How the Social Internet of Things is Revolutionizing Connectivity
· Digital Disruption

How the Social Internet of Things is Revolutionizing Connectivity

Humans are both innovative and social beings leading to technological advances that are changing the way we interact. The desire to connect has inspired a global technological network linking people, data, and things. Traditionally, our conception of cloud – or Internet-based social solutions has existed in the digital world. We send emails, conduct video calls, […]

Read more
Norman Rankis, Information Technology & Automated Process Controls Manager
· Our Contributors

Norman Rankis, Information Technology & Automated Process Controls Manager

Norman Rankis is currently the Information Technology & Automated Process Controls Manager for McWane Ductile of New Jersey. He has an extensive background in Information Technology and Higher Education. He was the first College Chancellor in the history of Gibbs College which opened in 1950. He also served as guest faculty for U.S Homeland Defense […]

Read more
Mircea Baldean, MBA, Founder and Chief Executive Officer
· Our Contributors

Mircea Baldean, MBA, Founder and Chief Executive Officer

As the original founder of MeetVibe Inc. and avid fan of technology, he set out to overcome the hassles of planning frequent meetings. His simple concept of sharing one’s calendar availability with cross-platform synchronization, in order to eliminate the back and forth, has put frictionless planning into the hands of consumers. Mr. Baldean leads corporate […]

Read more
Four most hard to solve IIoT security issues
· Cybersecurity

Four most hard to solve IIoT security issues

According to a forecast by Gartner, the number of IoT devices in use will reach 8.4 billion in 2017 and grow to a staggering 20.4 billion by 2020, and the market opportunity for IoT will reach US$2 trillion by 2017. With the proliferation of IoT devices and technologies in the commercial and industrial sectors, we […]

Read more
6 Tips to Protect Your Network From Malware Attacks
· Cybersecurity

6 Tips to Protect Your Network From Malware Attacks

Malware attacks exploiting unprotected businesses can go undetected for months. Discover six ways in which you can future proof your network and protect from malware attacks. “There’s a concerning trend in these supply-chain attacks,” says Craig Williams, the head of Cisco’s Talos team. “Attackers are realizing that if they find these soft targets, companies without […]

Read more
7 Things You Should Ask Your Manufacturing Equipment Provider
· Smart Manufacturing

7 Things You Should Ask Your Manufacturing Equipment Provider

Video should be part of every SCADA solution. In fact, all plant operations should consider adding cameras to existing operations as the technology is well understood and the returns can be significant and measurable. Troubleshooting manufacturing equipment and process upsets is extremely costly. False alarms add to this cost, especially if the equipment is remote. […]

Read more
Connected sensors & machine learning – two current trends in predictive maintenance
· Predictive Analytics

Connected sensors & machine learning – two current trends in predictive maintenance

The emerging market for Predictive Maintenance (PdM) shows increasing growth as maintenance strategies move from what has been known as Condition-based Maintenance to Analytics-and IoT-enabled PdM, according to a report published this year by IoT Analytics, a leading provider of market insights for the Internet of Things. The Predictive Maintenance report forecasts a compound annual […]

Read more
Digitalization of power generation in times of transition
· Connected Industry

Digitalization of power generation in times of transition

Digitalization holds great promise for the power generation industry. However, a range of internal and market challenges can constrain its effective uptake and implementation for those early in the digital journey. Innovative companies that approach digitalization strategically, balancing the short and longer term objectives of the business, will gain a significant competitive advantage, improving their […]

Read more
[Whitepaper] Integrating Security Into the IoT Strategy in the New Converged Environment
· Cybersecurity

[Whitepaper] Integrating Security Into the IoT Strategy in the New Converged Environment

Consumers want their work, home and mobile devices to communicate together to provide information that was previously not available from isolated systems. This desire is at the root of the Internet of Things (IoT). The rise of IoT started when consumers began to interconnect devices — ranging from personal computers, smartphones, tablets and wearables, to […]

Read more
Richard Ku, SVP of Commercial IoT Business & Market Development
· Our Contributors

Richard Ku, SVP of Commercial IoT Business & Market Development

Richard Ku has been involved in Cyber Security for over 28 years, serving as a threat researcher and engineer. He has managed and developed many security products and services across different customer segments and verticals. Richard is currently the Senior Vice President of Commercial IoT Business & Market Development at Trend Micro, a leading Cyber Security […]

Read more
Smart City and Industrial IoT Applications
· Smart Cities

Smart City and Industrial IoT Applications

If you think cities are crowded now, just wait. Within just 15 years, more than 5 billion people will live in urban environments. Urban growth boundaries are increasingly limiting sprawl, forcing even more growth to go vertical, increasing urban density. Smart cities backed by Industrial IoT Applications will become a normal thing.. By 2020, the […]

Read more
Size and complexity are the enemies of cybersecurity
· Cybersecurity

Size and complexity are the enemies of cybersecurity

In cybersecurity we are always faced with the chance that our system harbors some, unknown vulnerability, and the possibility that vulnerability will be discovered by some malicious actor who will then use it against our system, as well as other, similar systems. Cybersecurity vulnerabilities are the result of two kinds of errors or defects:design errors […]

Read more