Internet of Things


IoT Devices Used as Botnets

The Internet of Things (IoT) is under attack, and really, it was only a matter of time. More >

The IoT Is Not Getting Any Safer

People are discussing and debating IoT security from both the conceptual and product perspectives. More >

2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business. More >

Data Acceleration: No Longer a Luxury

Many platform developers have turned their attention to data acceleration of late. More >

Fixing the IoT Problem: Stringify

Regardless of whether you use Stringify to create your IoT solution, it forms a good benchmark for where the market wants to go and how far most still need to go to realize the IoT promise. More >

Stolen Passwords Used on Internet of Things Devices

Have you ever wondered what cybercriminals do with all those passwords and usernames they gather after a data breach like the one Yahoo suffered? More >

More Articles >


Startup Develops Wearable Aimed at Preventing Assaults on Women

The wearable device can be activated to sound an alarm and send out a location-based text alert in the event of an attempted assault.

More >

Where Is the Will to Use GPS Technology to Help Protect Kids?

There isn’t enough consumer interest for GPS technology to help safeguard kids.

More >

Appster Exec Shares Insights on Smartwatch Prospects

An Appster executive chimes in on smartwatches and how they might fare in the market. He also discusses how apps and interconnectivity will contribute to their success or demise.

More >

More Interviews >

Most Popular Features

Internet of Things Personified: Integration and Automation

The real value that the Internet of Things brings is at the intersection of gathering data and leveraging it.

Politics and Social Media

Even if you don’t have a computer, the nightly news bombards you with tweets from the candidates and anyone who has an opinion about the candidates.

6 Strategies for Being Successful with Social Collaboration

Enterprise social collaboration solutions are most successful when they contribute to business value and benefits that address company goals.

Editor's Choice
Related IT Downloads

Healthcare2 Health Attitude: Unraveling and Solving the Complexities of Healthcare

In this excerpt, Dr. John R. Patrick explores how cultural attitudes toward consumer-initiated health care are changing an...

Global13-190x128.jpg Considerations for Identity Management in Public Safety Networks

This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...

Mobile45 Vetting the Security of Mobile Applications

The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...

mobile30-290x195 Guidelines on Mobile Device Forensics

This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.