IoT

Who Do You Trust in Your Network?

Trusted User Trust, as defined by Merriam Webster, is “the assured reliance on the character, ability, strength, and truth of someone or something.” Our networks have gone through a number…

Read Now

Understanding the Internet of Things Security Vulnerabilities and Challenges

Internet of Things (IoT) devices utilize internet connectivity with embedded technology that allows them to be controlled remotely through computer interfaces giving rise to security vulnerabilities and challenges. With little…

Read Now

How Edge Computing in Healthcare Is Transforming IoT Implementation

While most industries grapple with how to leverage Internet of Things (IoT) technologies, healthcare—as a whole—already has embarked on digital transformation to achieve operational efficiencies and improve the delivery of…

Read Now

Why Retail Needs to Leverage Edge Computing Solutions

Retailers are no strangers to disruption, having been forced by online shopping to innovate and adjust their strategies to new consumer habits. The disruption is far from over, as the…

Read Now

© 2019 CONNECTION, INC. ALL RIGHTS RESERVED.