Two more days to go… all the meetings, preparation, planning, and a tiny bit of stress is done and now for the big event itself – Mobile World Congress 2014. It’s going to be a massive show for SAP and I’m very much looking forward to
In December, I blogged about Predictions 2014: Wager on the Internet of Everything (IoE) for the Manufacturing Industry. In terms of thought and verbal capital, investments in IoE/IoT (Internet of Things) are proliferating from top of mind to tip of
An embeddable tooth implant sends patient information to a dentist in real-time. A smartwatch responds to touch to help ease the loneliness of long distance relationships. A bracelet records daily physical activity and caloric intake and provides
In a world of digital distractions and shrinking attention spans, brand loyalty and customer engagement often wind up “out of bounds.” But forward-thinking organizations — including the National Basketball Association (NBA) — are using technology to
Up in the mornin’ and out to school The teacher is teachin’ the Golden Rule American history and practical math You study’ em hard and hopin’ to pass Chuck Berry’s old hit “School Days” sums up an educational model that has
Aside from an ill-timed Milanese taxi strike and a lot of rain and snow, the first CiscoLive of 2014 was a fascinating week. Cisco EVP Rob Lloyd announced our latest Cisco ONE capabilities with a new APIC Enterprise module and the new Inter Cloud
Your house-cleaning robot connects to your lighting system, which connects to your garage door, which connects to your car. All of these devices in turn connect to your smartphone, which, among many other things, enables YOU to connect to a community
As information consumers that depend so much on the Network or Cloud, we sometimes indulge in thinking what will happen when we really begin to feel the effects of Moore’s Law and Nielsen’s Law combined, at the edges: the amount of data and our
On January 16, 2014, Proofpoint discussed a spam attack conducted via “smart devices which have been compromised.” Among the devices cited by Proofpoint as participating in the “Thingbot” were routers, set-top boxes, game consoles, and purportedly