IoT Security Threats

IoT Security Threats

IoT is an incredible technology that will enable further economical and technological progress. Unfortunately, as is the case for all fast-growing new tech, it can be hard to properly manage the security aspect of IoT. Here are four threats to IoT security to look out for. Inherent Threats IoT devices are insecure by nature. Being…

IOT and 5G

The 5G revolution

4G offered a significant performance improvement over 3G, but 5G will have a far deeper impact. Back when 4G was introduced we saw the emergence of four pillars: cloud, mobile, social networks, and Big Data. These technologies emerged separately with minimal interaction, now we’re seeing something called “multiplied innovation”. Under this umbrella are united many…

Edge computing and Kafka

Event streaming with Apache Kafka at the edge is commonly used to provide the same open, flexible, and scalable architecture at the edge as in the cloud or data centre. Possible locations for a Kafka edge deployment include retail stores, cell towers, trains, small factories, restaurants, etc. “Edge Kafka” is not simply another IoT project…