Drone defense -- powered by IoT -- is now a thing

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World IoT Alert

Oct 08, 2018
Featured Image

A rough guide to your next (or first) fog computing deployment

Cisco’s Chuck Byers, a veteran of Bell Labs and a prominent member of the OpenFog Consortium, lays out what you should consider when designing your fog computing deployment. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Drone defense -- powered by IoT -- is now a thing
Woz takes a broad but hopeful view on AI, IoT
How updating an outdated industrial control system can work with fog computing
Augmented reality, fog, and vision: Duke professor outlines importance of smart architectures
Cisco sets $2.3B deal for unified access, multi-factor authentication security firm Duo
IoT analytics guide: What to expect from Internet of Things data
Thumbnail Image

Drone defense -- powered by IoT -- is now a thing

A new partnership between AT&T and startup Dedrone could bring drone defense to mainstream industry. But do we really need it? Read More

Thumbnail Image

Woz takes a broad but hopeful view on AI, IoT

Computing icon and Apple co-founder Steve Wozniak touched on a wide range of topics in a discussion with the audience at the 2018 Fog World Congress, in which he expressed his hope that AI and IoT could allow computers to help improve people’s lives. Read More

Thumbnail Image

How updating an outdated industrial control system can work with fog computing

An executive from fog computing startup Nebbiolo Technologies walks us through an example of how aging Industrial IoT (IIoT) systems can be brought up to date. Read More

Thumbnail Image

Augmented reality, fog, and vision: Duke professor outlines importance of smart architectures

A Duke University-based academic’s work on augmented reality (AR) has its roots in a deep understanding of fog, edge, and cloud architecture. Read More

Thumbnail Image

Cisco sets $2.3B deal for unified access, multi-factor authentication security firm Duo

Cisco closes on its $2.35 billion deal with network identity, authentication security firm Duo. The deal will help customers securely connect any user to any application on any network. Read More

Thumbnail Image

IoT analytics guide: What to expect from Internet of Things data

Data capture, data governance, and availability of services are among the biggest challenges IT will face in creating an IoT analytics environment. IoT analytics will also place new pressures on network infrastructure. Depending on the application and industry, IoT’s requirements will create more demand for additional bandwidth and less tolerance of latency within the network infrastructure. Read More

Join the Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

Get the Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — in-depth articles available only to Insider members. You get access not only to Network World's Insider content but to selected Insider content from Computerworld, CIO.com, InfoWorld, CSO, and other IDG publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World IoT Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.