dcsimg

Internet of Things

Articles

Three Big Takeaways from Lenovo Accelerate: IoT, AR/VR and Massive PC Innovation

The advantages of Lenovo are not well known; it is more likely to be forced to compete on price. This makes it an interesting bargain for the informed customer. More >

IoT Security: Still Bad

The popularity and reliance on IoT has been trending upward for quite some time now, but despite the dire warnings and the raised awareness about targeted attacks, IoT security has flatlined. More >

Apps That Will Drive the IoT

In the end, it is the applications that will make or break the IoT, not the sensors or analytics or even the artificial intelligence. More >

Gauging the IoT Fear Factor

The enterprise still has a few things to figure out on the IoT, particularly when it comes to many of its anticipated use cases. More >

The IoT in 2019 and Beyond

Once the IoT becomes a service- and revenue-generator in its own right, rather than an extension of legacy infrastructure, we will safely be able to say that we live in a truly connected universe. More >

BlackBerry and Cylance: Moving Aggressively to Secure the Coming IoT World

BlackBerry is working hard to become the go-to vendor for IoT security, including with a Cylance acquisition. More >

More Articles >

Interviews

Startup Develops Wearable Aimed at Preventing Assaults on Women

The wearable device can be activated to sound an alarm and send out a location-based text alert in the event of an attempted assault.

More >

Where Is the Will to Use GPS Technology to Help Protect Kids?

There isn’t enough consumer interest for GPS technology to help safeguard kids.

More >

Appster Exec Shares Insights on Smartwatch Prospects

An Appster executive chimes in on smartwatches and how they might fare in the market. He also discusses how apps and interconnectivity will contribute to their success or demise.

More >

More Interviews >

Most Popular Features

Time to Set Realistic AI Expectations Is Now

The gap between what senior business execs believe can be accomplished by investing in AI and what can be really accomplished using AI has widened to the point where a backlash against AI in the enterprise may be all but inevitable.

Now Comes the Hard Part of Cloud Computing

Given all the complexities involved, it is little wonder that so many organizations have found moving to the cloud a much bigger challenge than they might have originally anticipated.

Why Security Needs to Automate, Too

The same tools being used to augment the development and operations side of the house can also be applied to automation in security.

Editor's Choice
Related IT Downloads

Healthcare2 Health Attitude: Unraveling and Solving the Complexities of Healthcare

In this excerpt, Dr. John R. Patrick explores how cultural attitudes toward consumer-initiated health care are changing an...

Global13-190x128.jpg Considerations for Identity Management in Public Safety Networks

This document analyzes approaches to identity management for public safety networks in an effort to assist individuals dev...

Mobile45 Vetting the Security of Mobile Applications

The purpose of this document is to help organizations understand the process for vetting the security of mobile applicatio...

mobile30-290x195 Guidelines on Mobile Device Forensics

This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to fore...

More IT Downloads>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.