News this week included brakes on an IoT security study, wearables selling well, in-flight voice calls, and refunds for victims of telecom bill cramming. More >
It is important to remember that while this cloud-based IoT ecosystem is where many providers want to take the enterprise, it is still unclear how far the enterprise is willing to follow. More >
Ransom Denial of Service, or RDoS attacks, as well as the more commonly known ransomware attacks, are happening every day, and are targeting IoT devices and networks. More >
With several announcements, Aruba moved to secure the networks that tie together Internet of Things (IoT) environments. More >
We know that the best approach to IoT security is to develop devices with security baked in. However, that isn’t going to happen overnight. More >
IBM’s IoT and Watson expertise will combine to create a new dedicated IBM consulting practice consisting of over 1,500 IBM employees. More >
The wearable device can be activated to sound an alarm and send out a location-based text alert in the event of an attempted assault.More >
There isn’t enough consumer interest for GPS technology to help safeguard kids.More >
An Appster executive chimes in on smartwatches and how they might fare in the market. He also discusses how apps and interconnectivity will contribute to their success or demise.More >
Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.
The Intel Atom processor E3900 series employs 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.
Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.
In one version of the future, the IoT will collapse into a series of unconnected or semi-connected islands with varying degrees of functionality and security.More >
In this excerpt, Dr. John R. Patrick explores how cultural attitudes toward consumer-initiated health care are changing an...
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...
The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...
This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...