• IoT Investments Rise, But IT Pros Harbor Security Concerns

    IoT Investments Rise, But IT Pros Harbor Security Concerns

    That segment cornered nearly 80% of the investment due to demand from IoT technologies, with North America dominating.However, IT departments can expect some pushback from business leaders who are wary about how to implement IoT technologies for the good of the business.
  • IoT Investments Rise, But IT Pros Harbor Security Concerns

    IoT Investments Rise, But IT Pros Harbor Security Concerns

    That segment cornered nearly 80% of the investment due to demand from IoT technologies, with North America dominating.However, IT departments can expect some pushback from business leaders who are wary about how to implement IoT technologies for the good of the business.
  • IoT Will Surpass Mobile Phones As Most Connected Devices

    IoT Will Surpass Mobile Phones As Most Connected Devices

    They are empowered By 2018, the number of IoT devices will surpass mobile phones in the greatest number of connected devices, so putting strains on mobile networks, according to new figures from Ericsson.The rapid growth and expansion also means that IoT devices are poised to surpass mobile phones as the largest category of connected devices in 2018, bringing with it a host of security and IT management challenges, according to new figures from the latest Ericsson Mobility Report.
  • IoT Will Surpass Mobile Phones As Most Connected Devices

    IoT Will Surpass Mobile Phones As Most Connected Devices

    They are empowered By 2018, the number of IoT devices will surpass mobile phones in the greatest number of connected devices, so putting strains on mobile networks, according to new figures from Ericsson.The rapid growth and expansion also means that IoT devices are poised to surpass mobile phones as the largest category of connected devices in 2018, bringing with it a host of security and IT management challenges, according to new figures from the latest Ericsson Mobility Report.
  • 10 IoT Security Best Practices For IT Pros

    10 IoT Security Best Practices For IT Pros

    IT professionals have to treat internet of things (IoT) vulnerabilities as they would vulnerabilities in databases or web applications.Any flaw may prove useful to compromise other systems on the network.
  • 10 IoT Security Best Practices For IT Pros

    10 IoT Security Best Practices For IT Pros

    IT professionals have to treat internet of things (IoT) vulnerabilities as they would vulnerabilities in databases or web applications.Any flaw may prove useful to compromise other systems on the network.
  • IoT Market Could Top $3 Trillion By 2025, Report Finds

    IoT Market Could Top $3 Trillion By 2025, Report Finds

    Even though a new study shows that spending on IoT could reach $3 trillion by 2025, security remains a concern.The report is based on data extracted from the research firm's IoT forecast database in August, finding total IoT revenue opportunity will be $3 trillion in 2025, a significant increase from the $750 billion in revenue the market saw in 2015.
  • IoT Market Could Top $3 Trillion By 2025, Report Finds

    IoT Market Could Top $3 Trillion By 2025, Report Finds

    Even though a new study shows that spending on IoT could reach $3 trillion by 2025, security remains a concern.The report is based on data extracted from the research firm's IoT forecast database in August, finding total IoT revenue opportunity will be $3 trillion in 2025, a significant increase from the $750 billion in revenue the market saw in 2015.
  • White House Spending $160M On 'Smart Cities,' IoT

    White House Spending $160M On 'Smart Cities,' IoT

    The White House wants cities to be able to communicate better, so it has a plan.Or, as the White House puts it, the "'Smart Cities Initiative' [.
  • IoT Revolution: IT Leading The Charge

    IoT Revolution: IT Leading The Charge

    Momentum behind the internet of things (IoT) market continues to grow, quickly morphing from IT buzz phrase to market-ready products and services, according a July report from IT research firm CompTIA.The research also revealed that 57% of companies believe their organization is well-equipped to manage the security component of IoT, which might be surprising considering how little is known about IoT security.
  • IoT Revolution: IT Leading The Charge

    IoT Revolution: IT Leading The Charge

    The top five perceived benefits of IoT adoption include cost savings from operational efficiencies, better streams of data to improve decision-making, staff productivity gains, better visibility and monitoring of assets throughout the organization, and improved customer experiences.Factors most likely to inhibit adoption of IoT technologies are upfront cost, lack of skilled workers with the necessary expertise, and ongoing fees and maintenance costs.
  • 11 Ways IT Professionals Can Make Sense of IoT Data

    11 Ways IT Professionals Can Make Sense of IoT Data

    8 billion connected "things" will be in use worldwide by 2020.Unlike some other technologies, IoT tends to have a multidimensional effect which not all companies are equipped to handle.
  • 11 Ways IT Professionals Can Make Sense of IoT Data

    11 Ways IT Professionals Can Make Sense of IoT Data

    8 billion connected "things" will be in use worldwide by 2020.Unlike some other technologies, IoT tends to have a multidimensional effect which not all companies are equipped to handle.
  • 6 IoT Innovations Making Cities Smarter

    6 IoT Innovations Making Cities Smarter

    Here is a look at 6 innovative uses of IoT in municipalities around the world.As a result, governments are turning to the internet of things (IoT) technologies to help make the world's metropolises run more efficiently.
  • IoT Success: Sharing Data, Analytics Fuels Growth

    IoT Success: Sharing Data, Analytics Fuels Growth

    The issues of IoT data and what to do with it is the focus on a recent report from the MIT Sloan Management Review titled, "Data Sharing and Analytics Drive Success With IoT.Of those surveyed, 26% who send IoT data to competitors reported that they have no trouble getting business value from IoT.
  • Scalable IoT Deployments Gain Momentum, IDC Finds

    Scalable IoT Deployments Gain Momentum, IDC Finds

    However, IDC finds that businesses are taking the next steps in creating a true IoT ecosystem a reality.In its Global IoT Decision Maker Survey, which is in its third year, IDC researchers found that 31.
  • ARM Boosts IoT Security With New Chips, Cloud Platform

    ARM Boosts IoT Security With New Chips, Cloud Platform

    As the US deals with the aftermath of last week's major cyberattack, the company that makes many of the chips embedded in the IoT devices used in the attack unveiled a new product intended to boost their security.But Mbed Cloud provides device manufacturers a crucial new tool: over-the-air software updates.
  • ARM on IoT Security: 'You Need to Worry About This'

    ARM on IoT Security: 'You Need to Worry About This'

    —According to security experts, the cyberattack that shut down large portions of the Internet in the US last week was extremely easy to predict.The most obvious solution, as it is for most things in the tech industry these days, lies in the cloud.
  • Smart Cities Can Get More Out Of IoT, Gartner Finds

    Smart Cities Can Get More Out Of IoT, Gartner Finds

    While many smart cities are using IoT for transportation issues, there's a host of other initiatives these urban centers should start to address with the technology.To that point, Gartner has predicted that many smart cities will start changing their key performance indicators (KPIs) in order to meet these goals.
  • Tech Giants: IoT Security Is Terrible, Here's How to Fix It

    Tech Giants: IoT Security Is Terrible, Here's How to Fix It

    The plan, published on Tuesday by the Broadband Internet Technical Advisory Group, argues for a major shift in the way device manufacturers approach security.They should be "restrictive instead of permissive," meaning instead of automatically allowing Internet traffic, in some cases without a password or firewall, IoT devices of the future should be inaccessible to inbound connections by default.