Security
Shared Touches in a New Normal
Think of every button you push on point of sale machines, ATMs, elevators, remote controls and kiosks.
The Digital Twin Instance
It’s time to create a #DigitalTwin Instance of a physical entity that is derived from a Digital Twin Model.
10 Ways to Achieve Internet of Things Success for your Organization
The #IoT Megatrend is in Danger of Stalling
Hardware Root of Trust
Watch this bite-sized #video to learn about advanced #Tech including #IoT #IIoT #DigitalTwins #Cloud #EdgeComputing #DigitalTransformation #5G #AI #Mobile #APIs and #Data.
Authenticating Devices at the Edge
Watch this bite-sized #video to learn about advanced #Tech including #IoT #IIoT #DigitalTwins #Cloud #EdgeComputing #DigitalTransformation #5G #AI #Mobile #APIs and #Data.
SDK Security and Identity
Watch this bite-sized #video to learn about advanced #Tech including #IoT #IIoT #DigitalTwins #Cloud #EdgeComputing #DigitalTransformation #5G #AI #Mobile #APIs and #Data.
The Year Ahead in the Industrial IoT
In 2016, we saw breathless growth in the industrial #IoT market with a bewildering mix of solutions confronting the industrial operator.
Internet of Things Predictions for 2017
When it comes to #IoT predictions, 2017 will see solutions solving business pain points jump to hyperspace as VC funding dries up for many platform plays.
Mobile Apps Must be their own Fortress to Withstand Attacks from Hackers
A #mobile app must be its own fortress and never assume platforms are encrypted, authenticated, use VPN or require a PIN for security.
Delivering Apps to Mobile Devices via Remote Pixel Projection is a Terrible Idea
The use of remote pixel projection technology to view Win32 apps on #mobile devices should be considered nothing more than an interim workaround.
It’s Time to Dump your 1990s App Authentication
Migrate Win32 applications secured by client/server database logins to #mobile apps that use OAuth & enterprise cloud directories for authentication instead.
12 Steps to Stop the Next IoT Attack in its Tracks
The recent distributed denial-of-service (DDoS) #IoT attack against DNS is a wake up call to how fragile the Internet can be.
Keep your Mobile Data Safe when Apps Talk to Each Other
Convert Win32 applications using local interprocess communications (IPC) to #mobile apps that securely send data to each other via contracts.
Reduce Corporate Risk by Updating your Win32 Apps to Run on Secure Sandboxed Platforms
Migrate those Visual Basic, Delphi, VisualAge, PowerBuilder, SQL Windows, JBuilder and Visual Cafe Win32 applications to secure sandboxed #mobile apps.