If the IoT is going to get off the ground at all, the data community as a whole needs to come up with some pretty powerful standards, and quick. More >
Adoption of IoT applications as a service is being driven primarily by line of business executives trying to address specific needs as quickly as possible. More >
News this week included coherent optics, IoT Security Group, virtualized networks and 5G tests. More >
To drive more adoption of its cloud service, SAP is now committing to delivering quarterly updates to its ERP cloud service, as well as several other updates. More >
In addition to sheer numbers, the IoT must go everywhere. This includes the gaps between coverage in rural areas, unsettled areas, and over the seven oceans (and assorted seas, rivers and lakes) of the world. More >
The fear about IoT security is that elements are being rushed out quickly before security technology is baked in. More >
The wearable device can be activated to sound an alarm and send out a location-based text alert in the event of an attempted assault.More >
There isn’t enough consumer interest for GPS technology to help safeguard kids.More >
An Appster executive chimes in on smartwatches and how they might fare in the market. He also discusses how apps and interconnectivity will contribute to their success or demise.More >
Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.
The Intel Atom processor E3900 series employs 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.
Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.
Shadow IT can only remain in the shadows if IT allows it. Providing greater autonomy to users, developers, business units and tech admins will produce a more dynamic, flexible approach to workflow management.More >
In this excerpt, Dr. John R. Patrick explores how cultural attitudes toward consumer-initiated health care are changing an...
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...
The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...
This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...