Entries by Hunter Smith

,

The Complete Omni-Channel Retail Report: What Brands Need to Know About Modern Consumer Shopping Habits in 2018

 Tracey Wallace / 21 min read No single formula, algorithm or crystal ball can tell you for sure when and why each individual customer will make a purchase. A senior citizen looking to buy a smartwatch might be texted a recommendation by a grandchild, then walk into a physical store to purchase. That same grandchild, on the […]

,

Understanding the emerging world of ‘fake everything’ is vital for figuring out what you and your company can do about it.

Mike Elgan (Computerworld (US))30 September, 2017 21:00 Credit: Michael Kan / IDG “Information wants to be free.” That was the motto of truth-seeking digital activists in the ’80s and ’90s. The motto today is: “Information wants to be fake.” Just look at the news this week for a glimpse of how much chaos fake news […]

,

Overcoming IoT Adoption barriers

Samuel Greengard Added to IoTplaybook or last updated on: 04/16/2018 No one disputes the IoT’s potential. A March 2018 report from Capgemini, however, makes clear that formidable barriers continue to inhibit its adoption. The business and IT consulting firm surveyed senior executives at more than 300 organizations worldwide, analyzing cross-sector IoT use cases to identify which […]

14 IIoT Vendors You Shoud Know

Avi Nowitz Machine Learning for Predictive Asset Maintenance There are a large number of solutions providers in the Industrial IoT category and buyers struggle to find information on emerging and less recognize vendors. Even though the large industrial players can outspend startups in marketing, a major source of innovation is from young and aggressive newcomers. […]

How to Know Whether IoT Devices Are Safe

Samuel Greengard Added to IoTplaybook or last updated on: 04/17/2018 It’s no news flash that Internet of Things (IoT) vendors, in a rush to get products to market, don’t always focus on security. In recent years, vulnerabilities have been reported in everything from cameras and automobiles(link is external) to medical equipment(link is external) and industrial machines(link is external). Security analyst Bruce […]