VMware Introduces Liota: The IoT Developer’s Dream Rashi Varshney Jun 15, 2016 Liota (Little IoT Agent) is a vendor-neutral Open Source software development kit (SDK) for building secure IoT gateway data and…
We are big users of Big Data and IoT: George Fanthome, Group Head IT, Vedanta and CIO, Cairn Ankush Kumar Jun 15, 2016 Some of the areas we are looking to have significant impact of IT are logistics automation, connected mines, integrated…
Gaia Smart Cities acquires IoT Division of netCORE Solutions Ankush Kumar Jun 13, 2016 With this acquisition, Gaia is poised to become one of the fastest growing end-to-end IOT companies with solutions for both…
Top five threats created by vehicle software vulnerabilities Ankush Kumar Jun 11, 2016 As more vehicles are connected to the Internet and other services that all demand greater bandwidth, the possibilities for…
Internet of Things (IoT) to overtake mobile phones by 2018: Report Rashi Varshney Jun 3, 2016 From 2020, commercial deployment of 5G networks will provide additional capabilities that are critical for IoT, such as network…
Can IoT create Safe Cities? Srikanth RP Jun 1, 2016 By BS Teh, Senior Vice President of Global Sales, Seagate Technology Many governments and city leaders in India are turning to…
Wearable monitors and warns users of alcohol overdose Srikanth RP May 24, 2016 The US-based National Health Institute had recently issued a Wearable Alcohol Biosensor challenge with the objective of creating a…
Lessons from Safexpress’ IoT journey: Anjani Kumar, CIO, Safexpress Jasmine Desai May 23, 2016 Logistics is a fledgling vertical when it comes to implementing IoT , but the potential is immense. Anjani Kumar, CIO, Safexpress…
Ultramobile, Gaming and IoT shows good growth prospects for PC vendors: Gartner Ankush Kumar May 18, 2016 Companies like Acer, Fujitsu, Samsung, Sony and Toshiba have lost 10.5 percent market share since 2011. In the first quarter of…
How to secure Internet of Things? Mohd Ujaley May 16, 2016 One needs to be aware with what kind of (IoT) device they are dealing with, and then only they can protect the data being shared…