When you think about the San Francisco Bay Area, the term “Silicon Valley” comes to mind.
On my second full day as a resident of Colorado, a friend invited me to join him on a tour of a large-scale medical cannabis grow an hour or so north of Denver. The acre-plus greenhouse was breathtaking, not only for its verdant rows of marijuana, some heavy with buds, but also for what lurked below.
It’s set to be the perfect combination for the IoT (Internet of Things): the rapid growth of high-speed cellular networks, short-range wireless communications such as Bluetooth and Wi-Fi, and the introduction of IPv6, which has enough IP addresses for every grain of sand on Earth.
IT-data breaches are not new. But the recent high-profile data intrusions that have occurred as of late have certainly elevated the discussion.
When it comes to securing M2M devices and the data these devices send and receive, it’s up to members of the M2M value chain to be vigilant and proactive. It’s also up to M2M customers to be their own advocates when it comes to security.
A generation that has never experienced the world without the Internet and cellphones is entering the workforce. Naturally, we can expect business dynamics to change.
If you have ever been in politics or sales, then you have heard of FUD: Fear, Uncertainty, and Doubt. Used proactively, it can help disrupt things like a competitor’s sales pitch or a political opponent’s trustworthiness.
With millions of M2M customers still on 2G networks, there is still a lot of discussion about what will happen to the AT&T customers when the carrier officially sunsets its 2G network by Jan. 1, 2017.