Everything you wanted to know about the Internet of Things

Everything you wanted to know about the Internet of Things

Conduct an online search for “Internet of Things” (IoT), and you’ll find dozens of complex definitions and complicated terms. Put quite simply, the Internet of Things describes the connection of any device to the internet and/or to each other.

Business Insider predicts that by integrating modern-day devices with internet connectivity, the IoT market will grow to more than $3 trillion annually by 2026. And experts predict more than half of new businesses will run on the IoT by 2020.

What is Good Design?: 8 things to keep in mind

What is Good Design?: 8 things to keep in mind

Imagine your dream car and how far it goes when it evolves from a sketch on the drawing board to a well-designed vehicle that is both safe and appealing. There’s a lot that goes into good design. Here are just 8 things you should be keeping in mind when working toward good design.

Part 1: ADA Compliance and How it Affects Your Software

Part 1: ADA Compliance and How it Affects Your Software

Lawsuits regarding accessibility on the Web are on the rise, and one of the best ways to comply with Section 508 of The Rehabilitation Act of 1973 and The American Disabilities Act is to conform to the Web Content Accessibility Guidelines (WCAG) put forth by the World Wide Web Consortium. In this post, we explain what each of these is and how it all relates to you and your software.

If you think you can’t afford to address application security now, think again...

There is no doubt that the safety and security of sensitive information is the primary concern in software application security. Data in transit, and in particular, data _at rest_, needs to be protected and to do so you need to put security controls in place. Security needs to be part of the full lifecycle of your software - design, development, testing & maintenance.

If You think you can’t afford to address application security now, think again - It’ll cost you much more in the future… Uber paid hackers a ransom of $100,000 to destroy the data they stole and then was fined nearly $500,000 for letting them steal the data in the first place http://ow.ly/J3WT50jPJtR. $600,000 may mean nothing to a company like Uber but what does it mean to you? Application security isn’t a luxury, its a requirement. Stop putting it off and get your data secured before its too late.

Related case studies

The Mistakes of Software Modernization + How To Make Yours Succeed

The Mistakes of Software Modernization + How To Make Yours Succeed

Modernizing your software can be an exciting time of innovation and change.... but it can also be a headache if you don’t ask the right questions and don’t take the right precautions. That said, here are a couple of Troy Web tips to make your transition from legacy to modernized software happen more smoothly.

Startups + The Importance of Custom Technology

Startups + The Importance of Custom Technology

You have an incredible business idea that may potentially transform the way people communicate. What do you do? Well, if you’re passionate and determined to bring your vision to life, you form a startup.  The problem is that while most individuals, teams and organizations have excellent ideas, they lack the capacity to turn their concept into reality…