M2M Webinar: Investing in an IoT Solution

IDC analyst Carrie MacGillivray will be the featured speaker during this practical session about how to prepare and manage a M2M or IOT program in order to best control costs. Ms. MacGillivray will review the IDC workbook entitled “Investing in IOT Solutions: Asking the Right Questions to Minimize TCO” and answer questions on everything from data usage costs and troubleshooting to organizational planning issues.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Overcoming complexity – the race to deliver scalable, secure IoT

It is now a well-publicized fact that the IoT predictions from several years ago have completely missed their mark, and arguably are the biggest technology prediction miss in history. Complexity caused by siloed technology stacks and a fragmented mobile network landscape are heralded as the key reasons that have held IoT back.
Watch Now

IOT DATA MONETIZATION WEBINAR

Ericsson

With the sheer volume of data generated by the Internet of Things, communications service providers (CSPs) are in an excellent position to become high-value data players in the fast-growing information supply chain. But how will you start to make this data work for you?
Watch Now

Mitigating IoT Security Vulnerabilities with MQTT

IoT deployments carry inherent risks like undeterred access to devices, poor connectivity and a very large threat surface. With ever-increasing incidents of intrusion, denial of service, spoofing attacks, etc., businesses must take a strategic view of IoT security. IoT developers and Solutions Architects know that a solid security architecture for IoT will require encryption, authentication, and authorization to run at scale. However, today, IoT security needs a different paradigm than IT security – here is where MQTT comes in to help in mitigating IoT security vulnerabilities.
Watch Now

CYBERSECURITY FOR IOT PRODUCTS

The Internet of Things (IoT) has gained importance in recent years and the security of IoT products is paramount for consumers and users especially when it comes to accessing personal data from encrypted connections between IoT devices. When assessing an IoT system, it is important to look at the entire system – from the device or smartphone application (app) to the back-end or cloud solution.
Watch Now