Remove tag asset-tracking
article thumbnail

IoT: Living at the edge  

OpenText Information Management

VIPER: Well, if IoT was an emoji or an expression, it would be: (1) a cloud with legs, (2) a tornado of devices, or (3) an air-tag tracking anything (keys, dog, purse, avocado). These all require some level of collecting, tracking, monitoring, and logic for decision making. You: What is IoT? Which do you think it is?

IoT 67
article thumbnail

Asset lifecycle management strategy: What’s the best approach for your business?

IBM Big Data Hub

Assets are the lifeblood of any successful business—from software programs tailored to meet an enterprise’s unique needs to a pipeline that stretches across oceans. One of the most important strategic decisions a business leader can make is how these assets are cared for over the course of their lifespans. What is an asset?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RFIDConnect for Gimmal Physical

Gimmal

Created to facilitate detection of RFID tags that are in range of the network-connected RFID antenna. RFIDConnect communicates with Gimmal Physical software through a robust API that enables real-time tracking of all indexed assets. Options are provided for configuring up to 4 antennas with variable read strengths.

article thumbnail

China-linked threat actors target Indian Power Grid organizations

Security Affairs

The security firm is tracking this cluster of malicious activities under the moniker Threat Activity Group 38 aka TAG-38. “The prolonged targeting of Indian power grid assets by Chinese state-linked groups offers limited economic espionage or traditional intelligence-gathering opportunities. ”concludes the report.

article thumbnail

Get frictionless insight to the data that matters

Collibra

These new capabilities will provide complete visibility into cloud data assets from source to destination, and deliver trusted data to all users across the organization. These newest partner integrations provide complete visibility into cloud data assets from source to destination, delivering trusted data to all users across the organization.

Cloud 74
article thumbnail

How to Implement Microsegmentation

eSecurity Planet

Success in implementing microsegmentation for your organization means tagging traffic, servicing regular business communications, adapting to threats , and denying all other anomalies. . Currently, assets are traveling from traditional DCs to SDDCs and public or multi-cloud environments without further safeguards. . Tag Your Workloads.

article thumbnail

The DDR Advantage: Real-Time Data Defense

Security Affairs

Follows data across all assets | DDR doesn’t start in one box (say OneDrive) and then pick s its job back up again when the data has landed in another box (say the corporate email server). However, DDR is one of the only tools on the market that can track the fire at its impetus, and that’s wherever data made its first wrong step.