Home Insights

Insights

Lisa Uhrmacher

Breaking Down Barriers as a Woman in IoT

An interview with VP of IoT Sales at Vodafone, Lisa Uhrmacher, encouraging women to never underestimate the attributes and perspective they bring to the technology industry.
Image of Emily Schmittler, Nerdery

Establishing Your Voice and Presence as a Woman in IoT

Principal UX Designer at Nerdery, Emily Schmittler, discusses how women in IoT can bring perspective and humanity into devices that are cold and data-driven by solving real human problems.
Beth Ann Katz, Microsoft

Microsoft Technical Program Manager Fights the Stigma of Mental Health in IoT & Tech

The first article in our Women in IoT interview series highlights the personal mission of Microsoft Technical Program Manager Beth Anne Katz to fight the stigma of mental health in tech and the workplace.
Top-8-Most-Disturbing-Data-Breaches-of-2018

The 8 Most Disturbing Data Breaches of 2018

This post discusses 8 worst data breaches of 2018. The lesson? Ignoring insider threats is costly, and identifying early indicators can limit their impact.
AI-Ethics-and-the-Human-Problem

AI Ethics and the Human Problem

The ongoing AI revolution will change the world and our live. AI is a tremendous tool, but it could also unleash terror. We need ethical AI governance.
Image of a woman on a cell phone with a depiction of radiation coming out of it and connecting to a cell tower

SAR and OTA: Testing IoT Device Signals and Radiation

As IoT comes to market, Over-the-Air (OTA) and Specific Absorption Rate (SAR) testing, which ensures the safety and reliability of new devices, are vital.
City skyline and the words "Danger! Danger! Danger!"

Should We Worry About IoT Being Used as a Weapon of Mass Control?

IoT can extend an abusive person's reach manifold. Only by combining the social with the technological can we address this alarming risk.
Defending-Against-IoT-22Accidental22-Insider-Threats

Defending Against IoT “Accidental” Insider Threats

Recognizing vulnerabilities in an IoT network and taking steps to mitigate risks, both accidental and malicious, is critical for IoT implementers.
A person monitoring a woman at a coffee shop.

Cybercriminals Take Aim: The Dark Side of IoT

As IoT extends network connectivity to a plethora of new objects, the number of attack surfaces increases manifold. IoT cybercrime is on the rise.
9-Factors-of-a-Well-Tuned-IoT-Network-Architecture

9 Factors of a Well-Tuned IoT Network Architecture

There are nine factors IoT firms must be aware of to achieve success in the coming years. They involve ensuring that IoT tools can connect to other standards and systems, remembering that IoT Interacts with the real world, achieving future-proofed scalability through a hub-and-zone model, and more.

Popular

Resources