CDW Solutions Blog
Solutions Blog Insights From Experts Who Get IT
  • Topics
    • Cloud (308)
    • Data Center (329)
    • Digital Workspace (469)
    • Networking (262)
    • Security (317)
    • Software (327)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

The Benefits of Video Surveillance Go Far Beyond Worker Safety

Enhanced analytics enable factories to boost security, productivity and efficiency.

By George Howard
|
December 14, 2020
Data Center, Security, Software

As enhanced video surveillance (EVS) technology has proliferated through industrial facilities, business and technology leaders have realized that these tools also have broad potential applications in the world of workplace safety. Like the security guards responsible for detecting intrusions, workplace managers faced an almost insurmountable task of identifying unsafe conditions and correcting them before an accident led to injury or property damage. Applying new analytics techniques to the video streams provided by the surveillance system allows managers to receive the same type of proactive alerting for safety issues. Powered by artificial intelligence, these analytics systems interpret what’s taking place on the video and alert stakeholders of issues that require attention.

Read More   

5G Is the Future of the Internet of Things

Better bandwidth, throughput and latency will make it possible to truly mature IoT.

By Steven Falconer
|
December 9, 2020
Networking, Digital Workspace

As we anticipate the expansion of 5G networking, many of us look forward to its high-speed connectivity — eventually up to 10 gigabits per second. Others are eager for its expanded bandwidth, capable of supporting a massive number of devices. Still, others have an eye on 5G’s ultralow latency, taking minimal time to move data from device to cloud and back again.

The real appeal of 5G, I believe, will be in the powerful combination of all these advantages. I see 5G as a foundational platform that will enable emerging technologies, particularly the Internet of Things, to fully mature. Although plenty of IoT devices are on the 4G spectrum, it lacks the capability to support the device explosion that many see as the future of IoT. Those same limitations don’t apply to the 5G spectrum.

Read More   

3 Key Challenges for the Evolving Internet of Things

IoT is diverse, data-rich and full of potential. Here’s what to look for in the next phase of its maturation.

By Mike Krummrey
|
November 18, 2020
Services, Digital Workspace, Networking, Security

Use cases for the Internet of Things have diversified quickly, but most applications are designed to achieve one (or more) of the following objectives: obtaining data for data-driven business decisions; having the capability to remotely control and monitor assets, such as digital signage or city lighting; and automating operations, such as a manufacturing production line.

Traditionally, the network infrastructure that supports business is focused on indoor switches, routers and access points. With the IoT revolution, often that’s the initial plumbing required to connect sensors, physical machines and wireless devices to the network. In recent years, companies have begun to expand the enterprise infrastructure and reach outside of the four walls of the business, leveraging IoT technology to work in new spaces that were previously unconnected — for example, with switches and routers hardened for outdoor environments connecting mobile devices back to business applications. Whether it’s controlling, monitoring or automation that’s needed, we’re no longer limited by building boundaries.

Advancing IoT yet again brings up three major challenges, and that’s where we’ll see a new wave of technological evolution.

Read More   

How the Internet of Things Is Like Monopoly

To keep smart technology initiatives moving, governments and organizations must focus on security.

By Kathryn Averyheart
|
October 21, 2020
Security

Players use a variety of strategies in Monopoly. If you are familiar with the game, you know you must achieve a monopoly before you can build, and you need four houses before you can add a hotel. My preferred strategy is to establish an infrastructure before I start building houses. I try to buy railroads and utilities, as well as the less expensive properties on the board.

In this way, Monopoly mirrors the Internet of Things. As localities try to implement IoT technologies for smart cities initiatives, they need an infrastructure that includes networking, storage and processing to handle the data that will be collected, stored, transmitted and analyzed. And starting with smaller, less expensive projects can help them establish a record of success before they move on to bigger things.

Everyone has a preferred method when playing Monopoly. Some people save up and get Park Place and Boardwalk — others prefer to acquire the railroads and utilities. Whatever your way to play, the reality is that it can all go to pot if you land on the wrong space.

Read More   

Where Blockchain Meets the Internet of Things

Secure digital ledgers provide a layer of protection for IoT devices and the data they generate.

By Chris Pride
|
August 14, 2020
Security

The Internet of Things holds incredible promise, from the cost savings afforded by facilities management sensors to the data-rich insights organizations can glean from connected devices. Even better, we’ve barely scratched the surface of what a mature, sophisticated IoT landscape will eventually look like.

But these advances often come with a risk — for now, anyway. Security has been a significant challenge for IoT devices, and we’ve already seen plenty of unfortunate cases where hackers have used connected devices to gain unauthorized network access.

Consider a food manufacturing environment, where a connected thermometer monitors temperatures in pipes or storage containers and communicates with the Wi-Fi network so it can send that data to a database. If the device is not properly secured, a hacker could interrogate the thermometer to discover credentials that enable access to the network, or even to upload instructions that would leverage the thermometer to deliver a virus.

Organizations could use blockchain to close these vulnerabilities, adding a layer of security to make IoT devices less susceptible to exploitation.

Read More   

Now Is the Time for Industry 4.0*

Worker safety technologies acquired today are the foundation of the smart factory of tomorrow.

By Aaron Lagowski
|
July 7, 2020
Services, Digital Workspace, Security

The asterisk has long been used to highlight exceptions or to call attention to a footnote or annotation. For example, a home run record that was influenced by an extended baseball season was noted with an asterisk. This mark is also used to call out legal terms or extended information on a topic.

I think we should be using an asterisk in our conversations about Industry 4.0. This blog explains why I chose an asterisk instead of some other mark in my description of Industry 4.0*.

Read More   
  • 1 (current)
  • 2
  • 3
  • 4
  • 5
  • Next ›
  • Last »
Most Popular
Digital Workspace | Security

Prioritize These Security Considerations as Users Work from Home More Frequently

Digital Workspace

8 Things to Consider Prior to Deploying Microsoft Teams

Digital Workspace | Services

How to Enable Remote Work for a Contact Center

Cloud | Digital Workspace

Avaya Cloud Office Serves Up Collaboration Solutions

Cloud | Digital Workspace

How Cisco Webex Interop Connects with Microsoft Teams

Recommended for You
Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2021 CDW. All Rights Reserved