How to ensure device authenticity in IoT? An effective and robust authentication system enables IoT devices to link with each other, applications and people to deliver data from the device and to accept commands to the device. Secure authentication ensures proper data flow to and from an IoT device.

We all agree on the fact that authentication plays an important role in securing access for IoT devices. But, the authentication methods which are used in today’s IT may not…

IOT
Read more

Stopping human rights violations in industries with the help of IoT As a result of many class action lawsuits, much attention has been drawn to the concern of modern slavery and the prevalence of bonded labor and human trafficking in extended supply chains. It can be kept under check with the help of IoT devices.

Human rights violations often transpire in remote regions that are far away from the headquarters of any major enterprise. For example, fishing boats on the Thai cost, Malaysian palm oil…

IOT
Read more

Service providers need to understand their clients’ perspectives to increase sales The technology industry has had this problem focusing on the product rather than the value it has for the customer since ages. According to a research by Gartner, providers who are able to effectively quantify the business impact of its solutions are 2.9 times more likely to succeed in selling their product.

However, the number of providers who are able to accomplish this satisfactorily are very less. Even when the providers speak in terms of business outcomes, it is often abstract, generic…

Digital Business
Read more

Does the Tragedy of the Commons apply to application portfolios? Many business and application leaders are known to address a bloated application portfolio. They should look at the decades of research in a widely known economic problem, The Tragedy of the commons, for guidance. We discuss here today what The Tragedy of the commons mean.

Application leaders have struggled to achieve meaningful outcomes from application rationalization efforts as they do not have the authority to standardize business processes. The state they are in has parallels…

Technology
Read more

4 TARGET2 FAQs answered TARGET2 payment systems have been heavily featured in recent years. Some experts are of the opinion that it is the secret bailout of Europe’s periphery which has led to huge credit risks, if the Euro breaks up. We will discuss here some TARGET2 related questions which would be growing in the minds of most people.

TARGET2 is largely innocent of the charges that have been levelled against it. Arguments that TARGET2 facilitated a bailout of periphery or that the system is playing a key role…

Technology
Read more