Internet of Everything

Internet of Things Journal

Subscribe to Internet of Things Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Internet of Things Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Internet of Things Journal
Many people mistakenly believe that Al Gore invented the Internet, but in reality it was Tim Berners-Lee. He created URIs, HTTP, HTML, and the first web browser - all critical building blocks that paved the way for the Internet to operate as the ubiquitous, decentralized network for sh...
The recent deluge of rains in Northern California have flooded streets, brought down trees and plugged storm sewers. As I was trying to make my way around the neighborhood, I thought of a classroom exercise to help my MBA students to identify the use cases upon which they could focus ...
Analysts estimate that by 2030, self-driving cars and trucks (autonomous vehicles) could account for as much as 60 percent of US auto sales. That’s great! But autonomous vehicles are basically computers on wheels, and computers crash all the time. Besides that, computers get hacked eve...
When executing an effective digital transformation strategy, management is tasked with placing the right workload into the most appropriate IT environment. This represents a shift from buying parts for self-assembly to composing services through self-serve consumption and pay-per-use m...
Cloud is a lot more pervasive than one may have imagined and in this article, we will focus on the various ways in which cloud technology is making home security systems robust and impenetrable. The term ‘Internet of Things’ gets thrown around quite a lot when we talk about cloud techn...
Common items are becoming “smarter.” IoT is making an impact on businesses across the board, including commercial buildings, manufacturing, retail and events. You‘ve probably heard of the Internet of Things by now, and if you haven't, you might be surprised to discover it's likely alre...
High Availability of applications is critical to an organization’s survival. On BIG-IP, HA Groups is a feature that allows BIG-IP to fail over automatically based not on the health of the BIG-IP system itself but rather on the health of external resources within a traffic group. These ...
In 2016, total worldwide retail sales reached $22 trillion, of which digital commerce makes up $1.9 trillion, or 8.7% of the total. While the majority of retail sales still occur in brick-and-mortar stores, overall growth is predominantly driven by digital commerce, which was expected ...
Anyone who knows me, knows that I’m extremely passionate about opportunities involving Internet of Things (IoT) – or should I call it Identity of Things – and what it will bring to end-consumers and businesses alike! The industry of connected devices is growing at a breakneck speed and...
Digital transformation. It’s only two simple words, but in the increasingly complex, customer-centric enterprise IT landscape, it’s a phrase that carries multiple meanings — to the point where some would probably observe, tongue-in-cheek, that it doesn’t mean anything anymore. It’d b...
Patrik Jonsson lives in Stockholm with his wife and son and works as a network engineer for a company providing online casino games across the world. Outside work, he likes to spend time with his family, play around with his home VMware lab and enjoys watching movies. He also loves tra...
I happened to be in India last November when prime minister Modi announced the demonetization program, where 86% of the currency in the form of two paper bills (Rs. 500 and 1000 denomination) were made defunct. People were given time to deposit their existing currencies in the bank. Th...
George Lucas, creator of Star Wars, once said, "You can't do it unless you can imagine it." Inour latest research on the future state of work in the retail sector, we find many industry executives struggling to imagine where the future is leading them and their organizations, not to me...
The Consolidation of point devices and services in your datacenter or cloud can help with cost, complexity, efficiency, management, provisioning and troubleshooting your infrastructure and systems. In this Lightboard Lesson, I light up many of the services you can consolidate on BIG-IP...
You can turn a microwave into a camera and I’ll teach you how in a minute, but before I do, let me share this news item. In a recent interview with a reporter from the Bergen Record, Kellyanne Conway was asked about surveillance. She responded: “There are many ways to surveil each othe...
“I have over 1,200 Data Analysts, so we have it nailed.” When I heard this being uttered by the head of their “analytics” group, I knew the meeting was over. I knew that I could safely close my laptop, put away my notebook, and gracefully thank them for their time. It didn’t matter ...
As more organizations use APIs in their systems, they’ve become targets for the not-so-good-doers so API Security is something you need to take seriously. Most APIs today use the HTTP protocol so organizations should protect them as they would ordinary web properties. Starting in...
Two weeks ago, I compiled a list of the 5 jobs robots will take first. Last week, I compiled a list of the 5 jobs robots will take last. Both previous essays are about robots replacing human workers who do cognitive nonrepetitive work (such as middle managers, salespersons, tax account...
There is no denying the Internet of Things (IoT) is a hot topic. Gartner positions IoT as being at the peak of the ‘hype cycle.’ From a size perspective, these ‘Things’ can be anything, from a small sensor to a large appliance, and everything in between. The data transmitted by these d...
From 2013, NTT Communications has been providing cPaaS service, SkyWay. Its customer’s expectations for leveraging WebRTC technology are not only typical real-time communication use cases such as Web conference, remote education, but also IoT use cases such as remote camera monitoring,...
I have seen the future! Of course, I seem to say that every other month (maybe that’s because the future keeps changing?), but this is a good one. The future is a collision between big data (and data science) and application development that will yield a world of “intelligent apps.” Th...
The term ‘Proxy’ is a contraction that comes from the middle English word procuracy, a legal term meaning to act on behalf of another. In networking and web traffic, a proxy is a device or server that acts on behalf of other devices. It sits between two entities and performs a service....
Smart devices require smart monitoring. That’s not a platitude. It’s an imperative. In fact, the smarter the device, the smarter you need to be about monitoring it. As headlines have shown, unmonitored, unprotected smart devices may be a disaster (or a DDoS attack) just waiting to hap...
SYS-CON Events announced today that TMC has been named “Media Sponsor” of SYS-CON's 20th International Cloud Expo and Big Data at Cloud Expo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY, , and the 21st International Cloud Expo, which will take pla...
The Industrial Internet of Things (IIoT) connects the entire manufacturing enterprise – from acquiring components to manufacturing, storage and delivery – in short delivering an enterprise-wide, holistic view of the entire work flow. But traditional networks present a significant roadb...
Gartner cited the #1 challenge in Big Data as “Determining how to get value from Big Data.” Did I read that right? And by no a small margin! How to get value from Big Data? Shouldn’t it be shocking that such a fundamental question persists while businesses are spending billions on dat...
Oxford University researchers have estimated that 47 percent of U.S. jobs could be automated within the next two decades. But which ones will robots take first? First, we should define “robots” (for this article only) as technologies, such as machine learning algorithms running on purp...
Perhaps one of the most intriguing applications for drones in the coming years are those related to safety – public safety, that is!
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the...
One of the perks of working at an IP analysis software company is the fascinating info we often gather on some of the coolest modern technologies. Our recent patent research on autonomous robots and manned spaceflight provides deep insights into the present state and future strategies ...
Smart phones. Smart TVs. Smart toilet seats (yes that is a thing!). Let’s face it, smart technology surrounds us. It has become a de facto part of our everyday lives. The Internet of Things is growing at breakneck speeds. No matter which analyst you read, the growth predictions are sta...
A recent article titled “We Are Likely 3-5 Years Out From Advanced Analytics Being Critical To The Viability Of A Company” (and I thought my titles were too long) interviewed Walter Storm, the Chief Data Scientist at Lockheed Martin. The article offers some great perspectives such as: ...
We are mobile, our devices are mobile, the networks we connect to are mobile and the applications we access are mobile. Mobility, in all its iterations, is a huge enabler and concern for enterprises and it’ll only get worse as we start wearing our connected clothing to the office. If ...
Worried about how to digitally transform while you perform? Wondering how to change the tires while going 60 mph? Are you preparing your team for their digital journey? (It’s not a destination.) Are you trying to figure out how to transform yourself (or your company) into a digital pow...
Okay, I am weird (tell me something that I don’t know, say most of my friends). For Christmas I wanted a Nike Apple Watch to go with my existing FitBit and Garmin fitness trackers (I look sort of like a cyborg in the photo below…which is always cool).
How to share an APM session across multiple access profiles. A common question for someone new to BIG-IP Access Policy Manager (APM) is how do I configure BIG-IP APM so the user only logs in once. By default, BIG-IP APM requires authentication for each access profile. This can easily b...
As more organizations deploy IoT applications in their data centers and clouds, they’re going to need their ADC to understand the unique protocols these devices use to communicate. In this Lightboard Lesson, I light up how IoT protocol MQTT (Message Queuing Telemetry Transport) w...
One of the unfortunate effects of the continued evolution of the load balancer into today’s application delivery controller (ADC) is that it is often too easy to forget the basic problem for which load balancers were originally created—producing highly available, scalable, and predicta...
The entire intent of load balancing is to create a system that virtualizes the “service” from the physical servers that actually run that service. A more basic definition is to balance the load across a bunch of physical servers and make those servers look like one great big server to ...
The Year of the (Fire) Rooster will soon be upon us and the talkative, outspoken, frank, open, honest, and loyal Rooster could influence events in 2017. Whether you were born under the symbol or not, Roosters strive on trust and responsibility, essential for any organization especially...