|
Tamper-proof Computing Ask the vast majority of information technology professionals today if it is possible to completely secure a computing system against cybercrime and the answer you will get is a resounding “no.” Through a series of events too long and convoluted to address in this article, we have established a global computing infrastructure that is fundamentally incapable of protecting itself, creating both a playground and a candy store for cybercriminals. Our current global computing infrastructure is based on technology first conceived almost forty years ago, long before the global network of billions of computers was created to manage our banking, communications, defense, entertainment … even the everyday mundane facts of our lives, like the Instagram of the yogurt parfait we had for breakfast…... More Info |
|
| More Info Download Contact Author Share |
|
Letter from the Editor - November 2015 “It must be, I thought, one of the race's most persistent and comforting hallucinations to trust that ‘it can't happen here’ -- that one's own time and place is beyond cataclysm.” The Day of the TriffidsJohn Wyndham For those of you unfamiliar with Wyndham’s 1951 sci-fi classic, the cataclysm in question is the relentless worldwide proliferation of menacing, venomous, mobile plants with a taste for human flesh. (What else could it be, right?) On a more figurative level, Wyndham was warning the West to look out for the lumbering menace crouched behind the Iron Curtain, waiting to swallow up the world’s capitalist democracies at any time…... More Info |
|
| More Info Download Contact Author Share |
|
Vodafone: The Next Phase of M2M The M2M market has changed dramatically in the past few years. It is no longer a niche technical term or delegated only to the IT department.... More Info |
|
| More Info Download Contact Author Share |
|
How Important is Network QoE? It’s a simple dynamic: smartphones are quickly taking their place as the central hub people use to manage their digital lives. Their versatility, portability and sheer ability to seemingly do pretty much everything have made them indispensable to consumers and business users.... More Info |
|
| More Info Download Contact Author Share |
|
Fog Computing: Intelligence for IoT The Internet of Things promises to be a transformative technology, potentially replacing or augmenting nearly every item in our daily lives (and likely introducing others not even dreamed of yet). The Fitbits and Nest thermostats of today are merely the beginning – Gartner foresees that as soon as 2020, the IoT may already include 26 billion connected units.... More Info |
|
| More Info Download Contact Author Share |
Add Your Assets to the Research Center
Put your thought leadership materials where they can be found when your global target market is investigating companies, products, topics, trends, and technology related to your company.
UPLOAD CONTENTWelcome to Pipeline's Knowledge Center. You can use the search feature to search across all media contained on the Pipeline site including articles, brochures, reports, webinars, whitepapers, and much more.
To begin, use the search box above to search by topic, and then filter your results by media type, date, or company. You can also select how results appear by specifying how many results appear per page and sorting your results by media type, relevancy, or company.