Allen Bernard is a freelance technology journalist, editor and business writer with 18 years of experience covering cloud, IoT, cyber security, networking, and many other tech topics.
This is just one of 17 in-depth case studies I worked on this summer for The TBM Council in support of their annual awards program.
When Iridium Communications Inc. launched its first satellite network in 1998, cell phones were still just phones -- you called people, people called you. Any phone that could be categorized as "smart" was just hitting the market. At the time, Iridium's big idea was to provide satellite-based cell phone service to anyone anywhere in the world.
While this was -- and still is -- a great idea, what the company didn't anticipate was the rate at which land-based cell phone towers would be erected....
Author's note: This is an article I helped write and edit for industrial technology provider ABB.
Although predictive maintenance provides information for timing maintenance activities accurately, it has limitations. Acquiring data using a handheld device (a common practice) is labor-intensive and takes people away from other more productive activities. It is also difficult to gather data from equipment that is in hard-to-reach areas, or areas that pose a danger to the person collecting the data.
However, advances in wireless technology (including a significant drop in deployment costs) a...
This is the 2nd white paper I've done for the IoT Cybersecurity Alliance, an industry group made up of Symantec, Palo Alto Networks, AT&T, Qualcomm, IBM, Trustronic, and Nokia. The goal of the alliance is to lift the veil on IoT security so all can benefit from the potential of these exciting new technologies.
Worked with senior ABB management to produce a white paper explaining how digital transformation and collaboration can enhance productivity in the process industries.
Author's note: I worked with a group of 15 cyber security, networking, and IoT experts over a period of four weeks to create this paper.
Demystifying IoT Cybersecurity The Internet of Things introduces new vulnerabilities across the entire ecosystem. Here's what you need to know and prepare for.
The Internet of Things (IoT) is becoming ubiquitous as new and old devices plug into a variety of networks. From smart coffee makers in the kitchen to sensors em- bedded in 20-year-old motors on the factory floor, the IoT is expanding rapidly ...
As technologies go, augmented reality (AR) is not new, but it wasn’t until Pokémon GO exploded onto the scene this time last summer–quickly becoming the most used mobile app in history–that consumers and marketers were introduced to the potential of this revolutionary technology.
This is gated content on NetworkWorld. You'll have to enter your email address to see it ... but it's worth it! :-)
How IT departments are keeping the lights on while creating innovative development teams.
In the end, there is no one technology to "rule them all". The hardware, software, firmware, protocols, chipsets, applications, network architectures, devices, routers, cabling, switches, standards-setting bodies, politics, and so forth, it takes to the make the internet "faster" is mind-numbing.
On Thursday February 2 the IRS put out a press release warning schools, hospitals, restaurants, tribal groups and "others" to be on the lookout for sophisticated W-2 phishing scam that has netted crooks millions of dollars and cost employees, in some instances, their jobs. This diverse list of potential targets and "others" is of note because the W-2 phishing scam is growing in reach and effectiveness, hoovering up a larger and more diverse group of victims.
I created 37 cyber-security related articles for this project aimed at helping people stay safe online. We covered a range of topics from identity theft to the use of VPNs for for travel and remote working as well as detailing how USPS internal policies keeps vendor information safe and secure.
One of six case studies I did for TBM Council's 2016 TBM Awards -
Technology is the lifeblood of business at JPMorgan Chase, but the business viewed
IT as an expensive enigma with little relation to business value. The problem was not
the technology itself but the way IT and the business communicated about it, each
side talking past one another because they lacked a common language and context.
“The businesses were frustrated with the bills they’d receive from IT,” says Suzette
Unger, JPMorgan Chase’s CFO for Global Technology. “There was little translation
into business terms. They had no way to understand them or act on them.”