How IoT technology transforms public health

FRANK CUTITTA | December 13, 2016

article image
Few expected that fitness devices would become a fad and now control the 10,000 steps everyday that we must perform people is a topic of conversation at any dinner or cocktail. Even walking around the office is becoming an extension of the gym and if ten years ago no one would consider these "professional walks" as a benefit, today many discount the 3,000 steps that come to perform internally of their daily average.

Spotlight

Winjit Technologies

With over 200 clients across 44 countries globally —including some of the leading Fortune 500 companies— and with 10,000+ man years of experience of delivering enterprise software solutions across conventional technology and mobile based technology, Winjit offers an optimized and fully integrated stack of business mobility and software solutions.

OTHER ARTICLES

Which IoT Applications will Benefit Most from Edge Computing?

Article | March 2, 2020

Edge computing refers to information being processed at the edge of the network, rather than being sent to a central cloud server. The benefits of edge computing include reduced latency, reduced costs, increased security and increased business efficiency. Transferring data from the edge of a network takes time, particularly if the data is being collected in a remote location. While the transfer may usually take less than a second, glitches in the network or an unreliable connection may increase the time required. For some IoT applications, for example, self-driving cars, even a second may be too long. Imagine a security camera that’s monitoring an empty hallway. There’s no need to send hours of large video files of an empty hallway to a cloud server (where you will need to pay to store them). With edge computing, the video could be sent to the cloud only if there is movement detected in the hallway.

Read More

How Retail Security Can Welcome IoT Innovations Without Putting Customers at Risk

Article | March 2, 2020

Retail businesses, from mom-and-pop shops to major department stores, are investing heavily in technology to enhance the in-store experience. With the imminent arrival of mainstream 5G, smarter systems are expected to dominate the retail space as the internet of things (IoT) expands. But as we know from connected device deployments in other sectors, such as financial services and healthcare, the IoT is fraught with security vulnerabilities. For retail security, the risks of deploying IoT devices are no less dire. As organizations rely more on the IoT to enable internet connection at every stage of the retail process, protecting IoT infrastructure is critical. Getting on board with the right mindset can go a long way toward achieving a win-win for retail security.

Read More

How AI and IoT Provide Value in Construction

Article | March 2, 2020

Internet of Things (IoT) sensors predominantly provide visibility to an operating stack – enabling access to real-time and accurate operational data. Laying analysis on top of that data produces dashboards and other visual representations but artificial intelligence (AI) extends this further by harnessing the data streams to train models and identify patterns. Observations can then be made by a computer much like a human analyst could but at tremendous speed and scale. AI makes it possible to anticipate and predict events in a robust and scalable way. This can create huge business advantages. In this article, we’ll look at applications of AI and IoT in construction.

Read More

The $6trn importance of security standards and regulation in the IoT era

Article | March 2, 2020

We live in an era of digital transformation where more and more devices are connecting to bring new and innovative levels of service and efficiency. This transformation spans across all markets and the rate of progress is breath-taking, says David Maidment, director, secure device ecosystem at Arm.This change brings huge benefits, but it also brings threats in the shape of an expanding cybercrime footprint. Every connected device is a hack potential. Rather than attacking traditional IT equipment, the cybercrime threats start to move to all aspects of our lives. It is predicted that by 2021 there will already be US$6 trillion (€5.37 trillion) of cybercrime damage (Source: Cybersecurity Ventures Official Annual Cybercrime Report), which is a staggering number pinned against financial loss for businesses, without considering the damage to reputation and other harder-to-measure statistics.

Read More

Spotlight

Winjit Technologies

With over 200 clients across 44 countries globally —including some of the leading Fortune 500 companies— and with 10,000+ man years of experience of delivering enterprise software solutions across conventional technology and mobile based technology, Winjit offers an optimized and fully integrated stack of business mobility and software solutions.

Events