IBM, Maersk launch blockchain-based shipping platform with 94 early adopters

Credit to Author: Lucas Mearian| Date: Fri, 17 Aug 2018 08:51:00 -0700

After launching a proof of concept earlier this year, IBM and Maersk have unveiled TradeLens, the production version of an electronic ledger for tracking global shipments; the companies say they have 94 participants piloting the system, including more than 20 port and terminal operators.

The jointly developed electronic shipping ledger records details of cargo shipments as they leave their origin, arrive in ports, are shipped overseas and eventually received.

To read this article in full, please click here

Read more

Carrier Grade Security Means … Using Carrier Grade Security

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Wed, 15 Aug 2018 12:05:57 +0000

It’s a common mistake in enterprises to copy-paste security solutions from a peer. Strategies can be recycled, but sadly with even very similar businesses almost always have radically different IT and security requirements. I recall one hospital that looked at a nearly identical peer hospital that was only a few miles away. Much of the…

The post Carrier Grade Security Means … Using Carrier Grade Security appeared first on .

Read more

Why you should consider a basic operations strategy in your digital transformation

Credit to Author: Greg Johnson| Date: Tue, 07 Aug 2018 18:49:32 +0000

The hype around the Digital Transformation can be overwhelming, causing many well-intentioned operations to jump into something before they really have evaluated what it is they want to achieve.  The… Read more »

The post Why you should consider a basic operations strategy in your digital transformation appeared first on Schneider Electric Blog.

Read more

Explained: What is big data?

Credit to Author: Pieter Arntz| Date: Fri, 03 Aug 2018 15:00:00 +0000

In our explained series, we talk about the impact of big data on our society. What is it, who uses it, and for what purposes?

Categories:

Tags:

(Read more…)

The post Explained: What is big data? appeared first on Malwarebytes Labs.

Read more

Our Extensive Survey on IoT Cybersecurity Has Remarkable Top Consequence

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Thu, 26 Jul 2018 12:16:18 +0000

Trend Micro recently conducted a global survey of IT and security decision makers. When asked about the top consequence to IoT security, many would have expected it to be data loss. However, the top consequence named with 52% of respondents was “Loss of Customer Trust.” IoT has a physical component that is unusual in the…

The post Our Extensive Survey on IoT Cybersecurity Has Remarkable Top Consequence appeared first on .

Read more

Preparing for Shadow OT: A Hospital Case Study

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Wed, 25 Jul 2018 17:09:51 +0000

The convergence of IT and OT is happening more rapidly than IT expects. Once upon a time, IT was so expensive that enterprises built entire departments to prioritize spending and efficiently manage those costly investments. Now, IT is so inexpensive that any individual who wants IT can buy it (or rent it). This is “Shadow…

The post Preparing for Shadow OT: A Hospital Case Study appeared first on .

Read more

Super-fast IoT Enabled 5G is Right Around the Corner, Or Is It?

Credit to Author: Steven Carlini| Date: Wed, 18 Jul 2018 15:30:00 +0000

Winston Churchill said it best: “Those who fail to learn from history are doomed to repeat it.” We all experienced the infamous 3G to 4G mobile network transition. Although the… Read more »

The post Super-fast IoT Enabled 5G is Right Around the Corner, Or Is It? appeared first on Schneider Electric Blog.

Read more

IoT domestic abuse: What can we do to stop it?

Credit to Author: Christopher Boyd| Date: Wed, 11 Jul 2018 15:00:00 +0000

A disturbing new use of technology against loved ones has come to light: Internet of Things (IoT) domestic abuse cases are being reported, and security experts are wondering how best to tackle this new problem. What is it? And more importantly, what can we do to fight it?

Categories:

Tags:

(Read more…)

The post IoT domestic abuse: What can we do to stop it? appeared first on Malwarebytes Labs.

Read more

Three Key Enablers of IOT and Edge Computing Resilience

Credit to Author: Dave Johnson| Date: Fri, 29 Jun 2018 16:48:30 +0000

More data was generated in 2017 alone than over the previous 5,000 years of human history combined. This explosion of data owes much to the Internet of Things (IoT) phenomenon… Read more »

The post Three Key Enablers of IOT and Edge Computing Resilience appeared first on Schneider Electric Blog.

Read more

Safety Is Sustainable and Profitable

Credit to Author: Constantine Lau| Date: Mon, 18 Jun 2018 12:08:26 +0000

Ask any member of the oil and gas (O&G) industry what their main concern is and the most common response is occupational health and safety. Any business is vulnerable to… Read more »

The post Safety Is Sustainable and Profitable appeared first on Schneider Electric Blog.

Read more

How DSOs Respect EU Mandates with Smart Remote Terminal Units

Credit to Author: John Langley-Davis| Date: Mon, 18 Jun 2018 11:47:43 +0000

Under recently announced European Union mandates, electrical Distribution System Operators (DSOs) are tasked with improving the efficiency of their electrical distribution networks by 1.5 percent each year. In addition, they… Read more »

The post How DSOs Respect EU Mandates with Smart Remote Terminal Units appeared first on Schneider Electric Blog.

Read more