System News
 1 2 3 4 5 6 7 8 9 10 11 next
Articles for the keywords: IoT
19 Mar 2017 IBM Cloud Meetup - Learn About Blockchain! [61628]
Tuesday, March 21st, 2017: 6:30 PM to 8:30 PM

Cendyn Spaces, in the Atrium - Boca Raton

Back by popular demand, our guest speaker this month will be Vasudev Bhat, who will speak about blockchain and how it fits into the IBM Cloud technology portfolio.

Vas is a leader within IBM's Big Data Analytics and IoT group that advises clients on business transformation by leveraging technologies in cloud, big data, analytics and IoT space. He has a Masters Degree in Computer Engineering from North Carolina State.

Ed Janeczek, Angie Zuniga
(Get More Information . .) open to premium members only

19 Mar 2017 Top Ten Articles for last few Issues [61429]
Vol 229 Issues 1 and 2; Vol 228 Issues 1, 2, 3 and 4; Vol 227 Issue 3 and 4

We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

  • When Bad Things Happen To Good Clouds: Why You Need A Recovery Plan
  • DevOps Has Reached Critical Mass, CIOs Need To Get On Board
  • Digital Transformation, Innovation And Security
  • How Bitcoin Is Set To Crush Other Currency In 2017
  • Industry Speaks Out in Aftermath of Bitcoin ETF Rejection
  • How CIOs Need To Adapt Or Die In The World Of Digital Transformation
  • Like HGST/WD, Seagate With 12TB Enterprise 3.5-Inch Helium HDD
  • Can Driverless Cars Eliminate Traffic?
  • Government Applications Of IoT
  • CIO Quick Takes: What's Your Strategic Focus?

The longer version of this article has list of top ten articles for the last 8 weeks.
(Get More Information . .) open to premium members only

19 Mar 2017 IoT Development And Implementation: Managing Enterprise Security [61448]
SearchSecurity, March 9th, 2017

"The CSA's guidelines for secure IoT development can give enterprises an idea of how to evaluate IoT products. Expert Nick Lewis explains the steps enterprises should take...

Software and hardware companies often trade off security in favor of the other aspects of running their business. Internet-of-things developers are particularly susceptible to making these tradeoffs because of financial pressures to keep the cost of their products low. Each manufacturer makes these decisions for itself during IoT development, but enterprises and users are the ones affected by their insecure IoT devices. There is a long history of non traditional IT systems being insecure, and as IoT devices deployment grows, the more critical the problem becomes..." - SearchSecurity
(Get More Information . .) open to premium members only

19 Mar 2017 Government Applications Of IoT [61443]
insideBIGDATA, March 10th, 2017

"The insideBIGDATA Guide to Data Analytics in Government provides an in-depth overview of the use of data analytics technology in the public sector," reports Daniel Gutierrez in insideBIGDATA.

"Focus is given to how data analytics is being used in the government setting with a number of high-profile use case examples, how the Internet-of-Things is taking a firm hold in helping government agencies collect and find insights in a broadening number of data sources, how government sponsored healthcare and life sciences are expanding, as well as how cybersecurity and data analytics are helping to secure government applications..."
(Get More Information . .) open to premium members only

17 Mar 2017 IoT And The Resurgence Of Public Key Infrastructure [61499]
Help Net Security, March 17th, 2017

"With the digital revolution in full swing, security methods and models need to be re-evaluated to better address both the changing nature of enterprise architectures and processes. While the proliferation of mobile devices and analytics has vastly improved user experience over the past several years, the challenges of user-to-things security and securing a greatly expanded edge architecture remain unsolved.

One approach is making its resurgence as a result of the IoT and cloud - public key infrastructure (PKI) - and has the potential to close these security gaps for today's digital businesses..."
(Get More Information . .) open to premium members only

 
 1 2 3 4 5 6 7 8 9 10 11 next






!-- end archive_section.tpl -->