Register to receive our newsletter and join in the conversation on our message boards!
REGISTER NOW
Comments
Newest First | Oldest First | Threaded View
mhhf1ve
mhhf1ve
2/17/2017 4:05:30 PM
User Rank
IoT Visionary
Re: blockchain
> "If a malicious actor wishes to take down a network that runs on such a consensus model, they must penetrate at least 51% of the nodes.."

The consesus models may have to be changed a bit so that it's a bit more than 51% of the nodes... colluding minorities might have tip the scales of bitcoin justice, and Chinese miners are already dominating the bitcoin mining landscape.

http://www.coindesk.com/ahead-bitcoin-halving-51-attack-risks-reappear/

50%
50%
dcawrey
dcawrey
2/3/2017 10:40:25 PM
User Rank
IoT Visionary
Re: blockchain
Have IoT networks that are decentralized I think is the smart way to go. 

That being said, decentralization is not as easy to accomplish as some might think. There are tradeoffs when it comes to usability for sure. 

100%
0%
Jeremy
Jeremy
2/2/2017 4:09:22 AM
User Rank
Blogger
Re: blockchain
Yes the more industrial side of the IoT certainly offers a wealth of possibilities! Hopefully regulation doesn't prove to be too much of a roadblock. 

50%
50%
Ariella
Ariella
1/31/2017 11:58:46 AM
User Rank
IoT Visionary
blockchain
The aspect of supply chain transparency hold quite a number of possibilities beyond this. One, of course, is reducing counterfeiting. Another is tracing sources to assure that they don't incorporate conflict minerals are trafficked labor. That would make it much easier to identify whether or not your electronic device is made from parts produced in a way you'd like to support. It could also make the job of sourcemap.com easier. 

100%
0%


Latest Articles
In Gothenburg more so than other burgeoning smart cities, silos are seen as the enemy. And no one knows this better than Ann-Louise Hohlfält, urban development officer for the City of Gothenburg.
Virtual reality and augmented reality remain nascent technologies, but Mastercard is already working on its plans to leverage them as they anticipate mass adoption among consumers.
We speak with Rinat Guy, CIO for the Municipality of Israel's award-winning smart city.
Industrial internet leader Bosch tells us about the IoT power tool products their working on & how long until these solutions hit the mass-market.
Our interview with Boeing Senior Systems Engineer Robert Rencher reveals that aviation IoT has implications for digital factories and supply chains, but its the operational environment where the biggest inroads will be made.
Upcoming Live Events
May 16-18, 2017, Santa Clara Convention Center
May 16-18, 2017, Santa Clara Convention Center
May 16-18, 2017, Millennium Gloucester Hotel, London
June 13-15, 2017, ExCeL, London
June 13-15, 2017, ExCeL, London
All Upcoming Live Events
Flash Poll
Video
Wilhelm Nehring, CEO of ThyssenKrupp Elevator UK, talks through his favorite applications of IoT in buildings and cities with IoT World News.
David Holecek, Director of Connected Products & Services at Volvo Car Group , speaks with IoT World News on Volvo's moves in the connected car ...
Liat Ben-Zur, SVP and digital technology leader at Philips, describes the plethora of ways IoT will be used to transform healthcare via hospitals, ...
Richard Corbridge, CIO at Health Service Executive, explains how IoT is already impacting digital healthcare in Ireland and where he sees the ...
Mimmis Cleeren, Global Director of marketing (IoT BU) at MediaTek, covers some of the special IoT projects that have emerged from MediaTek's ...
All Videos
Webinars
ARCHIVED
Tuesday, March 14, 2017
1:00 p.m. EST

Identifying and solving the practical security challenges encountered by businesses embarking on an Internet of Things deployment.

Realizing your company's IoT vision starts with connecting and securing your infrastructure. IoT infrastructures require organizations to collect and transmit commands and data from devices, applications and people -- securing all of this is a sizeable challenge.

Our expert panelists will identify and solve the key issues that arise during this process, enabling a safe and steady beginning to your organization's IoT journey.

The webinar will cover:

  • Identity Issuance: Security at Scale
  • Identity Management: Authentication and Authorization
  • Identity and Data Security: Data Integrity and Granular Policy Definition

Webinar attendees will learn:

  • How to ensure that data is only accessed by authorized devices, applications and users in an IoT setting
  • Methods for transmitting data from devices in the field to value engines securely and efficiently
  • Best practice for implementing tried-and-trusted IoT ecosystems and safeguarding data flow across your company's entire infrastructure
  • How to create a holistic and protected IoT ecosystem for your company

Information Resources
All resources
Twitter Feed
like us on facebook
IoT World News
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with