This year we launched the first annual Research Symposium at the IoT World Forum in Chicago. This Symposium brought together scholars, industry leaders and visionaries from across the world to discuss how academia and industry can partner to address
Arguably 2014 is already turning out to be a big year for cloud. Some have even called it “The Year of the Cloud.” Cloud implementation continues to play an essential role in overall IT strategy: A recent report says 80% of cloud adopters saw
As I described in my previous blog How the Mobile Industry Will Make Money in the Future, the history of the mobile industry has involved huge and successful waves of revenue growth. Lucrative revenues from the first wave of voice and the second
The mobile market continues to evolve at a blindingly fast pace. It seems as though new faster, sleeker, and more powerful mobile devices are launched every day. And new categories of mobile devices are created almost overnight. The number of
This post is co-authored by Martin Lee, Armin Pelkmann, and Preetham Raghunanda. Cyber security analysts tend to redundantly perform the same attack queries with different input data. Unfortunately, the search for useful meta-data correlation across
Technische Universität Darmstadt, usually known as TU Darmstadt is a research university based in Germany. It was founded in 1877 and over the last 137 years has grown to be...
This post is co-authored by Andrew Tsonchev, Jaeson Schultz, Alex Chiu, Seth Hanford, Craig Williams, Steven Poulson, and Joel Esler. Special thanks to co-author Brandon Stultz for the exploit reverse engineering.
Mobile communications today is virtually indistinguishable from the first mobile call that was made four decades ago. We have gone from monster handsets to pocket-sized portable computers. Mobile communications has become an essential part of our
A recent Bloor Research Market Update on Advanced Threat Protection reminds us of something that many security vendors have long been loath to acknowledge: traditional, point-in-time technologies, like anti-virus or sandboxes, are not entirely