Real World Internet of Things at Scale

Jim Kaskade

Subscribe to Jim Kaskade: eMailAlertsEmail Alerts
Get Jim Kaskade: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Jim Kaskade

How Brands Should Prepare for the Convergence of Identities and the Internet of Things Q&A with Merritt Maxim of Forrester Anyone who knows me, knows that I’m extremely passionate about opportunities involving Internet of Things (IoT) – or should I call it Identity of Things – and what it will bring to end-consumers and businesses alike! The industry of connected devices is growing at a breakneck speed and consumers are getting more and more excited as they learn about the ever-expanding possibilities. But are brands preparing themselves properly for IoT? Do they know the complexities involved? I recently invited Merritt Maxim, Senior Analyst at Forrester Research, to join me for a webinar to discuss the importance of protecting customer identity data in the era of IoT. We covered such topics as: Understanding the landscape of identity threat vulnerabilities and t... (more)

IoT Is the New #BigData | @ThingsExpo #IoT #M2M #DigitalTransformation

My favorite writer, Gil Press, sums it up with, “It’s Official: The Internet Of Things Takes Over Big Data As The Most Hyped Technology” where he talks about how Gartner released its latest Hype Cycle for Emerging Technologies, and how big data has moved down the “trough of disillusionment,” replaced by the Internet of Things at the top of the hype cycle. The term Internet of Things was coined by the British technologist Kevin Ashton in 1999, to describe a system where the Internet is connected to the physical world via ubiquitous sensors. Today, the huge amounts of data we are... (more)

Most Powerful Voices in Security

The security community has a growing number of influential and important people, especially as the industry rises to meet the need to address more advanced security threats, such as targeted attacks. But how does a company in the security industry truly identify the influential people? And then once identified, how does one use influential voices to help promote their brand? In this study, we answer the first question - how to identify the most powerful voices in your industry, focusing on the security space, and as part of this we provide you a list of people to follow for the b... (more)

Big Data versus Small Data

How do you know whether you are dealing with Big Data or Small Data? I’m constantly asked for my definition of “Big Data”. Well, here it is…for batch analytics. Batch Analytics Batch Analytics Small Data Big Data Data Volume Gigabytes Terabytes – Petabytes Data Sources 1-6 (structured – SQL, or unstructured – NoSQL) 6+ structured AND 6+ unstructured Business Functions One line of business (e.g. sales) Several lines of business all the way up to a 360 degree view of the business Business Questions Queries are complex requiring many concurrent data modifications, a rich breadth ... (more)

Real-time Big Data or Small Data?

Have you heard of products like IBM’s InfoSphere Streams, Tibco’s Event Processing product, or Oracle’s CEP product? All good examples of commercially available stream processing technologies which help you process events in real-time. I’ve been asked what I consider as “Big Data” versus “Small Data” in this domain. Here’s my view. Real-Time Analytics Small Data Big Data Data Volume None None Data Velocity 100K events / day (<<1K events / second) Billion+ events / day (>>1K events / second) Data Variety 1-6 unstructured on sources AND 1 single destination (an output file, a SQ... (more)