Adan Pope: Choosing The Right Application Delivery Infrastructure
“The platform should provide access controls and authentication management for all applications and application components.” The application infrastructure you choose depends on several factors, including what business objectives you are trying to achieve and the...
Citrix: 8 Experts on Flawless App Delivery
The book includes insights from the following experts: Adan Pope, Serial Chief Technology Officer and Innovator, Read the article here >> Brian Bobo, CIO & CISO, Greenway Health, Read the article here >> Cécil Bove, Senior Sales Engineer...
Sahaj Cheema: Designing for Ease of Use Is Difficult but Important
Designing for contractors may be easier because you only need to teach them once, and then they become experienced in setting up the device. But when you need to consider end users, too, their needs and expectations are different. Deciding on a communication protocol...
Vibhoosh Gupta: Think Beyond the Product You’re Developing
The purpose of an IoT solution is to provide an optimization layer in addition to the basic controls that already exist. It needs to make processes smarter and more efficient. Security involves the use of components such as a Trusted Platform Module to ensure secure...
David Barker: Designing for Service Longevity Is a Balancing Act
Designing a successful smart building product requires striking the right balance: The design must have the longevity it needs to justify a product development investment but not last so long that it is no longer cost effective to maintain. Designing a device for...
Titilope Sule: A Successful Design Must be Upgradeable
When designing a system for a buildinginfrastructure with a thirty-year lifespan, think about how you will service that system. The solution you design may need to outlive the components you use to build it. Balance cost and design features, but include hooks so that...
Marc Dupaquier: Processing at the Edge Saves Power and Is More Secure
To choose the right sensors, you must first know what data is required to solve the problem at hand. To know the data, you need to think like a machine, not like a human. A device continuously transmitting raw data is a prime target for attack. If the device is...
Anoop Mohan: Simplicity, User Experience and Solution Design Can Have A Major Impact on Product Acceptance
Packing too much compute power into sensors results in them consuming a lot of power, makes software upgrades difficult, and creates security vulnerabilities in your control system network. Today’s edge computing devices can run anything that you would run in the...
David Aronchick: Have a Control Plane That Can Look Across All Devices
The attack surface your device offers is potentially enormous. In planning for system security, know what you want to allow the device to receive and how it can take action. An important architectural consideration that influences the nature of device communications...
Todd Bloom: Use an Agile Approach to Execute Campaigns at Scale
“We’ve implemented an agile working environment in which we do a daily stand up that includes the main action item owners.”In Todd Bloom’s view, an agile approach can help marketing leaders ensure that campaigns stay on track and achieve their goals. “We’ve...