ISPs want to be able to sell personal user data and are two steps away from having that happen: passage by the House of Representatives and President Trump’s signature. More >
Bsquare announced a suite of applications to manage IoT endpoints that can be deployed on either Amazon Web Services or Microsoft Azure. More >
The enterprise is focused on putting IoT infrastructure in place and getting it to function in a reasonably cohesive fashion. But it won’t be long before data volumes mount and the pressure will be on. More >
The Verizon Data Breach Digest highlights 16 case studies based on real-world data breach response activities and the lessons learned by the Verizon RISK Team. More >
MapR Edge makes it possible to deploy an instance of a converged data platform based on a distribution of Hadoop at the edge of the IoT network. More >
We must discuss the ramification to businesses and their employees and customers: the IoT security risks. More >
The wearable device can be activated to sound an alarm and send out a location-based text alert in the event of an attempted assault.More >
There isn’t enough consumer interest for GPS technology to help safeguard kids.More >
An Appster executive chimes in on smartwatches and how they might fare in the market. He also discusses how apps and interconnectivity will contribute to their success or demise.More >
Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.
The Intel Atom processor E3900 series employs 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.
Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.
A large majority of security operations centers, or SOCs, have not attained the requisite level of maturity to enable them to adequately protect their organizations against cyberattacks.More >
In this excerpt, Dr. John R. Patrick explores how cultural attitudes toward consumer-initiated health care are changing an...
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...
The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...
This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...