Manage
Learn to apply best practices and optimize your operations.
Manage
Learn to apply best practices and optimize your operations.
How to build a successful IoT strategy in 10 steps
IoT is key to digital transformation, offering improved efficiency, cost reduction and enhanced customer experience. Success requires strategy and secure execution. Continue Reading
10 top design principles of IoT
IoT products require a lot of collaboration and expertise. During the design process, be sure to consider UX, security features and data management measures. Continue Reading
What is IoT connectivity? 8 types explained
IoT connectivity enables devices to communicate, share data and receive commands using various network types and protocols tailored to power, range and performance needs. Continue Reading
-
How IoT data collection works
IoT data collection enables organizations to constantly gather and analyze physical measurements, location data and operational metrics with internet-connected sensors and devices. Continue Reading
Operational technology vs. information technology explained
OT and IT have long lumbered on independently, but technical developments -- particularly IoT -- are compelling the convergence of these two disparate disciplines. Continue Reading
IoMT device tips for healthcare IT departments
Healthcare providers' IT departments must keep an ever-expanding range of IoT devices powered on, connected and secure. Challenges abound, but they are surmountable.Continue Reading
Factors to consider when securing industrial IoT networks
Industrial IoT networks differ from enterprise data networks. Keeping them safe requires a security strategy that's specifically crafted for legacy and new devices and sensors.Continue Reading
How IoT helps support sustainable manufacturing
Implementing IoT can help manufacturers with sustainability goals stay on track through monitoring and automation. IoT can also help with compliance.Continue Reading
5 considerations for selecting rugged devices for IoT
End users who work outside of traditional office settings often need ruggedized devices. Organizations should tailor devices to the environment and users' needs.Continue Reading
Use metadata for IoT data organization
Metadata makes IoT data more useful to an organization because it helps organize the data, simplifies data store management and encourages more analysis.Continue Reading
-
Testing IoT devices helps ensure deployment success
The security and effectiveness of IoT deployments start with ensuring that its pieces work as they should. For hardware, that means testing, verifying and validating devices.Continue Reading
5 IoT device tests you should be running
Ensuring that IoT devices are in good working order is vital. That means testing them before, during and after deployment to ensure they're working properly and as intended.Continue Reading
5 IoT metrics to track
Tracking IoT metrics and KPIs is important to the health of your deployment, but which ones should you track? Latency and active users are two common denominators.Continue Reading
Use device reliability engineering to derisk IoT products
Device reliability engineering uses over-the-air updates, performance metrics and remote debugging to help ensure that a product can run as smoothly as possible.Continue Reading
4 essential steps to IoT device development
For a successful IoT device, companies must avoid designing for the short term, outdated workflows, untested feature rollouts and retroactive security measures.Continue Reading
How healthcare facilities can use IoT to bolster security
As hospitals and clinics implement physical security innovations with connected IoT devices, they must also establish protocols to enforce cybersecurity for such systems.Continue Reading
Effective IoT security requires collaboration and clarity
IoT brings benefits to business, government and consumers. But those features shouldn't come at the cost of security or less privacy for its users.Continue Reading
Polyglot developers can tackle all IoT code issues
IoT code and romance languages are similar: Once you know one, you can pick up parts of others. Development teams can benefit from code generalists and specialists.Continue Reading
Top ways to strengthen protection for IoT devices in OT
To ensure IoT devices that support OT aren't compromised from cyber attacks, IT teams can implement zero-trust security, digital twins and supply chain measures.Continue Reading
IoT data collection: When time is of the essence
Data collection is an essential part of IoT deployments, but it must also be useful and accurate to operations. Using nanoseconds for events ensures no anomaly is undetected.Continue Reading
Top 5 considerations of IoT Wi-Fi interoperability testing
Wi-Fi interoperability is an essential component of successful IoT device design. Avoid operational errors and test security modes, radio options and 802.11 functionality.Continue Reading
IoT ethics must factor into privacy and security discussions
With the adoption of IoT devices, consumers voluntarily trade privacy for the convenience of instant connectivity. Organizations must consider the ethics of their data collection.Continue Reading
Considerations to make an IoT web app
Despite the popularity of mobile apps, organizations may opt for IoT web apps for their ease of use and capability of handling and processing a large amount of data.Continue Reading
Fortify security with IoT data protection strategies
It's only a matter of time before attackers target IoT data. Organizations must be ready with IoT data security best practices, including data encryption and visibility.Continue Reading
Shield endpoints with IoT device security best practices
IT administrators must implement best practices, including segmenting the network, encrypting data and shutting down unused devices to ensure the security of IoT devices.Continue Reading
6 IoT security layers to shape the ultimate defense strategy
IT administrators can divide and conquer their defense strategy with IoT security layers that ensure data protection from its generation in devices to its storage in the cloud.Continue Reading
Reinforce IoT cloud security in 6 steps
Cloud services can accommodate the constant flow of IoT data, but IT admins must also be ready to work with providers to effectively defend their fortress in the cloud.Continue Reading
Bolster physical defenses with IoT hardware security
IT admins must take IoT hardware security just as seriously as other protective measures in their network because attackers can also easily physically access remote devices.Continue Reading
Tackle IoT application security threats and vulnerabilities
By taking action to secure IoT applications and including them in a security strategy, IT admins can close off a tempting entry point to criminals.Continue Reading
Top 5 benefits of edge computing for businesses
By bringing compute and storage closer to where the data is collected, edge computing provides many benefits to organizations, including increased speed and reliability.Continue Reading
IoT segmentation secures device fleets and broader network
In the age of IoT, IT administrators must isolate devices, such as temperature sensors or surveillance cameras, from other applications and servers to keep their network secure.Continue Reading
Transforming buildings to be smart and sustainable
To meet greenhouse gas reduction targets and regulatory requirements, companies must transform facilities into energy-efficient smart buildings, and IoT platforms can help.Continue Reading
Why IoT should become the 'internet of transparency'
IoT devices run on opaque, proprietary algorithms that erode the public's trust in smart technology and hamper its adoption. The industry must bring IoT algorithms into the light.Continue Reading
4 steps IT can take to manage the IoT device explosion
IT and security teams must take steps to keep up with their IoT deployment, including investing in the right tools and creating an IoT operations budget.Continue Reading
Increase productivity in construction with IoT
Construction sites will continue to become more complex, requiring companies to adopt IoT-enabled sensors and devices to accommodate the ever-changing demands of the industry.Continue Reading
Step-ahead IoT security: Developers must be more proactive
The lack of standards and built-in IoT security has hindered security practices and left systems vulnerable. Discover practical tips to build a stronger IoT security foundation.Continue Reading
Close the IoT skills gap with training and outside experts
The growth in IoT deployments and demand for expertise have led to a skills gap that inhibits the technology's adoption, but organizations have options that can also close the gap.Continue Reading
IoT data in the cloud and on the edge
With more data generated at the edge, transferring it all to the cloud may not be a feasible option. That's where edge cloud comes in.Continue Reading
Industrial IoT security must target 3 risk categories
IT administrators can address administrative and operational, technical and physical risks in an IIoT security plan with a cybersecurity framework to guide the process.Continue Reading
4 zero-trust IoT steps to scale security
With a zero-trust framework applied to an IoT deployment, IT administrators and security teams implement strong identities and isolate threats at scale.Continue Reading
Evaluate industrial IoT connectivity options
Organizations adopting industrial IoT must decide whether wired or wireless connectivity serves their purpose best based on data rates and device location.Continue Reading
IIoT platforms optimize analysis of industrial data
Instead of managing industrial data and connections on their own, industrial organizations can use IIoT platforms to break down data silos and get more actionable insights.Continue Reading
Providers expand global IoT connectivity from 4G networks
4G LTE currently holds the key position for international IoT connectivity, linking up automobiles, elevators and more, but the implementation of 5G and satellites is imminent.Continue Reading
Invest in 4 technologies for industrial IoT architecture
The right industrial IoT architecture and a developed project vision serve as the foundation for a variety of applications and increase process efficiency.Continue Reading
IT/OT convergence security must adapt for IoT connectivity
Organizations must build a strong security posture that includes both IT and OT to ensure their safety, which will require a paradigm shift from individual assets to systems.Continue Reading
IoT connectivity management platforms optimize deployments
IT administrators can simplify IoT device and network challenges with IoT connectivity management platforms that monitor data transfers and security.Continue Reading
Transportation IoT joins physical and information highways
As transportation IoT networks improve with connectivity, embedded processing and sensing technology, society will move from point A to point B more efficiently and safely.Continue Reading
Reap the rewards of IT/OT convergence in manufacturing
Organizations that plan carefully and slowly implement IT/OT convergence in manufacturing can experience advantages in productivity at minimal risk.Continue Reading
IoT data quality determines project profitability
The insights drawn from IoT data analysis can only improve with better IoT data quality, which data scientists measure with metrics such as accuracy, timeliness and completeness.Continue Reading
LPWAN systems offer an easy-to-use connectivity option
The pandemic has made lasting changes to supply chains across industries, pushing organizations to better track goods and equipment with IoT sensors and LPWAN networks.Continue Reading
Roll out IoT device certificates to boost network security
Organizations don't just use digital certificates for websites and web apps anymore. IoT device certificates have become a significant part of any cybersecurity strategy.Continue Reading
Focus the role of data analytics in IoT on actionable insights
Organizations might find it easier to use the limitations of their IoT data analysis project to guide its creation, such as connectivity or battery power.Continue Reading
Comprehend control loops to unlock analytics for IoT
Applying analytics to IoT quickly becomes a convoluted task. Architects must master the control loop to direct its design and deliver rapid business insights.Continue Reading
5 essential dos and don'ts of IoT implementations
Shi Jin Lee put together a guide on what to consider for IoT, including promoting collaboration within and across your company and not forgetting security or your end users.Continue Reading
Investigate IoT and edge computing nuances for architects
Author of 'IoT and Edge Computing for Architects' Perry Lea shares his expert advice on how to design interconnected architecture that addresses the challenges of both technologies.Continue Reading
Reach business objectives with the right IoT data pipeline
IoT technology creates value from its data. Organizations need the right IoT data pipeline to facilitate the processing that leads to actionable insights and informs business decisions.Continue Reading
The rise of the enterprise consumer
As the office and home remain merged, enterprise consumers will become a significant area of focus for communication service providers and IoT developers alike.Continue Reading
Managing digital out-of-home advertising with IoT, edge and 5G
Digital out-of-home advertising is here and IoT, edge computing and 5G technology advancement are able to offer the best platform to light up the imagination of creative minds.Continue Reading
Confronting the threat of edge-enabled swarm attacks
Cybercriminals can use thousands of hijacked devices to create swarm attacks. These attacks target networks or edge devices, and share intelligence in real time to refine an attack as it takes place.Continue Reading
The emergence of autonomous irrigation technology streamlines farming operations
As advancements in technology continues, agricultural farmers can take advantage of LoRa and automatic identification services to better automate and streamline agricultural operations.Continue Reading
Connected cars: The roles of app developers and car manufacturers are changing
High Mobility's Kevin Valdek outlines the roles of connected car manufacturers and connected car app developers, and how these two often co-dependent groups are coming together to change the industry.Continue Reading
Overcome the cybersecurity skills gap to embrace the digital transformation power of IoT
Securing IoT is critical, but with a major security skills shortage, recruiting talent is challenging to say the least. Fortinet's Jonathan Nguyen-Duy offers insight into finding – or cultivating – ...Continue Reading
Strong security can unleash the promise of the industrial internet of things
Industrial IoT is set to make a worldwide economic impact. However, without strong security, IIoT efforts are for naught. DigiCert's Dan Timpson explains why PKI and digital certificates are key to ...Continue Reading
Avoid tech's valley of death: Advanced R&D lessons on scaling IoT proofs of concept
To scale your IoT proof of concept, says Deloitte's Helena Lisachuk, learn from the successes of advanced R&D. Here, Lisachuck explains why promising proofs die -- and what to do about it.Continue Reading
Ethics, values and common standards are essential for shaping an IoT-smart society
Industry leaders and policymakers must ensure the well-being of the consumer in a smart, connected world. Wipro's Jayraj Nair explains why ethics, values and common standards are critical.Continue Reading
How a blend of customer experience and data helps brands build trust in IIoT
A successful industrial IoT deployment requires the right mix of customer experience and data utilization. Voxpro's Brian Hannon offers advice to help customer experience teams prepare support for ...Continue Reading
Behavioral eManipulation: Attacking the care delivery workflow to deliver harm
Behavioral eManipulation, explains Independent Security Evaluators' Ted Harrington, is an attack methodology in which attackers use technical exploits to influence human behavior.Continue Reading
The new bottoms-up IIoT strategy that may already be underway at your organization
A bottoms-up approach to industrial IoT is popping up at many plants, with IT pros and engineers launching IIoT initiatives in a DIY fashion. Kepware's Jeff Bates discusses.Continue Reading
Smart manufacturing and IoT: Driving operational efficiency with real-time insights
Insights gleaned from IoT data are changing business models, and no other sector has been impacted by the IoT transformation more than manufacturing.Continue Reading
Predictions: Learning from the past as we advance IoT security in 2018 and beyond
Myles Bray of ForeScout compiled IoT security predictions from Ayelet Kutner, Jon Connet and Bob Reny, revealing what security threats organizations may see over the next year.Continue Reading
The enterprise IoT wave rolls in: How to prepare
The possibilities for IoT might be boundless. Find out areas where architects can prepare for and take advantage of an increasingly connected world.Continue Reading