Featured

Gartner: RPA software spending to total $2.4 billion in 2022 – drivers and market...

Spending on robotic process automation or RPA software is on pace to total $2.4 billion in 2022. That's one of the takeaways from a...
The Industrial Internet of Things in data

The Industrial Internet of Things (IIoT): the business guide to Industrial IoT

A complete guide about IIoT (the Industrial Internet of Things or Industrial IoT) with definitions, market evolutions, use cases, standardization efforts, challenges and strategic...

Mitigating the negative effects of electrical harmonics

How do you best manage the harmonics created by variable frequency drives? An interview with two subject matter experts with a focus on critical...

How the new Power over Ethernet (PoE) standard integrates cabling, IoT and smart building...

What the new Power over Ethernet standard, IEEE P802.3bt, means from an integrated smart buildings systems, power, cabling, BMS and Internet of Things perspective. After...
Data age - the global datasphere - trends and data-readiness from edge to core growing to 175 zettabytes in 2025

Data Age 2025: the datasphere and data-readiness from edge to core

A look at Data Age 2025, a collaboration between Seagate and IDC - on the growth of the global datasphere, the increasing role of...

Schneider Electric’s EcoXpert channel program: focus on business enablement

Nicolas Windpassinger, Global VP of Schneider Electric's Partner Program, EcoXpert, on the evolutions in the channel, emerging technologies and changes in the program as...
GDPR and personal data protection concept

Personal data protection: data subject, personal data and identifiers explained

Personal data is any form of data which can be used to identify an individual, natural person. In data protection and privacy law, including...
Data lake concept

Data lakes and big data analytics: the what, why and how of data lakes

What are data lakes and how are they used for big data analytics? A definition and description of data lakes, how they work and...
Edge computing

Edge computing and IoT – when intelligence moves to the edge

Edge computing and IoT are a perfect match for several reasons. No wonder that edge computing is in virtually all IoT 2018 trend reports,...
LPWAN

LPWAN: delayed deployment of NB-IoT and LTE-M benefits LoRa and Sigfox

Technical issues and questions of enterprises and OEMs delay the deployment of cellular LPWA network standards NB-IoT and LTE-M. Non-cellular standards, mainly LoRa and...

LTE-M roaming for North America and several European markets

KPN, Orange, Swisscom and AT&T have activated LTE-M roaming. An overview of the first markets this covers and why LTE-M roaming is important with...

Connected mining: installed base and trends per segment according to Berg Insight

According to Berg Insight the total installed base of connected mining solutions reached almost 0.6 million units in use across the globe in 2018....
5G spectrum auction in Germany

5G in Germany: a look at the spectrum auction and industrial 5G

Germany's industry expects a lot from 5G in combination with edge computing and advanced analytics as it progresses on the path of Industry 4.0...
TUV Rheinland Cybersecurity Trends 2019 press image

Industrial cybersecurity is years behind; IoT security has a standards issue

Industry 4.0 and industrial transformation overall require a heightened attention for cybersecurity. Yet, industrial cybersecurity is years behind general IT security and standards pose...
The 6 Biggest Cybersecurity Risks Facing the Utilities Industry

Utility industrial control systems: the top six utility ICS security weaknesses

A look at cybersecurity in the utilities industry and findings from a 2019 ABI Research paper looking into the cybersecurity risks in utility industrial...

Cloud data management on the rise – road to intelligent data management

Organizations invest in digital initiatives with technologies such as cloud, Big Data, AI and IoT. Data management practices urgently need improvement the 2019 Veeam...

C-level executives number one target for social engineering attacks

C-level executives are increasingly targeted by cyber criminals with financially-motivated social engineering attacks according to the Verizon 2019 Data Breach Investigations Report (DBIR). Cybersecurity needs...

Data professionals – challenges and their impact on AI and ML

Every organization must be using artificial intelligence (AI) in some (more or less) mature way to make the most out of all that data...

Also on i-SCOOP