We are waiting for the same kind of moment that Microsoft and IBM made when they partnered on DOS and the modern PC was born, to define the self-driving car segment. More >
As connected devices increase in popularity, they become a more attractive target to hackers and cybercriminals, and since cybercriminals are turning to ransomware as their attack of choice, we have to anticipate that the bad guys will use it for IoT attacks. More >
The IoT is so at risk for ransomware because of three particular areas: the growth (and growing pains) of IoT, the evolution of ransomware, and end users who aren’t aware of the risks. More >
The Intel Responsive Retail Platform (RRP) is an effort by Intel to create what amounts to a reference architecture for Internet of Things (IoT) applications in the retail sector. More >
Medical devices present unique situations because attacking them is literally a matter of life and death. But they are still IoT devices, and that opens them to other types of cybersecurity attacks. More >
SAP's stated goal is to get organizations down the IoT path faster via a three-month engagement based on a fixed promotional price encompassing both SAP products and services. More >
The wearable device can be activated to sound an alarm and send out a location-based text alert in the event of an attempted assault.More >
There isn’t enough consumer interest for GPS technology to help safeguard kids.More >
An Appster executive chimes in on smartwatches and how they might fare in the market. He also discusses how apps and interconnectivity will contribute to their success or demise.More >
Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.
The Intel Atom processor E3900 series employs 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.
Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.
Shadow IT can only remain in the shadows if IT allows it. Providing greater autonomy to users, developers, business units and tech admins will produce a more dynamic, flexible approach to workflow management.More >
In this excerpt, Dr. John R. Patrick explores how cultural attitudes toward consumer-initiated health care are changing an...
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...
The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...
This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...