1. AAA security among 5 enterprise technologies that will shake things up in 2017

    AAA security among 5 enterprise technologies that will shake things up in 2017

    You think you have your hands full as an IT pro now? Just wait until blockchain, IoT, augmented and virtual reality, and these other technologies really start to take hold in 2017. Yes, yes, we know – it’s one of those long-standing tech industry jokes, like “the year of the Linux desktop” and “Java security.” But 2017 really could be the year that all the hub-bub and hype around the Internet of Things comes home to roost.

    Read Full Article
  1. Register to our Newsletter

    Enter your e-mail address for receive the top headlines.

     

    This newsletter aggregates all the latest IoT news from around the world. Sign up for a daily or a weekly newsletter here.

  2. Latest Tweets

  3. Categories

    1. Curation Categories:

      All News, Big Data News, Cellular IoT, Data, Enterprise, Enterprise Solutions, Fragmentation, Healthcare, Insurance, IoT Security News, Monetizing IoT, Professional Services, Public Spaces, Retail, Security, Transport
  4. Monetizing IoT
  5. Quotes

    1. This may sound relatively aggressive, but the conversations I'm having with the industry and some surveys that we've run talking to IT decision makers show that there's a really strong interest around augmented reality.
    2. I really believe augmented reality is going to have the same type of impact on businesses as the PC did all those years ago.
    3. The single most important things customers can do to protect the data center is set up a whitelist of who has access to what, but it is one of the most difficult tasks to implement.
    4. Experts may help develop, train, and improve the solution systems, but they will not manually generate warnings, guide the system, or filter warnings before they are delivered to the [IARPA] Team. The performer produced warnings must be machine-generated and submitted automatically….
    5. Blocks are always agreed on, and each one has an encrypted representation of everything that happened before, so you can tell it's authentic. You can't tamper with the chain at any point.
  6. Authors