Search Results

Search results for: environment

What does the IoT mean for customer experience design?

In days of old, the most efficient way to get online was stare at your computer screen.  With the advent of mobile, the next generation of apps was designed to suit a much smaller form factor and to handle potential issues that came with mobile such as slow connectivity or interruptions, writes Frank Palermo, the executive vice president of global digital solutions at Virtusa. (more…)

Read more

April 18, 2016

Posted by: George Malim

IoT isn’t designed with safety in mind

The Internet of Things (IoT) has the potential to rapidly transform the workplace, writes Simon Heron, the CTO of Redscan. Companies that are investing in new technologies have started to experience improvements in business efficiency and competitiveness. As the IoT expands, protecting a company’s data and intellectual property (IP) will become more important than ever. (more…)

Read more

April 11, 2016

Posted by: George Malim

IT for IoT: Plan and manage bandwidth and network capacity

From flat networks where everything was interconnected, to hierarchical models with enhanced security, to a borderless world – enterprise network architecture has certainly evolved, writes Leon Adato, the head geek at SolarWinds. Though, one network metric has remained a priority despite this evolution – bandwidth. (more…)

Read more

April 8, 2016

Posted by: George Malim

New software development practices key to IoT success

Many businesses are reaping the rewards of the connectivity that IoT provides, while many more are rapidly developing their plans to join this revolution, writes Mark Warren, the product marketing director of Perforce Software. As they do so, they are starting to appreciate the practical challenges that IoT brings: Getting products to market quickly, changing standards – or no standards, rapidly improving hardware, addressing security issues and, especially, coping with the vast amounts of data being generated. All of these challenges are putting a strain on traditional software product development and deployment processes. (more…)

Read more

April 5, 2016

Posted by: George Malim

Device Management Survey reveals risk to IoT business growth

What do 50+ companies deploying connected devices believe is key to delivering ambitious IoT growth expectations?

(more…)

Read more

April 4, 2016

Posted by: IoT global network

oneM2M

The purpose and goal of oneM2M is to develop technical specifications which address the need for a common M2M service layer that can be readily embedded within various hardware and software, and relied upon to connect myriad devices in the field with M2M application servers worldwide. (more…)

Read more

March 30, 2016

Posted by: IoT global network

ISO

The International Organization for Standardization (ISO) is an independent, non-governmental international organisation with a membership of 162 national standards bodies. (more…)

Read more

Posted by: IoT global network

IEEE

IEEE’s core purpose is to foster technological innovation and excellence for the benefit of humanity. IEEE has more than 426,000 members in more than 160 countries, in excess of 50% of whom are from outside the United States. (more…)

Read more

Posted by: IoT global network

ETSI

ETSI, the European Telecommunications Standards Institute, is involved in standardising many of the technologies that work together to connect things in the Internet of Things (IoT). (more…)

Read more

Posted by: IoT global network

Secure enterprise networks in the age of BYOD and the IoT

When something is invisible, exercise caution and do all you can to reveal it and render it harmless. That’s the lesson the human race has learned from infectious micro-organisms—in many cases, the hard way. In enterprises today, writes Rob Greer, the chief marketing officer and senior vice president of products at ForeScout Technologies, where devices are constantly gaining access to networks sight unseen, fear of the invisible is certainly justifiable. But the good news is, IT administrators can put those fears to rest with currently available network access technologies that can largely “disinfect” the environment by making the invisible visible. (more…)

Read more

Posted by: George Malim