IOT (IOT for Beginners)

About This Book

The explosive growth of the “Internet of Things” is changing our world and the rapid drop in price for typical IOT components is allowing people to innovate new designs and products at home. In this book you will learn the importance of IOT in society, the current components of typical IOT devices and trends for the future. IOT design considerations, constraints and interfacing between the physical world and your device will also be covered. You will also learn how to make design trade offs between hardware and software. We'll also cover key components of networking to ensure that students understand how to connect their device to the Interne

Securing the rise of RPA

When it came to their transformation efforts, enterprises went all in last year, and they’re going to remain all in throughout 2020. A central aspect of any successful business transformation is automation and, increasingly, robotic process automation. RPA, or software bots, helps to automate everything from repetitive business process tasks to cloud infrastructure management functions.

Security tips to support remote work due to the coronavirus

In response to the coronavirus (COVID-19) and related social distancing rules and guidelines, an ever-increasing number of companies are closing their offices and implementing work from home policies. For some workers and companies, remote work is already routine. For others though, this is uncharted territory. Many workers who previously worked exclusively from an office suddenly

The rise of cyber security product sprawl

Twenty years ago, when enterprise information security was starting to hit its stride, nearly all enterprise security software products were bought as point solutions. They did one job – resist malware, scan for vulnerabilities, encrypt data, detect intrusions, etc. — very well. But over time the number of tools in the security practitioner’s toolbox grew

Where to deploy new security tools first for maximum effect

You have your eye on a new piece of security technology or service and you want to evaluate it before deciding whether to commit to the effort of a full deployment. Alternatively, you may already be committed to full-scale deployment but wondering where to start. So where should you deploy it first to test it