Skip to main content

‘We see edge and IoT computing transforming all aspects of our lives’

Jim White has more than 25 years of experience in software development across a range of industries, working for companies such as Dell Technologies.

He is now chief technology officer of IOTech Systems, a UK-headquartered company that specialises in internet of things (IoT) software and services using edge computing.

‘These technologies allow us to see, digitise and understand what was previously only guessed at or lightly understood’
– JIM WHITE

Describe your role and your responsibilities in driving tech strategy.

I’m responsible for outlining IOTech’s technical vision, which includes designing and implementing the company’s general product strategy and technical direction. I work with partners and industry organisations to align the company’s complementary products and services, industry standards and open-source offerings.

A big part of that includes interacting with customers to help guide product vision and incorporate IOTech products into solutions that meet their needs. I serve as the externally facing technical voice of the company.

Are you spearheading any major product or IT initiatives you can tell us about?

With our base edge/IoT middleware platforms created (Edge Xpert and XRT), IOTech is now focused on providing more complete or ‘full-stack’ solutions to help organisations deploy and manage IoT solutions at scale. We are working on an edge management solution called Edge Builder to help organisations deploy, orchestrate and manage their edge nodes and applications with minimal or no touch.

We are also working to incorporate visual inference capability into our edge/IoT middleware using cameras and the latest visual inference AI capabilities to address a host of additional edge use cases.

How big is your team?

Headquartered in the UK, IOTech is 55 people strong with engineering teams in Scotland, England and Taiwan. We have personnel spread across the globe to include Singapore, France, Ireland and the US, in addition to Taiwan and the UK.

What are your thoughts on digital transformation and how are you addressing it?

IOTech is at the heart of helping many organisations with their digital transformation. We are helping organisations get the operational technology connected to and working with their information technology.

At its heart, this is what edge/IoT computing is about. It allows organisations to improve and optimise operations more quickly, as well to create new revenue-generating products and services for their customers.

What big tech trends do you believe are changing the world and your industry specifically?

We certainly see edge and IoT computing transforming all aspects of our lives and businesses. These technologies allow us to see, digitise and understand what was previously only guessed at or lightly understood.

With billions of ‘things’ or sensors coming online, we have the means to use this data to better understand our physical world. We can act on it quickly and locally to save resources, improve quality of service – such as removing breakage, improving care, etc – and generally improve lives.

AI and machine learning are transformative on their own. But together with edge computing, big data that comes from edge/IoT solutions are also allowing us to infer new and amazing insights much more quickly than in the past.

In terms of security, what are your thoughts on how we can better protect data?

For the most part, the elements to protect our data are already available. The key is to apply them. Like the locks on the doors to our homes or cars, they give us quite a bit of security – but only if we choose to use them.

Encryption, limiting access of data to the systems and people that need it, use of industrial-grade authorisation and authentication services, secure transport, proper back-ups, proper disposal when no longer needed, etc – these are not novel ingredients to the security of data. They just need to be applied correctly and monitored, especially on avenues of likely security threats, for attacks and theft.

Because edge computing is opening up more access to more data at the farthest reaches of the network, the avenues of attack have increased, such as through a simple sensor or device. So, we need to apply the security elements out to that edge.

Want stories like this and more direct to your inbox? Sign up for Tech Trends, Silicon Republic’s weekly digest of need-to-know tech news.

The post ‘We see edge and IoT computing transforming all aspects of our lives’ appeared first on Silicon Republic.



Udimi - Buy Solo Ads from Silicon RepublicSilicon Republic https://ift.tt/38fgwqy
via IFTTT

Comments

Popular posts from this blog

9 VCs in Madrid and Barcelona discuss the COVID-19 era and look to the future

Spain’s startup ecosystem has two main hubs: Madrid and Barcelona. Most observers place Barcelona first and Madrid second, but the gap appears to close every year. Barcelona has benefitted from attracting expats in search of sun, beach and lifestyle who tend to produce more internationally minded startups. Madrid’s startups have predominantly been Spain or Latin America-focused, but have become increasingly international in nature. Although not part of this survey, we expect Valencia to join next year, as city authorities have been going all-out to attract entrepreneurs and investors. The overall Spanish ecosystem is generally less mature than those in the U.K., France, Sweden and Germany, but it has been improving at a fast clip. More recently, entrepreneurs in Spain have moved away from emulating success in pursuit of innovative technologies. Following the financial crisis, the Spanish government supported the creation of startups with the launch of FOND-ICO GLOBAL, a €1.5 billi...

Emulating USB Dongle – Introducing HASP Dongle Emulator Software

Information Technology Blog - - Emulating USB Dongle – Introducing HASP Dongle Emulator Software - Information Technology Blog Over the years the methods used by software developers and producers to limit the amount of users to a specific number in a licensing agreement have become more complex.  The aim of copy protection is to protect the intellectual rights and financial investment of the individual developers and manufacturing companies.   A way of getting around this protection is to reproduce the media through which you can deliver the application to other users,  meaning that the software can be replicated far in excess of that specified in the license. One of the most common methods has been to use hardware keys or dongles which will enable the user to activate an application, unlocking its full functionality without using a device.  In addition, it offers good protection against attempts to pirate the software. In this article, we will look at th...

Advantages and Disadvantages of using Vouchers in eCommerce

Information Technology Blog - - Advantages and Disadvantages of using Vouchers in eCommerce - Information Technology Blog To decide whether vouchers and coupons are the right tool to add to your online marketing strategy, it is essential that you consider the benefit and the cost of using coupons. In this article, we will use Gtech coupon marketing strategy as an example a successful coupon strategy.  Also check out these great books on coupon codes for ecommerce . Advantages of Using Coupons Increase Sales This is the obvious benefit. Coupons serve to increase sales especially for high ticket items such as luxury gadgets. Gtech discount codes is a good example as Gtech quality is reflected on the price of both the Gtech eBike and Gtech AirRam. In order to boost sales, the company releases 10% off offers certain times of the year when online sales would normally be low. Enlarge Email List Acquiring a customer can be expensive in terms of advertising and marketing. If yo...