I recently kicked off a series about security and the Internet of Everything, a pivotal topic that starts with the roots of IoE, IoT and M2M, which I explore in more depth in the first post. Machine-to-Machine connections make up a huge portion of the
“The farther back you can look, the farther forward you are likely to see.” – Winston Churchill It is nearly impossible – even foolish – to look ahead without looking back. Glimpses into the past can give us inspiration for new innovations and even
The UTC TELECOM conference wraped recently and the Connected Grid team has had a great time on-site! It’s been exciting for us to demo key components of our product portfolio and connect with many of our core audiences. Centered on the theme of
Towards developing a Secure Architecture for the Internet of Everything, I plan to kick off a series of blogs around this pivotal topic. In discussing security and the Internet of Everything, the first question that comes to mind is, “Which
When natural disasters strike, our first instincts are to phone or text loved ones; check news and social media sites; and go online to lend support. These connections become our lifelines. In the process, mobile devices become paramount in connecting
Cisco published earlier this week the 2013 Cisco Global IT Impact Survey, exploring the relationship between IT and the business goals of the companies they support. Among other things, 42 percent of those interviewed responded that they know about
Data generated by people and data generated by machines is actually quite different and as we move from the Internet of Things to the Internet of Everything, this has some pretty interesting implications. Data generated by things or machines is
A connected toothbrush that gives you a virtual checkup every time you brush – is that weird, or near-term reality? I recently came across the article “25 Weirdest Things in the ‘Internet of Things’” in InfoWorld, which focuses on the different