM in a variety of roles for some 20 years, watching the service evolve from a customer benefit into a full fledged connectivity mesh that helps the automotive giant improve its vehicles.  Now Director of Advanced Development, Schwinke recently talked to Network World Editor in Chief John Dix about OnStar as an IoT platform.

      How has OnStar evolved over the years?

      Read Full Article
      Mentions: Network World
    4. African telcos prioritise emerging opportunity to stay afloat

      African telcos prioritise emerging opportunity to stay afloat

      Telcos across Africa are focusing on effectively maximising the return on investment from data and monetising emerging opportunities such as the Internet of Things (IoT) to remain competitive and afloat.

      Read Full Article
      Mentions: Services SDN
    5. Robots are just as plagued by security vulnerabilities as IoT devices

      Robots are just as plagued by security vulnerabilities as IoT devices

      An analysis of robots used in homes, businesses and industrial installations has revealed many of the same basic weaknesses that are common in IoT devices, raising questions about security implications for human safety. The robotics industry has already seen significant growth in recent years and will only further accelerate.

      Read Full Article
      Mentions: Security
    6. IDG Contributor Network: AI as advisor, not magician

      IDG Contributor Network: AI as advisor, not magician

      In 2009, Google introduced Gmail Autopilot.

      “As more and more everyday communications take place over email, lots of people have complained about how hard it is to read and respond to every message. This is because they actually read and respond to all their messages.”

      Autopilot replied to email as if it were actually you. It included an authenticity control panel to adjust for "tone, typo propensity, and preferred punctuation."

      Read Full Article
      Mentions: Facebook Microsoft
    7. IT priorities 2017: A mix of forward-looking and traditional tech

      IT priorities 2017: A mix of forward-looking and traditional tech

      Our ninth annual IT Priorities Survey indicates data centers will address upgrades and infrastructure improvements and take on new and emerging technologies.

      We asked how IT spends most of their time, with the following responses:  general IT management (cited by 27% of respondents), security (23%) and networking (22%) were the most cited activities, but they were followed by a fairly bunched up cluster that ranged from application development (19%) to the trending DevOps (8%).

      Read Full Article
    8. The 7 security threats to technology that scare experts the most

      The 7 security threats to technology that scare experts the most

      What happens if a bad actor turns off your heat in the middle of winter, then demands $1,000 to turn it back on? Or even holds a small city’s power for ransom? Those kinds of attacks to personal, corporate, and infrastructure technology were among the top concerns for security experts from the SANS Institute, who spoke Wednesday during the RSA conference in San Francisco.

      Read Full Article
      Mentions: Security
    9. IoT network builders sign up partners for small devices

      IoT network builders sign up partners for small devices

      There’s a land grab happening now between networks to link small, battery-powered IoT devices.

      If countless forecasts are true, there will soon be a lot more tiny, low-power devices like sensors out in the world. The 2G networks that connected many of these to the cloud are gradually going away and newer, more specialized networks are emerging. Vendors are pushing different LPWANs (low-power, wide-area networks) to do the job and trying to get more users and network operators on their side.

      Read Full Article
    10. IDG Contributor Network: Clouds may not reign supreme

      IDG Contributor Network: Clouds may not reign supreme

      The funny thing about pendulums is that they love to swing. There are plenty of examples, from politics to nutrition, but computing cycles also illustrate this cycle.

      The mainframe computer was a centralized model, with access through dumb terminals. PCs enabled distributed client/server computing. Now we are swinging back to centralized computing, with dumb smartphones connecting back to robust cloud-services. Enterprises are shuttering their data centers and moving to cloud services.

      Most of yesterday’s applications (CRM, ERP and UC) are moving toward the cloud. But the swing back to a distributed model is inevitable. The Internet of Things ...

      Read Full Article
    11. Old networks can hobble IoT, even in tech paradise

      Old networks can hobble IoT, even in tech paradise

      IoT isn’t all brand-new, cutting-edge technology. In fact, some of it’s already suffering through painful upgrade cycles.

      A case in point is the system that tells transit passengers in the tech hub of San Francisco when the next train or bus will arrive, which recently began sending out wildly inaccurate forecasts on many lines.

      Why? Because most trains and buses had been communicating with AT&T’s 2G network, which was decommissioned on Jan. 1.

      Read Full Article
    12. Turning IoT hype into reality

      Turning IoT hype into reality

      Turning IoT hype into reality Turning IoT hype into reality Only through multilayer architectures, new hybrid networking approaches, and real cross-industry collaboration can enterprises make the most of IoT Published: October 31, 2016 6:17 AM Gartner analysts forecast that 6.4 billion connected ‘things’ will be in use worldwide in 2016, up 30% from 2015, and reaching close to 21 billion by 2020.

      Read Full Article
      Mentions: Mobility
    13. Gartner sees 2.9 percent growth in IT spending in 2017

      Gartner sees 2.9 percent growth in IT spending in 2017

      Worldwide IT spending should rebound in 2017 with a 2.9 percent increase over 2016, after a slight decrease this year, according to Gartner projections.

      Spending on software and IT services should drive the 2017 growth in global IT spending to US$3.49 trillion, the market research group said Wednesday.

      Read Full Article
      Mentions: Services
    14. IoT security guidance emerges

      IoT security guidance emerges

      More than a year ago, an eye-opening RAND study on cybersecurity comprehensively explored just how vulnerable the Internet of Things (IoT) is and was going to be.

      Afterthought-style patch-on-patch security, as well as significant vulnerability risks involved with slapping internet connectivity on previously non-connected objects, were among the startling findings and predictions in that report.

      Read Full Article
      Mentions: Security
    15. Wi-Fi connectivity the tip of the technology iceberg for K-12 schools

      Wi-Fi connectivity the tip of the technology iceberg for K-12 schools

      It’s been about two years since the FCC modernized E-Rate, which is the funding program for K-12 schools to buy technology. Prior to the revamp of the program, E-Rate funded a number of legacy technologies, such as modems, broadband and pagers. E-Rate has now shifted to helping schools build better in-building experiences, with much of the funding directed at Wi-Fi.

      Read Full Article
    16. The race to secure the smart connected future

      The race to secure the smart connected future

      Of the many challenges which stand in the way of digital transformation today, one of the most pressing is security, and failure to address cybersecurity could result in a slowdown in the adoption of smart, digital practices, according to Wael Mohamed, President and COO of Trend Micro. The security threat landscape is changing, Mohamed noted, both in terms of the range and number of systems that are potentially at risk, and the severity of the threats.

      Read Full Article
      Mentions: Security
    1-24 of 259 1 2 3 4 ... 9 10 11 »
  1. Unified Access from Alcatel-Lucent Enterprise = seamless user experience
  2. Categories

    1. Industries:

      Education, Government, Healthcare, Hospitality, Manufacturing, Small Business, Transportation
    2. Technology Trends:

      Agile IT, Automation, Big Data, Business Intelligence & Analytics, Business Transformation, BYOD, Consumerization of IT, Digital Business, Digital Collaboration, Digital Transformation, Everything as a Service, Industry Reports, Internet of Things, IP Video, IT & Technology as a Service, IT Simplification, Mobility, Personal Cloud, Shift to Consumption Models, Tech Terms & Acronyms, Technology Evolution, The role of SIP, User Experience, WebRTC
    3. Business Strategies:

      Business Process, Business Strategy, Customer Service, Financial Models, IT as a Service, IT Management, IT Service & Support, Knowledge Management, Marketing & Sales
    4. ALE Technology Strategies:

      Application Fluent Network, Cloud, Convergence, Networking as a service, SDN, Security, Unified Access, Virtualization
    5. Technologies:

      DECT, Ethernet, Intelligent Fabric, IPv6, Link Aggregation, Network Access Control, Power over Ethernet, Smart Analytics, SPB, uNP, Virtual Chassis, Virtual Machine, Virtual Network Profiles, Voice over IP, Wireless LAN
    6. Solutions:

      Business Telephony, Cloud Communication, Customer Service, Data Center, Hardened Ethernet, Mobile Campus, Mobility, Network on Demand, Small & Medium Business, Unified Communications
  3. Popular Articles