Digital Signage Meets IoT: building success with a Raspberry Pi

Sixteen:Nine editor Dave Haynes talks with Viktor Petersson, CEO of Screenly, to explore his journey building a digital signage solution based on the very popular and very affordable Raspberry Pi.
Watch Now

Spotlight

5G touches almost every aspect of the way we live our lives. It’s not just about faster, bigger or better, it’s about utilizing 5G as an enabler to a series of services that we all will consume in every aspect of our lives. The time is NOW to consider the security implications and cyber risk profile that come with 5G. The business operational risk, legal risk and reputational risk of not only the companies who provide 5G transport, but all companies, nation states and individuals who provide the services that will utilize 5G. The time is now to evaluate the cyber risk posture and apply innovative thoughts to how we can approach these challenges today and build for what’s to come tomorrow.


OTHER ON-DEMAND WEBINARS

Ingest, Compute & Analyze IoT Data with AWS IoT Core & AWS Greengrass

Onica

Whether you’re using IoT to remotely control a device, track devices in the wild, or collect and predict performance and failures, you’ll need the power of AWS. By leveraging AWS' connectivity, storage, application, and analytics capabilities, you can build IoT-enabled apps quickly and at a fraction of the cost.
Watch Now

Open IoT technology in action: Realizing the power of collaboration

Red Hat

This webinar series explores the phases of readying IoT solutions for enterprise scale and robustness. It combines insights from early adopter research and customer case studies with recommendations on how to streamline IoT solution development.
Watch Now

Webinar January 12th: 2017 Trends in Information Security

Research

Security is changing. New innovations are making defenses such as anti-malware more of a reality than ever before, while yesterday’s incumbents are being remade through new acquisitions as well as selloffs of their legacy security businesses. So what’s next for security? For one thing, the scale of IoT security risk has finally been revealed – while the threat of ransom may provide attackers an alternative if malware becomes less viable. Will security’s innovations be ready enough, soon enough to protect enterprises from today’s emerging threats.
Watch Now

Smart City: A Challenging but Attractive Opportunity for Network Operators

Pyramid Research

The smart city opportunity for operators is interesting but not straightforward given uncertainties and differences country by country and operator by operator. In some markets central Government backing for a nationwide plan supports attractive growth, but in most cases growth is sporadic, while funding has dried up in many countries with Governments following austerity policies.
Watch Now

Spotlight

5G touches almost every aspect of the way we live our lives. It’s not just about faster, bigger or better, it’s about utilizing 5G as an enabler to a series of services that we all will consume in every aspect of our lives. The time is NOW to consider the security implications and cyber risk profile that come with 5G. The business operational risk, legal risk and reputational risk of not only the companies who provide 5G transport, but all companies, nation states and individuals who provide the services that will utilize 5G. The time is now to evaluate the cyber risk posture and apply innovative thoughts to how we can approach these challenges today and build for what’s to come tomorrow.

resources