The Internet of Things: Coming to a network near you
When people talk about the Internet of Things (IoT), the most common examples are smart cars, IP-addressable washing machines and Internet-connected nanny cams.
When people talk about the Internet of Things (IoT), the most common examples are smart cars, IP-addressable washing machines and Internet-connected nanny cams.
Chances are you've heard about the Internet of Things (IoT)—or you will soon enough. The term carries a number of definitions. But in general, the IoT refers to uniquely identifiable objects, such as corporate assets or consumer goods, and their virtual representations in an Internet-like structure.
Failed expectations, increased costs, unnecessary legal risks -- going blind into a big data project doesn’t pay
Social media mania is having a huge impact on traditional business applications. Companies that are leveraging this trend are seeing significant benefits, including collaboration and data sharing in ways they've not experienced before.
Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet
Radio-frequency identification (RFID) technology has shown promise as a way to monitor the movement and even the condition of all sorts of objects.
If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them
The future workforce will look somewhat different than the current workforce, according to Alan Ross, senior principal engineer at Intel.
Like many other companies, processor manufacturer, Intel Corporation, is having to evolve its information security focus to meet the changes underway in the technology landscape—particularly with the rapid growth of mobile devices and applications and the rise in cloud computing services.
If you're CIO at a large enterprise -- or a small one, for that matter -- chances are good that you're seeing a steady rise in the number of employees using smartphones and tablets at work.
Intrusion prevention systems — security tools designed to stop problems even before they crop up — have emerged as indispensable components of defense-in-depth security strategies.
It’s hard enough to secure resources when they are bound to a physical box, but the game changes when servers are virtualized and start to move around, not only to other servers in the data center, but also to off-premise cloud facilities.
It's easy to switch to iOS or even Android, no matter what type of company you are
Unified communications (UC) technology has garnered a fair amount of attention, much of it due to vendors touting their UC offerings as the answer to problems workers have keeping in touch with colleagues, business partners and customers in a highly frenetic, increasingly mobile business world.
As vehicles offer an ever-growing number of digital features, they could present several security threats--unless automakers manage these technologies effectively.