5G is way too inefficient for the IoT, argues Peter Cochrane
There will be more than 50 billion smart devices in the world by 2030, managing and monitoring everything from our health to our roads. But what are the pros and cons of handing city management over to the IoT?
'Customers complained to me that we were a little bit too blackbox', says COO Matt Quinn
'The overarching goal is to connect all the devices so we can have an overview from birth to trash'
How can businesses realise the results of APM 4.0?
Cloud, mobile, social media, big data, IoT and organisations operating in real-time on a global scale have driven sweeping changes to the database arena
No single vendor can provide a complete edge computing solution - the edge requires collaboration
Managing storage for large, complex distributed containerised applications is a whole different game; industry insiders discuss how the options stack up
Living Lab 2.0 is a test environment for businesses seeking to innovate in the home energy market
Rancher has big - and small - plans for the container orchestration platform
As more renewable energy sources come online grids and market mechansims are changing and controlling them must be a collaborative effort, says director of systems operations Arjan Stam
Government expected to push for legal recognition of emerging TS 103 645 global IoT security standard
Telnet belongs in a museum, warn security specialists, but is still rolled into modern internet-connected devices
Can intelligence-led service introduce cruise travel to a younger generation?
Vote for your favourite technology products - and technology hero - in Computing's annual Technology Product Awards 2019
Sidewalk will use low-bandwidth 900 megahertz spectrum to enable communication with IoT devices a mile away
Critical vulnerabilities in Telestar IoT radio devices could enable attackers to remotely capture systems
Hackers can also transmit audio as commands and force a play stream using the security bugs
IoT Azure security tool can identify configuration issues before they can be used in a cyber attack
Security researchers warn that six of the 'URGENT/11' vulnerabilities are critical and could facilitate remote access attacks on embedded devices
IT security specialists need to look at IoT security in buildings in a completely different way, says Cundall director Chris Grundy
The construction industry still hasn't got to grips with the IT security challenges of IoT devices embedded in buildings
Silex attacks any Unix-like system with default login credentials
Emma Stevens and Samantha Kerins of law firm Coffin Mew discuss differing opinions around some of the key technology trends of 2019
Digital transformation doesn't happen overnight - but when we look back, we realise how far we've come