IoT is shaping human life with greater connectivity and ultimate functionality through ubiquitous networking to the Internet. But how does IoT differ from machine to machine (M2M)? And is it capable of being more than just smart “things”?
As the Internet of Things continues to gain momentum in business and consumer circles alike, the potential security holes these devices can create are multiplying as well. Here are four things every consumer can and should do to reduce the risk of identity or data theft due to a connected device, whether it be the latest fitness tracker or the family’s trusty networked printer.
The move to cloud computing is being driven by a number of substantive challenges that are forcing business and IT leaders alike to look for new solutions. Here, Alex Ryals, Director of Solutions Development, breaks down the Top 4 as outlined by Tech Target.
In today’s complex and overly technical business world, the importance of multi-layered security in protecting your company’s assets may be overlooked. Today’s businesses, however, can’t afford to ignore the “bad guys.”
Watch how multi-layered security is explained by one chief information security officer to his daughter in this short video.
If this is your first AWS re:Invent conference, be prepared to be amazed. If it’s your fourth, well you know the drill. Either way, as you’re getting ready to embark on the journey to Las Vegas for this year’s AWS re:Invent, make sure you read Cloud Architect Eric Holler’s unconventional advice on how to survive on two hours of sleep, and still learn something at AWS re:Invent 2015.
For the second year in a row, Avnet was a proud sponsor of the VH1 Save the Music Foundation which is dedicated to ensuring music instruction is part of the core curriculum in schools across the nation. On Tuesday, September 15th, the Avnet IBM Solutions Group joined VH1 Save the Music Foundation at an in-school celebration at Judson High School in Converse, Texas where they would receive the award of a VH1 Keys + Kids piano grant to the school’s music program.
Regardless of the role your business has within the Internet of Things ecosystem— device manufacturer, solution provider, cloud provider, systems integrator, or service provider—you need to know how to get the greatest benefit from this new technology that offers such highly diverse and rapidly changing opportunities…and most importantly, secure it once you do.
Don’t let your employees’ social media activity expose both them and you to potential identity theft. Share these eight simple tips from Avnet CIO, Steve Phillips, with your employees to allow them to stay connected without opening them up to potential cyberattacks in the process.
The world of applications is expanding. Mobile, microservices, and, sooner rather than later, the Internet of Things are creating explosive growth of applications that in turn are driving demand for DevOps and Software-Defined Data Center models. Here are the five key requirements for services to both fit in and enable the transition from a traditional data center to a software-defined, more cloudy, data center model.
Today as businesses, more specifically retailers, strive to be Omni-Channel businesses and engage with consumers 24/7/365, in whatever channel is convenient at that moment, locking the doors to their store is simply not enough to keep their business safe.
Do you remember when you were a student in school and the teacher asked what water was comprised of? Everyone would yell hydrogen and oxygen!
Well, the same can be said for the world of mobile. If someone asked what is a Mobile As A Backend Service (MBaaS) comprised of? Hopefully everyone would yell Service Integration, Security Policy, Data Integration and Reporting for example! Ok, perhaps they wouldn’t yell with the same level of excitement, but a techie can dream, can’t he?
When important people need protection, how does it usually work? For example, a president, prime minister or other world leader? Typically, if there’s any kind of expected threat, it’s full protection round the clock, everywhere and with no margin for error. Your data should be treated the same way, both at rest and in motion.
Energy and utilities face a multifaceted security challenge. The industry must secure customer, exploration, refinery and business operation data, as well as general access and identity management. In the energy industry, as more and more access points become available, anyone from a rogue employee to foreign countries looking to cripple the U.S. grid is seen as a potential attacker.
A lot has been written and said about the “secrets of selling to CIOs” but it’s often from the salesperson’s perspective. Steve Phillips, CIO of Avnet Inc. shares first hand his own views on how (and how not) to sell to IT executives effectively with these five Do’s and four Dont’s.
Working in the highly complex IT industry requires a special breed of individual; one who is intelligent, dedicated and passionate about technology and innovation. But once in a while, you find yourself surrounded by someone that goes beyond these traits and are proactively making a difference in the marketplace.
At Avnet, we’re fortunate to have Steve Phillips, who has just been inducted into IDG’s CIO Hall of Fame.