Internet of Everything

Internet of Things Journal

Subscribe to Internet of Things Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Internet of Things Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Internet of Things Journal
Okay, I am weird (tell me something that I don’t know, say most of my friends). For Christmas I wanted a Nike Apple Watch to go with my existing FitBit and Garmin fitness trackers (I look sort of like a cyborg in the photo below…which is always cool).
Construction has been called the science of the practical. While designers and governmental bodies argue over the limits of the possible, leaders in the construction industry have simply continued to build along the most efficient path. Construction was one of the last industries to g...
Worried about how to digitally transform while you perform? Wondering how to change the tires while going 60 mph? Are you preparing your team for their digital journey? (It’s not a destination.) Are you trying to figure out how to transform yourself (or your company) into a digital pow...
We are mobile, our devices are mobile, the networks we connect to are mobile and the applications we access are mobile. Mobility, in all its iterations, is a huge enabler and concern for enterprises and it’ll only get worse as we start wearing our connected clothing to the office. If ...
A recent article titled “We Are Likely 3-5 Years Out From Advanced Analytics Being Critical To The Viability Of A Company” (and I thought my titles were too long) interviewed Walter Storm, the Chief Data Scientist at Lockheed Martin. The article offers some great perspectives such as: ...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the...
How to share an APM session across multiple access profiles. A common question for someone new to BIG-IP Access Policy Manager (APM) is how do I configure BIG-IP APM so the user only logs in once. By default, BIG-IP APM requires authentication for each access profile. This can easily b...
As more organizations deploy IoT applications in their data centers and clouds, they’re going to need their ADC to understand the unique protocols these devices use to communicate. In this Lightboard Lesson, I light up how IoT protocol MQTT (Message Queuing Telemetry Transport) w...
One of the unfortunate effects of the continued evolution of the load balancer into today’s application delivery controller (ADC) is that it is often too easy to forget the basic problem for which load balancers were originally created—producing highly available, scalable, and predicta...
One of the perks of working at an IP analysis software company is the fascinating info we often gather on some of the coolest modern technologies. Our recent patent research on autonomous robots and manned spaceflight provides deep insights into the present state and future strategies ...
The entire intent of load balancing is to create a system that virtualizes the “service” from the physical servers that actually run that service. A more basic definition is to balance the load across a bunch of physical servers and make those servers look like one great big server to ...
The Year of the (Fire) Rooster will soon be upon us and the talkative, outspoken, frank, open, honest, and loyal Rooster could influence events in 2017. Whether you were born under the symbol or not, Roosters strive on trust and responsibility, essential for any organization especially...
What are the successful IoT innovations from emerging markets? What are the unique challenges and opportunities from these markets? How did the constraints in connectivity among others lead to groundbreaking insights? In her session at @ThingsExpo, Carmen Feliciano, a Principal at AM...
Adam Smith wrote about rational self-interest, which posits we work together for the greater good when it benefits ourselves. Does this concept translate to robots, automation and employment? I think it does. I believe most of us would agree that replacing large numbers of humans with...
The “willing suspension of disbelief” is the idea that the audience (readers, viewers, content consumers) is willing to suspend judgment about the implausibility of the narrative for the quality of the audience’s own enjoyment. We do it all the time. Two-dimensional video on our screen...
Developing software for the Internet of Things (IoT) comes with its own set of challenges. Security, privacy, and unified standards are a few key issues. In addition, each IoT product is comprised of (at least) three separate application components: the software embedded in the device,...
Your car. My toaster. Our lights. The neighbor’s thermostat. With an average of 7.8 connected devices per home, according to recent surveys, there are twice as many “things” in the house as the average 3.14 people per household in the US in 2015. And all of them are “talking.” Not al...
The Internet of Things (IoT) has been one of the most prominent IT buzz words of 2015. Whether you are talking about thermostats you can set before you get home, beacons wirelessly suggesting items to buy in your high street clothing store or wearable gadgets like the Apple Watch, IoT ...
In January 28, 2013, we released the “Big Data Storymap”. Since releasing the storymap, we have gotten lots of positive feedback. It really seemed to work in highlighting the key aspects and approaches to achieving big data success. So I thought I’d take the opportunity to re-visit the...
Forty months is not a lot of time to design, develop and deliver something monumental. Consider that it took 182 years to build the Notre Dame Cathedral in Paris, 20 years to build the Great Pyramid of Giza and 10 years to build the Panama Canal. Executives from digital-leading compani...
It’s that time of year when we gift and re-gift, just like this text from last year. And the perfect opportunity to re-post, re-purpose and re-use all my 2016 entries. After 12 years at F5, I had a bit of a transition in 2016, joining the amazing DevCentral team in February as a Sr....
My daughter called with a frantic message. She was driving my car (why she was driving my car when she has her own is the subject for another time) and a warning message appeared on the car console: “Engine overheated! Stop engine and allow to cool down” (see Figure 1). Fortunately, m...
I recently recovered from ACDF surgery where they remove a herniated or degenerative disc in the neck and fuse the cervical bones above and below the disk. My body had a huge vulnerability where one good shove or fender bender could have ruptured my spinal cord. I had some items remove...
Hewlett Packard Enterprise advanced across several fronts at HPE Discover 2016 in London, making inroads into hybrid IT, Internet of Things, and on to the latest advances in memory-based computer architecture. A leaner, more streamlined Hewlett Packard Enterprise (HPE) advanced acros...
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new ind...
As ridesharing competitors and enhanced services increase, notable changes are occurring in the transportation model. Despite the cost-effective means and flexibility of ridesharing, both drivers and users will need to be aware of the connected environment and how it will impact the ri...
During the Cold War the armies of East and West faced off along thousands of miles of borders with tens of thousands of tanks, artillery units, defensive positions, guns and soldiers. The costs for supporting these defensive postures were enormous. Nations invested hundreds of billio...
Interoperability continues to be one of healthcare IT’s biggest trends in 2016 as the industry sees momentous forward movement. In fact, interoperability is not a new trend. It has been an important mission (and a challenge) for healthcare administrators for decades, but the past coup...
Artificial intelligence and machine learning systems are made up of code and algorithms, and as such, they work as fast as computers can process them. Often this means massive amounts of learning can be accomplished every second without stop 24x7x365. Code doesn't need to take weeken...
Skyworks Solutions, Inc., has launched a suite of new high performance, fully integrated front-end modules targeting the rapidly expanding Internet of Things market including the connected home, industrial automation and energy management, among others. Skyworks' newest modules are the...
Bsquare has entered into an agreement with a global supplier of smart grid and smart city solutions to utilize Bsquare DataV™ Internet of Things (IoT) software to enable a distributed app environment across its smart meter offerings. The one-year subscription agreement, which includes ...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to ...
Last week, I was a keynote speaker at the Mobile Edge '16 conference in Lisbon, Portugal. Following the conference I met individually with many different companies. These companies represented a variety of industries, sizes and digital maturity levels. I was sharing my latest digital ...
SYS-CON Events announced today that Embotics, the cloud automation company, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Embotics is the cloud automation company for IT organiza...
Last week we talked about WebSafe and how it can help protect against phishing attacks with a little piece of code. This is important since malware can steal credentials from every visited web application from an infected machine. This time we’re going to look at how to protect against...
Explosion of data volumes. Interoperability of systems. Large servers in the sky that can analyze enormous amounts of data, compute complex algorithms in real time, and communicate in microseconds. Mobile communication through devices that patients, providers and staff all carry all th...
The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DN...
I suppose I should explain. As many of you who have read my articles and posts the last few years already know, medical devices in the Internet of Things is topic that is near and dear to my heart. Literally. For over 10 years, I have had a pacemaker (see my piece The Internet of Every...
For enterprises disrupting the marketplace, technology is the key enabler that is helping them create new business models and processes. Open source software has played an enabler role in developing these new scalable and high-performing systems. From the digital transformation perspec...
The growing popularity of IoT has spawned the debate on privacy once again. Last year, Samsung stoked controversy by warning customers that their Smart TV Voice Recognition system was capable of “listening” to personal and sensitive information spoken by customers. Not only this, all o...