Introducing IoT: The Internet of Things

Introducing IoT: The Internet of Things
Show More

Related videos

Achieving IT and Business Alignment
Whether generated by musical instruments or the human voice, harmonies deliver a melodic blend of tones that are most pleasing to the human ear. Now, to draw a quick parallel between music, business and IT, you could say that when enterprise IT and business are aligned, it creates a state…
Big Data: Good for the Customer Not Just the Business
An important lesson learned about Big Data is that collecting and storing data may be the easier part of the job, analyzing and utilizing the data, well, that's the challenging task. It's become abundantly clear, that today's organizations need to work through the challenges and come full circle with their…
Insider Threats: Avoiding the Next Snowden
Not since the days of Daniel Ellsberg and the Pentagon Papers have we seen the likes of a classified material leak of the size and significance executed by the now infamous NSA contractor, Eric Snowden. This devastating loss of sensitive information has served as yet another wake-up call to organizations…
Customer Engagement Today - A Revolutionary Approach
What is a top-of-mind issue for business and IT leaders today? Well, the title of our report is sure to give it away. It's of course, the customer. In this report, we'll be talking with technologist, Alan Trefler, author of the popular new book, Build for Change: Revolutionizing Customer Engagement…
Authentication, Authorization and Accounting: Best Practices
It seems that a day doesn't go by when we don't hear of yet another high-profile breach that has made its way to the front page and the nightly news. These events have CIOs and business leaders intensely focused on their security policies and constantly evaluating and reevaluating their defenses.…
Cyber Ethics: A Growing Business Challenge
Organizations today are trying to stem the tide of increasing cyber attacks, as well as inappropriate online behavior, by raising the level of cyber ethics. In this report, Peter Vogel, Partner with Gardere Wynne Sewell LLP, examines this new area of concern and the issues it raises, especially for IT…
User-Centered Design: Benefits, Challenges and Best Practices
For well over a decade, UCD methodologies have helped shape the technology solutions and devices that touch our daily lives. In this report, Rob Stokes, Director of User Experience at Spanning Cloud Apps, introduces viewers to the world of user- centered design and discusses its benefits and challenges. In addition,…
The Five Big Bang Theory of the Internet
In this WatchIT On the Horizon program, The "Five Big Bang" Theory of the Internet, Peter Vogel, a technology expert and attorney from the firm of Gardere Wynne Sewell LLP, based in Dallas, Texas explores the evolution of the Internet and provides interesting insights about its history and where it…
Creating Winning Social Media Strategies - With Charlene Li
A fundamental power shift is underway in relationships between organizations and customers. Traditional one-way, seller-to-buyer communication is evolving into a two-way dialog, as social media technologies give buyers a voice. With examples from Oracle, Southwest Airlines, Walmart, Comcast, and Starbucks, Charlene Li shows how companies can use social media tools…
Social Media in the Workplace: Advice and Best Practices
In this report, James Boyan, an attorney with the New Jersey-based law firm of Pashman Stein, explores current issues with the "social at work" scene. We'll learn about government regulation and oversight, as well as the current thinking on employer social media policies, to name just a few. By watching…
Free Speech, Internet Privacy and the 'Right to Be Forgotten' - Advancing the Management Skills of IT Professionals
Freedom of speech is an ideal that historians tell us has its roots in the early 5th century; the concept is generally credited to the ancient Greeks. The right to privacy is an equally coveted principle that has had an interesting history as well. In fact, Louis Brandeis, a prominent…
Incident Response Plans - Advice and Best Practices
CIOs, IT and business leaders must be proactive in their planning and always ready to respond when it comes to cyber threats and attacks. Security experts agree that attacks are no longer a matter of "if" but are now clearly a matter of "when" for organizations today. A critical element…