5 Biggest Mistakes in IoT PoCs

Let me start by saying I love proof of concepts (PoCs), especially when Splunk is involved. PoCs allow me to validate the technical feasibility of our platform with customers and remove any doubts about implementing the technology. While a PoC is an effective way for businesses to evaluate new technologies, you may encounter pitfalls if you’re not well prepared. If you want to give your PoC the best chance of success, it’s important to understand these common mistakes and how to avoid them.


Using IoT with Serverless to Tackle Global Issues

“The Internet of Things is an industry that has not exploded the way many thought it would”, is the opening line of Matt Werner’s reputed article Dzone’s 2019 Guide to Internet of Things (IoT). Werner, who is now publications manager at Devada, most aptly describes the industry as one that brought along with it a lot of hope but failed to deliver on them at the scale anticipated almost a decade ago.


How IoT -- and Grafana -- Are Enabling Electrification Across Rural Africa

The Internet of Things has transformed people’s lives, enabling everything from “smart homes” to remote health monitoring. And now a startup called AMMP Technologies is using IoT – and Grafana – to help bring electricity to rural Africa. Hendrik Broering, COO and cofounder of AMMP, told the audience at GrafanaCon L.A. about a village in Tanzania called Changombe, with a population of about 2,000 and no access to electricity until 2017.


There’s no such thing as 100% secure

When Gronk the caveperson chipped out the first wheel from a slab of granite only to watch it roll away down a hill at some speed, he discovered we could build things to make our lives easier. We took this idea and ran with it, and now we have internet connected shoes. However, we also have cybercrime, data theft, phishing, scams, ransomware... the list goes on.

Edge Data Management Solutions for Internet of Things (IoT)

The key challenges preventing IoT initiatives to be successful are the inability to capture and process data directly from thousands of edge devices as well as the lack of operational visibility and control of the edge. Dinesh Chandrasekhar, Director of Product Marketing for Data-in-Motion at Cloudera, talks about solutions designed to solve these IoT challenges.
power admin

New Horizons for Mobile Edge Computing (MEC) and IoT

As mobile and IoT deployments play an increasing role in enterprise networks, organizations are looking to more appropriate architecture—such as edge computing—to relieve their security and device management burdens. Edge computing is still in its relative infancy, and the platforms and services needed to orchestrate edge deployments are evolving themselves. In this article, we’ll be looking at some of the issues and available options.


IoT and Cybersecurity: What Are We Protecting?

We kicked off RSA Conference 2019 last week with bold plans for the future, including our innovation to improve efficiencies in securing futures, combating the opioid crisis and protecting critical infrastructure. This year, we saw increased interest in operational technology (OT) security at our booth. Why connect this to the network? How can I identify the risk associated with it? Where would I get the data?


Machine data processing and 5G, IoT, and AI at Mobile World Congress 2019

One thing that’s become evident to me after years attending Mobile World Congress is that, in fact, there are several events running in parallel, with a few common denominators: network technology providers, device manufacturers, telecom operators, and services companies all come to Barcelona to present and demonstrate the latest and greatest of the year’s dominating trends.