Author user photo

Security of IoT and Wearable Devices: Conversation with Tim Hahn, Chief Architect, IoT Security, IBM

Tim Hahn, Chief Architect, IoT Security - IBM

What are the pitfalls when creating security solutions for IoT devices? What are the workplace vulnerabilities for wearable devices? How will device security change over the next two years?

Author user photo

8 Tech Hacks in Choosing Linux VPS Hosting for Online Business

Joy Mali, Digital Marketing Head - TIS India

Linux VPS hosting plays an important role if you are considering the performance curve of your online business or application. How can you find the best service for your business?

Author user photo

Enterprises Catch the Mobility Wave with A DIY Approach to Apps

Babak Sardary, CEO and Co-Founder - ScoopMAE

Customized mobile apps capture employee know-how for solving issues and aid data-driven decisions. Now they’re affordable, quick and scalable.

Author user photo

Cybersecurity Alert: British Invasion

Steve Morgan, Founder and CEO - Cybersecurity Ventures

Many British cybersecurity companies have landed on the Cybersecurity 500 list of innovative cybersecurity companies. Here’s a look at five of them.

Author user photo

M2M Becomes IoT and Enters More of the Enterprise Market

Mike Sapien, Principal Analyst Enterprise Telecoms - Ovum

Four technologies are enablers of M2M evolving to the IoT space. What are the catalysts for growth?