Article: What is Software-Defined Storage?

Hardware, Open Source, Software

What is Software-Defined Storage?

Depending on where you research, Software-Defined Storage, or SDS, will be described as a scalable solution that enables platforms to utilise open-source software and off-the-shelf hardware to create a storage solution that can save money and enable software systems to interact with storage intelligently. Now, for the real definition of SDS!

Software-Defined storage, simply put, is a storage solution that provides advanced storage mechanisms, but these mechanisms are defined in software. Another way to think of it is replacing drive controllers with software. For example, RAID controllers allow for drives to be used in different configurations, but an SDS would remove the RAID controller, and implement this function in software instead.

Read full article

Article: Internet of Trusted Things: Democratizing IoT

Blockchain, Decentralized Internet, Hardware

Internet of Trusted Things: Democratizing IoT

A trusted IoT, or an Internet of Trusted Things, needs to be built private-by-design and with peer-to-peer, blockchain-based device identity and coordination built-in. Once each device is de-coupled from a central authority, broad, decentralized coordination becomes possible. The Internet of Trusted Things looks like the vast intelligence we introduced at the beginning of this article. A central authority owning IoT is a horribly dystopian idea, and the current fractured landscape represents a defense mechanism against this future. If we are to achieve a unified IoT, there is only be one answer to the question, “who owns this new digital organism?” And it is the same answer to the question of “who wins IoT.” The answer is: you do.

Read full article

Article: Crowdsourcing for the Evolution of a Decentralized Web

Decentralized Internet, Web 3.0

Crowdsourcing for the Evolution of a Decentralized Web

This article summarises the development of the internet to the current scenario where so many interactions are dominated by dealing with global tech giants. As data has become a more and more valuable commodity, those giants are fuelling a roaring trade using our personal data, with far reaching implications of more than simply what we buy but also matters such as what news we are fed, how we seek relationships, and vote. An evolving Web 3.0 based on blockchain technology provides an opportunity for individuals to take back decentralized ownership and control of their data.

Read full article

Article: Edge computing is now more relevant than ever

Cloud, Data, Software

Edge computing is now more relevant than ever

The necessity to deliver infrastructure, application, and data resources to edge locations will accelerate the deployment of new, cloud-centric edge and network solutions, maintains IDC. These will provide much quicker processing to satisfy increasing digitalisation efforts. Edge will also provide a critical building block for business resilience, providing all-important scalability, flexibility and agility.

Enterprises must build resilience and transform to survive and thrive in the digitally-powered world we now operate in. Edge offers up accelerated response times and a route to enhanced service quality and new business models. There has never been a better time to move to the edge.

Read full article

Article: Small Business Advantage: How Your Small Business Can Benefit From Blockchain Technology

Blockchain, Innovation

Small Business Advantage: How Your Small Business Can Benefit From Blockchain Technology

Blockchain technology is a system that was developed to augment financial institutions over unregulated currency which was constantly found to be going upstream. Blockchain technology accounts for and authenticates performed transactions. It is a detailed process that deals with transaction creation, record, verification and enforcement that can take place in real-time but at diverse levels.

Blockchain technology can be utilized by small businesses like gyms, restaurants, collision centers and more to set financial structure for stability.

  • Money Transfers
  • Cloud Storage
  • Smart Contracts
  • Supply Chain & Shipment Tracking
  • Capital Raising
  • Marketing
  • Networking And Iot

Read full article

Article: Decentralized ID Adds New Firepower To Fight Against Digital-First Fraud

Decentralized Internet, Web 3.0

Decentralized ID Adds New Firepower To Fight Against Digital-First Fraud

More robust protocols give consumers better control over their identities. Law told PYMNTS that all too often, individuals lose control of their online identities as they’ve become victimized in phishing attacks or account takeovers, a problem that has hit financial services providers especially hard.

“With the advent of FIDO and WebAuthn, you make the authentication simple,” said Law. “Instead of using an [one-time password (OTP)] text message, you use a fingerprint or your face.”

Moving away from the password and toward the single sign-on — with its federated approach across different web properties — still needs identity attestation (part of the Microsoft announcement), which in turn will require firms to consider their know your customer (KYC) processes.

Read full article

Article: Impact of Next-Gen Blockchains On The Adoption of IoT

Blockchain, Hardware

Impact of Next-Gen Blockchains On The Adoption of IoT

The combination of the advanced and the next generation of blockchain technologies with the IoT sector has the incredible potential and applications of creating the global marketplace. Blockchain technology can meet the demands of a wider range of IoT applications like smart cities, healthcare systems, identity management, voting, smart home, and many more. Blockchain technology can assist the mass adoption of IoT by overcoming so many challenges.

Read full article

Article: How To Improve The Internet Of Things With Blockchain

Blockchain, Hardware, Software

How To Improve The Internet Of Things With Blockchain

Despite rigorous research and aggressive adoption, IoT infrastructure faces major security issues. Hence, several researchers and developers are exploring enhanced security protocols provided by blockchain. Blockchain has already introduced a secure platform for cryptocurrency transactions. Similarly, the utilization of blockchain in IoT will lead to the development of distributed ledger for interfacing multiple connected IoT devices. With such an approach, data storage and networking of IoT-powered devices will be drastically improved.

Read full article

Article: 5 Ways Developers Can Get the Most out of Edge Computing Platforms

Cloud, Data, Hardware, Software

5 Ways Developers Can Get the Most out of Edge Computing Platforms

Edge computing is a broad term that refers to any type of application deployment architecture in which applications or data are hosted closer to users–in a geographic sense–than they would be when using a conventional cloud or data center.

The big idea behind edge computing is that by bringing workloads closer to end users you can reduce network latency and improve network reliability–both of which are key considerations in an age when applications in realms like IoT, machine learning and big data require ultra-fast data movement.

  1. Containerize
  2. Be hardware-agnostic
  3. Understand device vs. cloud edge
  4. Extend the cloud
  5. Test for the edge

Read full article

Article: Interoperable connected LED lighting remains a pipe dream — for now

Autonomous Internet

Interoperable connected LED lighting remains a pipe dream — for now

The Bluetooth mesh community has made more progress indoors than I foresaw as possible. We recently covered an indoor Bluetooth mesh project covering a 22-story office building with one network — no gateways or servers required. EMC, Silvair, and McWong combined on the project. And additional energy savings beyond LED installation covered the ROI. That’s progress. But the project was based on the use of McWong sensors/controllers throughout and uniformity came based on the fact that the mainly commercial-use office space was served by identical troffers throughout.

Read full article