The Internet of Things offers a lot of potential and when fully operational will have changed our lives dramatically. Once we live in a world were billion devices are connected to the Internet, our live will become a lot easier. There are already ample examples of this such as domotica in smart homes, the quantified self movement that monitors our daily … [Read more...] about How to Keep the Internet of Things Safe
security
Ants, Padlocks, & Cyber Security
If youve followed the news recently, I dont need to tell you that cyber security is a topic of major importance today. It seems that every week there is another revelation of a security breach at an organization thought by many to be a leader in data and network security. The breaches span governmental agencies and virtually every industry. Ironically, even a company that makes … [Read more...] about Ants, Padlocks, & Cyber Security
How to Secure the Internet of Things?
The Internet of Things (IoT) as a concept is fascinating and exciting, but the key to gaining real business value from it, is effective communication between all elements of the architecture so you can deploy applications faster, process and analyze data at lightning speeds, and make decisions as soon as you can. IoT architecture can be represented by four … [Read more...] about How to Secure the Internet of Things?
Internet of Things: Understanding the Value Chain
The Application of the Internet of Things (IoT) has now come a long way from the story of the Coke machine at Carnegie Melon University in 1980s. From the initial Machine-to- Machine (M2M) capabilities used in manufacturing, power and utilities, the 'Thing' now can be any natural or man-made object that can be assigned an IP address. More objects are becoming embedded with … [Read more...] about Internet of Things: Understanding the Value Chain
How to Encrypt Data in the Cloud to Stop Mischievous Hackers
In the modern IT procedures, almost all significant information processes or data pathways include some form of cloud storage or cloud computing. This means that even businesses and organization which do not own or operate cloud storage assets still have their data transported through some form of cloud service, no matter what they do. In many aspects, this is a great thing for … [Read more...] about How to Encrypt Data in the Cloud to Stop Mischievous Hackers