IBM Watson: How it Works

| March 1, 2016

article image
Browse our library of cognitive APIs and Powered by Watson apps. Begin experimenting by starting your free trial of Bluemix.

Spotlight

Telarus

'Built for You', Telarus is the largest privately-held technology services distributor (master agent) in the United States. Our dynamic agent-partner community sources data, voice, cloud, and managed services through our robust portfolio of 185 leading service providers. We are best known for our home-grown software pricing tools and mobile apps that are unique in the industry. To help our partners grow their businesses, we’ve assembled the best support organization in the industry, which includes cybersecurity, SD-WAN, Cloud, mobility, contact center, and ILEC specialty practices whose primary goal is to help our partners identify and design the right technology solutions for their customers. To learn more about the Telarus opportunity, please visit www.telarus.com, or follow us on Twitter @Telarus.

OTHER ARTICLES

IoT as a Service: Lowering the Cost Barrier of IoT for Small and Mid-Sized Businesses

Article | March 18, 2020

There are already 20 billion IoT-connected devices, and 8 billion of those are devices used by enterprises, according to a report by Gartner. The impact of the Internet of Things market is potentially $11 trillion by 2025. The investment in IoT has come primarily from large businesses, but the technology is increasingly available via ‘as-a-service’, making it possible for businesses of all sizes to benefit. The ‘as-a-service’ model reduces the cost of ownership and capital expenditures and makes it easy for small businesses to investigate IoT with smaller up-font investments and less risk. Frank Della Rosa, research director at IDC, said that “Software as a Service (SaaS) continues to be the most highly deployed cloud segment, representing a commanding 62.4% of the total cloud market revenues.”

Read More

Securing industrial networks: it’s a journey

Article | March 18, 2020

Trying to secure the industrial network in one go is like boiling the ocean. Better to view it as a journey. At each step in the journey, you’ll make incremental changes to people, process, and technology. Minimal security. This is the current state for most manufacturers. If you’re here, you’ve segmented the industrial network from the IT network. Traffic can’t cross from the IT network to the industrial network without clearing the DMZ. You can block malware from entering the industrial network. You can block malware from leaving the industrial network to infect the enterprise network. But if the industrial network is exposed to malicious software, you don’t have a way to contain it. That means the malware might affect multiple manufacturing cells or production lines — even multiple plants.

Read More

How AI and IoT Provide Value in Construction

Article | March 18, 2020

Internet of Things (IoT) sensors predominantly provide visibility to an operating stack – enabling access to real-time and accurate operational data. Laying analysis on top of that data produces dashboards and other visual representations but artificial intelligence (AI) extends this further by harnessing the data streams to train models and identify patterns. Observations can then be made by a computer much like a human analyst could but at tremendous speed and scale. AI makes it possible to anticipate and predict events in a robust and scalable way. This can create huge business advantages. In this article, we’ll look at applications of AI and IoT in construction.

Read More

Internet of Things (IoT): The Need for Vendors to Address Security

Article | March 18, 2020

By the end of this year there will be 5.8 billion Internet of Things (IoT) endpoints, according to Gartner. And depending on how IoT devices are counted the number is even higher. Statista, for example, estimates the device count for 2020 to be more than 30 billion. Security remains a big challenge for IoT as a strategy to be successful. IoT devices are still not being designed with security as a top priority.Mary O’Neill, VP of security at Nokia, noted in a press conference at MWC Los Angeles 2019 and reported by SDXCentral, that “if an IoT device today is plugged into the network and it doesn’t have protection on it, it’s infected in three minutes or less.”Jake Williams, founder of the security firm Rendition Infosec, said that “IoT vendors emphasize, often rightly, that their products improve quality of life, but they often neglect to disclose the risk of these devices to consumers. The onus of understanding how an IoT device might impact security should not be purely on the consumer. The vendor shares this responsibility.

Read More

Spotlight

Telarus

'Built for You', Telarus is the largest privately-held technology services distributor (master agent) in the United States. Our dynamic agent-partner community sources data, voice, cloud, and managed services through our robust portfolio of 185 leading service providers. We are best known for our home-grown software pricing tools and mobile apps that are unique in the industry. To help our partners grow their businesses, we’ve assembled the best support organization in the industry, which includes cybersecurity, SD-WAN, Cloud, mobility, contact center, and ILEC specialty practices whose primary goal is to help our partners identify and design the right technology solutions for their customers. To learn more about the Telarus opportunity, please visit www.telarus.com, or follow us on Twitter @Telarus.

Events