burgerlogo
article

All Articles

IoT Business Strategy

Establishing Your Voice and Presence as a Woman in IoT

Principal UX Designer at Nerdery, Emily Schmittler, discusses how women in IoT can bring perspective and humanity into devices that are cold and data-driven by solving real human problems.

Shannon Lee

Apr 3, 2019

article img

IoT Business Strategy

Establishing Your Voice and Presence as a Woman in IoT

Shannon Lee

Apr 3, 2019

article img

Consumer Products

Prototyping a Smart Cat Litter Box for $60

My coworkers wanted to be able to clean up quickly after their cats used the litter box. Here's a $60 IoT prototype that tweets them real-time updates.

Eric Zhang

Apr 3, 2019

article img

Consumer Products

Prototyping a Smart Cat Litter Box for $60

Eric Zhang

Apr 3, 2019

article img

Cybersecurity

IoT Security: Common Sense for Product Developers and Investors

IoT security issues arise from bad prioritization and short-termism. Security must be fundamental to IoT product development—even at the MVP stage.

JC Gaillard

Apr 3, 2019

article img

Cybersecurity

IoT Security: Common Sense for Product Developers and Investors

JC Gaillard

Apr 3, 2019

article img

Cybersecurity

Intro to IoT - 9 Major Keys to the Internet of Things

From safety and security to health and wellness. From virtual reality and entertainment to energy and geofencing. Here's your intro to IoT.

Guest Writer

Apr 2, 2019

article img

Cybersecurity

Intro to IoT - 9 Major Keys to the Internet of Things

Guest Writer

Apr 2, 2019

article img

Food and Beverage

Improving Hotel Worker Safety with Ultra-Wideband IoT

Hotel workers suffer ongoing harassment. RF technologies, specifically Ultra-Wideband (UWB), could make their panic buttons more effective.

Shiva Swaminathan

Apr 2, 2019

article img

Food and Beverage

Improving Hotel Worker Safety with Ultra-Wideband IoT

Shiva Swaminathan

Apr 2, 2019

article img

Asset Tracking

Leveraging Computer Vision for Asset Tracking Solutions

Computer vision offers high accuracy and reliability for asset tracking. It has advantages over Bluetooth and WiFi, but it requires lots of bandwidth.

Leverege

Apr 1, 2019

article img

Asset Tracking

Leveraging Computer Vision for Asset Tracking Solutions

Leverege

Apr 1, 2019

article img

Energy

Using IoT to Reduce the Shock of Blackouts and Load-Shedding

IoT is able to mitigate some of the effects of blackouts and load-shedding, enabling businesses to better handle the fallout.

Ron Bartels

Apr 1, 2019

article img

Energy

Using IoT to Reduce the Shock of Blackouts and Load-Shedding

Ron Bartels

Apr 1, 2019

article img

Connectivity

7 Challenges of IoT Software Development

IoT software development is an explosive minefield with more than a few issues along the road. The market requires high-quality solutions, scalable, robust, secure and user-friendly, and IoT development teams have to reassess their standard procedures to take everything into account. Here’s a list of seven software development challenges for IoT projects.

ELIFTECH

Mar 29, 2019

article img

Connectivity

7 Challenges of IoT Software Development

ELIFTECH

Mar 29, 2019

article img

Cloud Software

Amazon Web Services vs. Azure's Disaster Recovery Solutions

Disasters and outages can damage your reputation. Let's compare Amazon Web Services's (AWS) and Microsoft Azure's disaster recovery solutions.

Guest Writer

Mar 29, 2019

article img

Cloud Software

Amazon Web Services vs. Azure's Disaster Recovery Solutions

Guest Writer

Mar 29, 2019

article img

IoT Business Strategy

Microsoft Technical Program Manager Fights the Stigma of Mental Health in IoT & Tech

The first article in our Women in IoT interview series highlights the personal mission of Microsoft Technical Program Manager Beth Anne Katz to fight the stigma of mental health in tech and the workplace.

Shannon Lee

Mar 28, 2019

article img

IoT Business Strategy

Microsoft Technical Program Manager Fights the Stigma of Mental Health in IoT & Tech

Shannon Lee

Mar 28, 2019

article img

Connectivity

The Risk of "Credential Stuffing" to the Smart Home

"Credential stuffing" is a dangerous brute force attack to which smart home owners are particularly exposed. We need better admin. and cybersecurity practices.

Guest Writer

Mar 28, 2019

article img

Connectivity

The Risk of "Credential Stuffing" to the Smart Home

Guest Writer

Mar 28, 2019

article img

Asset Tracking

Privacy as a Privilege: The Flip Side of Tech Advances

From smart homes to smart cars to smart cities, IoT enables new government surveillance practices. What should the average citizen make of this?

Guest Writer

Mar 28, 2019

article img

Asset Tracking

Privacy as a Privilege: The Flip Side of Tech Advances

Guest Writer

Mar 28, 2019

article img
logo

The Most Comprehensive IoT Newsletter for Enterprises

Showcasing the highest-quality content, resources, news, and insights from the world of the Internet of Things. Subscribe to remain informed and up-to-date.

Looking to Advertise on IoT For All?

Check out our Partner Program to drive maximum value for your brand across our channels!