featureIoT startups fill security gapsEnterprises are turning to IoT-focused startups to address new security challenges. By Jeff VanceSep 18, 202310 minsInternet of ThingsSecurity analysis 6 industries where private 5G makes senseBy Tom NolleApr 10, 20238 mins5GInternet of Thingsnews analysis HPE Aruba, Microsoft Azure, and reelyActive speed streaming of IoT data to the cloudBy Michael CooneyMar 14, 20233 minsHPEMicrosoftMicrosoft Azure featureWi-Fi HaLow: Wireless for the internet of thingsBy Eric Geier Feb 27, 20236 minsSmall and Medium BusinessInternet of ThingsWi-Fi news analysisCisco, Intel collaborate to build private 5G servicesBy Michael Cooney Feb 27, 20234 mins5GCisco SystemsInternet of Things news analysisCisco adds services, hardware to better support industrial IoTBy Michael Cooney Feb 07, 20233 minsCisco SystemsAsset Management SoftwareInternet of Things news analysisWhat is a VPN? A secure network over the internetBy Josh Fruhlinger Dec 26, 202211 minsInternet of ThingsVPNWAN newsSchneider Electric, SAP tighten bonds to ease IIoT system integrationBy Jon Gold Nov 29, 20222 minsERP SystemsInternet of Things featureTips on securing IoT devices gleaned from enterprises that use themBy Maria Korolov Oct 21, 202212 minsInternet of ThingsNetwork Security ArticlesopinionSurprise! The metaverse could be great news for the enterprise edgeHigh-bandwidth, low-latency services needed to support the metaverse could also mean a better, cheaper way to provide access for edge applications like IoT. By Tom Nolle Mar 22, 2022 6 minsEdge ComputingInternetInternet of Thingshow-toWhat is IPv6, and why is adoption taking so long?IPv6 has been in the works since 1998 to address the shortfall of IP addresses available under IPv4, yet despite its efficiency and security advantages, enterprise uptake is slow By Josh Fruhlinger Mar 21, 2022 8 minsInternetInternet of ThingsNetworkingfeatureWhat is a digital twin and why is it important to IoT?Digital twins are virtual replicas of physical devices that data scientists and IT pros can use to run simulations before actual devices are built and deployed. Digital twins can also take real-time IoT data and apply AI and data analytics to optimize performance.By Josh Fruhlinger and Keith Shaw Mar 17, 2022 9 minsInternet of Thingsopinion5 best practices for making smart-building LANs more secureSmart-building controllers can reduce risk of smart devices being used as entry points to the LAN, but they should be chosen and managed carefully. By Tom Nolle Feb 14, 2022 6 minsInternet of ThingsNetworkingSecuritynews analysisIoT in 2022: IoT turns into a serviceAs IoT matures, vendors are creating application bundles to simplify deployments, but security remains a worry.By Jon Gold Jan 12, 2022 4 minsInternet of Thingsnews analysisIBM, Samsung team on unconventional, super-efficient semiconductorBy reorienting transistors on the semiconductor, IBM and Samsung say their technology can cut power consumption by 85%. By Michael Cooney Dec 14, 2021 2 minsInternetInternet of ThingsopinionLoRa takes a trip to the moon and back, chirping all the wayLoRa wireless that's used in IoT networks is known as a low-power, long-range technology—long-range enough to carry a message between Earth and the moon.By Chris Nerney Dec 02, 2021 3 minsInternet of ThingsWANNetworkingnewsResearchers show how to exploit Bluetooth Classic security flawsA set of Bluetooth Classic vulnerabilities has a new proof-of-concept from a Singapore-based security research team, as chipset makers scramble to deploy patches.By Jon Gold Nov 16, 2021 2 minsInternet of ThingsnewsReport: Chip shortage and edge/IoT will drive IT change in 2022Forrester Research says IT pros now think of IoT and edge as inextricably connected and that the two will be used to help enterprises comply with US government regulations.By Jon Gold Nov 15, 2021 3 minsEdge ComputingInternet of Thingsopinion3 steps to better collaboration between networking and security prosEnterprise Management Associates: Most organizations acknowledge failure to create fully successful teams to deliver reliable and secure cloud, data-center, and IoT initiatives.By Shamus McGillicuddy Nov 15, 2021 5 minsCloud ManagementInternet of ThingsSecuritynews analysisArm creates virtual IoT chips to accelerate developmentVirtual instances of new Arm chip designs will let developers create apps before the silicon arrives.By Andy Patrizio Oct 20, 2021 3 minsInternet of ThingsfeatureEdge computing: The architecture of the futureTo fully digitize the last mile of business, you need to distribute compute power where it's needed most — right next to IoT devices that collect data from the real world.By Eric Knorr Oct 12, 2021 4 minsEdge ComputingInternet of Things Show more Show less View all Upcoming Events07/Dec roundtable dinner CIO In Person Roundtable: Roundtable: The Value and Impact of Real Time Data on Customer Experience and Operational ExecutionDec 07, 202318:30-21:30 GMTGreat Scotland Yard Hotel, London Events 21/Mar in-person event CIO Customer & Employee Experience ForumMar 21, 20249:30 am – 18:30London, United Kingdom Events View all events Resources whitepaper Acquire and retain the next generation of customers with next-generation banking Crossvale and Red Hat equip you with the tools and services you need to succeed in the digital banking era. The post Acquire and retain the next generation of customers with next-generation banking appeared first on Whitepaper Repository. By Red Hat & Crossvale 30 Nov 2023Business OperationsDigital TransformationFinancial Services Industry whitepaper Enhance customer experiences with next-generation banking By Red Hat & Crossvale 30 Nov 2023Business OperationsDigital TransformationFinance and Accounting Systems whitepaper Branch-to-digital transformation By Red Hat & Crossvale 30 Nov 2023Business OperationsDigital TransformationFinancial Services Industry View all Video on demand videoCoronavirus pandemic highlights medical IoT security risksWith more of us connecting with our healthcare providers virtually during the coronavirus pandemic, hackers may find it more appealing to attack medical or hospital systems. Increased amounts of data due to telemedicine and medical internet of things (IoT) devices must be secure to protect individuals' privacy and for HIPAA compliance. Network World senior writer Jon Gold joins Juliet to discuss medical IoT security risks, why these attacks may or may not be especially prevalent now and how to mitigate IoT security risks. May 27, 2020 9 minsInternet of Things What is edge computing? May 01, 2020 3 minsInternet of ThingsCloud Computing See all videos Explore a topic 5G Careers Cloud Computing CPUs and Processors Data Center Edge Computing Enterprise Storage Generative AI Industry Linux Networking Network Management Software Network Security Virtualization All topics Close 5G Careers Cloud Computing CPUs and Processors Data Center Edge Computing Enterprise Storage Generative AI Industry Linux Networking Network Management Software Network Security Virtualization Show me morePopularArticlesPodcastsVideos news analysis Cisco joins $10M funding round for SONiC startup Aviz Networks By Michael Cooney Dec 01, 20233 mins Network Management SoftwareIndustryNetworking news Cisco CCNA, AWS cloud networking among top-paying IT certs By Denise Dubie Nov 30, 20237 mins CertificationsNetwork SecurityNetworking news Mainframe modernization gets a boost from Kyndryl, AWS By Michael Cooney Nov 30, 20234 mins MainframesCloud ComputingData Center podcast Episode 1: Understanding Cisco's Converged SDN Transport Sep 24, 202120 mins Cisco SystemsInternetNetworking podcast Episode 2: Pluggable Optics and the Internet for the Future Sep 23, 202117 mins Optical DrivesCisco SystemsInternet podcast Episode 3: Looking Forward: 5G, Digital Transformation, and the Network of the Future Sep 22, 202114 mins 5GCisco SystemsInternet video How to calculate factorials in Linux Nov 02, 20232 mins Linux video How to use the nohup command Oct 31, 20232 mins Linux video How to use date command options Oct 26, 20232 mins Linux