IMG_3428

Around the Web: The Immediate Future of AI, I5G, Big Data and the IoT

In March, majority of us watched TV when SpaceX launched a Tesla into space.  Robots are transforming factories, supply chains, restaurants – even the environment. Drones are starting to deliver packages and meals. Urban Rivers has built a remote-controlled, floating, trash-collecting robot to clean up Chicago’s rivers. IoT-enabled smart cities, such as Barcelona, Singapore and Denver, are already saving[…][…]

Posted in IoT
IMG_3291

Let’s talk about the key to IoT security – Lessons from the Biggest Thing in the IoT

It’s no a mistery that Internet of Things networks have a security problem. There have been a regular stream of articles regarding large-scale attacks carried out by infiltrating wireless IoT devices as a back door into companies networks. Probably one of the best known is the 2016 – Mirai attack, which turned IoT devices into a real zombies army that paralyzed processes of such companies like Netflix[…][…]

IMG_3287

Shaping the future of industry 4.0 with IoT

If you spend time reading articles from industry-specific experts, you’ll observe one expression thrown around quite often — Industrial Revolution. Although what’s nowadays happening can’t be related to as a full-fledged “Industrial Revolution” as the previous three, it’s still taking the industry by storm. Before we see where the industry is, let’s quickly summarise how far it’s come. The[…][…]

Evolution of Cloud to Fog Computing

Businesses are handling tremendous volume of data on a regular basis. Internet of Things (IoT) recognized the necessity for data storage and emerged with models for cloud computing and fog computing. These pioneering solutions were created to streamline the data organization process and help enterprises manage their data in real-time. Time is money and the best way to be efficient is to gain[…][…]

IMG_3912[1]

Disposable or single-use IoT tags can open completely new opportunities

The Internet of Things has changed how industries operate and how people interact with one another. We have seen an impressive array of new IoT deployments from an explosion of smart city applications to sensors implanted in the horns of critically-endangered rhinos in Africa. The evolution of IoT has connected devices at record speed and provided useful[…][…]

Posted in IoT

Fog computing is starting to drive Industrial IoT systems revolution

In the past many industrial systems were built from individual appliances, usually programmed one at a time. The Industrial Internet of Things (IIoT) is changing all of that, modifying isolated programmable goods into intelligent networks of connected products, such as intelligent drone delivery systems, autonomous cars, automated air traffic control, smart grid power systems, connected medical[…][…]

Posted in IoT
IMG_3774

Intuitive IoT Predictions and Professional Forecasts for 2020

IoT, short for the internet of things, is a vast network of vehicles, home use appliances, physical gadgets and other electronics, sensors and connectable software which enables these gadgets to exchange data with the internet and other gadgets. This terminology came into existence in the late 90’s and was created by Kevin Ashton. The internet of things allows[…][…]

Posted in IoT
IMG_3277

Even You will become the final device of the IOT

Nowadays, the internet mostly exists on laptops and smartphones. But it’s only a matter of time before the internet starts talking to every possible consumer object. If an item can be connected to the Net, it will be. This concept is broadly known as the “Internet of Things,” and it includes a wide range of consumer devices spanning the[…][…]

Posted in IoT

To Cloud or not To Cloud: Now vs. 2020

Few weeks ago I read an interesting Cloud Study published by LogicMonitor’s Cloud Vision 2020. The survey was based on interviews with approximately 300 influencers LogicMonitor interviewed last year. Respondents include Amazon Web Services AWS re:Invent 2017 attendees, industry analysts, media, consultants and vendor strategists. The study’s primary goal was to explore the landscape for cloud services in[…][…]

IMG_3246

Design your network ready for M2M IoT devices

Internet of Things can include vehicles and home appliances, machine-to-machine applications target field services, healthcare, security, environmental monitoring, traffic control, agriculture, fleet management, public utilities and oil and gas applications.  The significant and growing subset of the larger  movement is a machine-to-machine (M2M) communication, so you have to ask if your network ready for  M2M devices? Cellular,[…][…]

Posted in IoT
IMG_3285

Internet of everything vs. Internet of things

People have been talking about the difference between the Internet of Things (IoT) and the Internet of Everything (IoE) for many years now. While some say it’s just a difference in semantics, others believe the two are fundamentally different concepts. We’ll discuss what, exactly, the Internet of Everything is and if it’s truly different. First, we have to understand[…][…]

Posted in IoT
big hands and cartoon businessman - confused network

What is the Industrial IoT?

The Industrial Internet of Things, or IIoT, connects machines and devices in industries such as transportation, power generation, and healthcare. The potential is high and so are the risks. Everyone’s heard of the IoT – smart thermostats, Internet-connected refrigerators, connected lightbulbs – but there’s a subset called industrial IoT that has a much more significant day-to-day impact on[…][…]

Posted in IoT
Feedback Bullhorns Megaphones Spreading Opinions Comments

What will be next biggest trends after shift to cloud computing?

One of the biggest trends in tech over the last decade has been the shift to cloud computing — the move to store and process data and run applications in data centers maintained companies including Amazon and Microsoft rather than on corporations’ own computers. But even as that trend is continuing and cloud computing is becoming more important,[…][…]

Back to Basics Writing Message Red Marker

Wearables is the next wave of enterprise IoT

As the internet of things evolves and grows more advanced, global organizations are increasingly turning to wearable devices for real-time data feedback and a competitive edge over their peers. By 2020, there could be as many as 600 million wearable devices connected to the internet (not to mention a more than four-fold increase in North America alone). Unfortunately, few are truly prepared[…][…]

Posted in IoT
Make a Change - Day Circled on Calendar

What is a future of IoT device management?

The Internet of Things (IoT) continues to expand its reach into homes, businesses, social settings, and other environments, as more and more devices are connected with the purpose of gathering and sharing data.Clearly, there are several potential benefits of IoT from a consumer standpoint. Apart from the convenience aspect, smart connected products can lead to increased energy efficiency,[…][…]

Top Cloud Computing Tips for Small Businesses

Cloud computing has seen incredible steps forward in the last 10 years and unsurprisingly, that means the adoption rates within small to medium sized industries has soared. However, like all aspects of IT, cloud computing doesn’t stand-still and understanding how to leverage the technology for maximum effect is often outside the knowledge based of company owners and decision[…][…]

Rozwoj

Digital Transformation needs IoT

The Internet of Things can drive many transitions in your organization, providing data into a wide range of operational activities. But that change requires integrating that data into the systems used for making right decisions.     There are many predictions that the world will have up to 50 billion connected devices by 2020. While much of the[…][…]

IMG_3295

The 7 Basic Principles of IoT Security

Most probably you have heard or read various articles about the impending doom from the proliferation of weakly secured “Internet of Things” stuff. IoT contains everything from security cameras, routers and digital video recorders to printers, wearable devices and “smart” lightbulbs – loosely defined as any gadget that connects to the Internet but which most of you[…][…]

IMG_3912[1]

Will IoT play a big role in change majority of industries?

Internet of Things is hot. Internet of Things is hype. Internet of Things is everywhere around us. It will seriously innovate many industries. Right, but how about my industry? What will the future bring? What if we could read the future and start building today a solution based on tomorrow’s technology for tomorrow’s problem? How to generate new[…][…]

IMG_3287

Top IoT predictions for 2018 and beyond

5 IoT predictions for 2018 and beyond Progression in IoT security, interoperability and its convergence with Cloud, AI, mobility, big data processing, cognitive computing and other emerging technologies will make the new year a pivotal one for IoT. The Internet of Things has moved to the mainstream in enterprises across all industries and this year will likely[…][…]

IMG_3428

Forget gadgets for now: staying safe is equally important as having the latest devices and services at your disposal

Forget gadgets for now: staying safe is equally important as having the latest devices and services at your disposal. Cybersecurity, cyber-terrorism and cyber defense are serious topics of concern for all industries, government agencies, energy and national infrastructure entities. Securing the information systems, data and infrastructure of these Governmental, Military and Commercial assets is paramount[…][…]

big hands and cartoon businessman - confused network

Co-operation is substantial for successful IoT implementation

Co-operation is substantial for successful IoT implementation Like in every parts of digital transformation, successful implementation of an IoT strategy requires close co-operation of many different both internal and external parties. Every modification should be started by taking stock of what they already have and how their current systems and processes perform. It involves reviewing organizational[…][…]

IMG_3773

Global cybersecurity trends for 2018

Global cybersecurity trends for 2018 Artificial intelligence You must invest in machine learning and artificial intelligence. It’s no longer a ‘nice to have’, it needs to be a core component increasing the ability to identify and combat the most massive infiltrations the industry will face in the years to come. Systems should alert about any deviations and anomalies in real time.[…][…]

IMG_3800

Artificial Inteligence or Humans?

Artificial Inteligence or Humans? Nowadays narrative is generally filled with sad stories about AI wiping out whole industries and millions of people going unemployed. Let’s take a little reality check where humans do a better job than AI and v/v. Where AI wins: Algorithms and robots win at repetitive tasks and solving problems that involve crunching large &[…][…]

IMG_3285

For many IoT devices, security is often not a consideration at all

For many IoT devices, security is often not a consideration at all Many IoT devices are built with convenience in mind and security is often not a consideration at all. Consumers often tend to care more about price, aesthetics and functionality than privacy protection when making purchasing decisions. Many research suggests they show relatively little concern about the[…][…]

image1[1]

Cyber Security in SME

It’s easy for SME to trick itself into thinking the cyber threats that only apply to large enterprises. But remember, in the eyes of attackers, bigger may not be better. Bigger businesses often have stronger security programs, larger budgets and more staff, making them less attractive targets for attackers than mid-market companies.  Understanding risk in SME is[…][…]

IMG_3774

What is the future of CIOs in digital transformation?

What is the future of CIOs in digital transformation? 1. Recognise your wider ecosystem is the key to success. You can’t collaborate externally if you don’t take a similar approach internally. Collaboration provides real power when you see your internal people running innovative projects. 2. View your legacy IT as a help not a hindrance The technology businesses use[…][…]

IMG_3610

Cyber threats continue to grow as the technology changes rapidly

Cyber threats continue to grow as the technology changes rapidly. Remember, one of the best investments you can make is in your cybersecurity people. With the right talents, you’ll have a far better chance of successfully fending off attacks, protecting your organization and outdoing your competition. Take your time when searching. Look for people with real-world experience.[…][…]

24

Many CIOs are confronting the same cybersecurity questions

It’s the middle of the intense Q4 budgeting season and many CIOs are confronting the same cybersecurity questions how to fight an enemy that constantly changes its tactics. Only doubling down on training, threat detection analytics, response and perimeter defenses are the wisest options. Detection and response are at least as important as prevention. Four of[…][…]

Bildungspaket

Artificial Intelligence & Bots will change project management

  Artificial Intelligence & Bots will change project management. Taking over administrative tasks There are already many intelligent systems that can speed up repetitive admin tasks and with the increasing use of AI this trend seems to only be getting bigger.   Extrapolating actionable conclusions from varying data The way AI will use data in a project[…][…]

Empathy Word Cloud on a white background.

Creating a Digital Channel Business

Creating a Digital Channel Business. Traditionally, there’s been a correlation between the sizes of the partner and the customer, rendering the enterprise customer unattainable by SMB shops. Now such a correlation doesn’t exist so be more interested than interesting. Talk to people, they’re all just people. They don’t care about the details of version 2.1 of your latest software upgrade[…][…]

IMG_3298

Cybersecurity is a responsibility among all stakeholders

Cybersecurity is a responsibility among all stakeholders and it is yet another wake-up call to become smarter than criminals, increase cyber resilience and design systems and teams to prevent attacks. How to shore up defenses? 1. Install the latest updates for your systems by enabling automatic downloads during downtime or off-peak hours. 2. Check that your system doesn’t have any[…][…]

Good morning text with holiday gear businessman and blackboard with text

Why do security practices consistently fail if we now have more tools available than ever

Why do security practices consistently fail if we now have more tools available than ever? I am sure if we transform our approach to training, we can more efficiently build a highly skilled cybersecurity workforce that is better prepared to address emerging threats in complex environments. The cybersecurity training must be agile enough to adapt to emerging threats. It should engage users in realistic environments[…][…]

IMG_3424

First self-powered data center opens

First self-powered data center opens! Aruba’s newest data center, named the Global Cloud Data Center (IT3) is located in Italy and claims to be 100% green using ‘a river of energy’ hydroelectric plant, solar panels and chilling underground water. Low-impact credentials at the site come largely because the data center has its own dedicated hydroelectric plant.[…][…]

IMG_3280

Don’t duplicate your competition

Don’t duplicate your competition. Unfortunately I see that more&more CEOs get too fixated on what their competitors are doing. They want to know their business model, their sales model, their marketing strategies, etc. In most cases, I feel that the desire is to largely emulate…or even duplicate…the competition. Don’t get me wrong, competitive understanding is useful, but competitive emulation[…][…]

Artificial intelligence concept

CIO role ‘remixed’

CIO role ‘remixed’. Majority of CIOs expect their jobs to change or be remixed as a result of the digitalisation. While delivery is still a part of the job, much greater emphasis is being placed on attaining a far broader set of business objectives. Two biggest transformations in the CIO role is innovation management and talent development. Nowadays CIOs[…][…]

Most companies can’t build their own cloud infrastructure and must rely on someone else’s

Most companies can’t build their own cloud infrastructure and must rely on someone else’s. That’s OK if the provider sticks only to the role of B2B technology service provider but how your business model might change as a result of the digital business strategy? In the future your revenue could become very reliant on AI based pattern[…][…]

IMG_3267

Biggest mistakes when you launch any strategic initiatives for your business

Biggest mistakes when you launch any strategic initiatives for your business. In many times, when companies launch strategic initiatives, there is usually a massive internal and external communications plan and then everyone expects immediate results. Unfortunately, more than 70% of strategic initiatives fail owing to a complex environment, unclear strategies and disempowered employees. These failures happen for a number[…][…]

Bildungspaket

It is important – build your own IT strategy and IT ROADMAP

It is important – build your own IT strategy and IT ROADMAP! Let’s start with the basis today… IT helps to be more productive for businesses to stay ahead. Unfortunately many CEOs still perceive IT as an another record in wrong column of the balance sheet. From my point of observation one of the biggest frustrations, executives[…][…]

Artificial intelligence concept

The terms Cognitive and Artificial Intelligence may give you an unsettling feeling

The terms Cognitive and Artificial Intelligence may give you an unsettling feeling. So much promise, so much buzz, but also so much uncertainty about what it really means. Anyway Cognitive and AI solutions proliferate across all industries resulting in significant growth opportunities. Some of the use cases are very industry specific, such as diagnosis and[…][…]