言語|国を設定する

各国のポータルページを見る

各国の最新情報は、以下の国別ポータルページからご確認ください。

Red Hat ブログ


All emerging technologies have growing pains. This issue of Red Hat® Shares aims to ease your pain by arming you with helpful IoT information.

Red Hat Shares, Red Hat's monthly corporate newsletter, features our take on technology trends, open source software, and recent industry news to help you navigate the complex world of IT. Subscribe to receive Red Hat Shares by email.


In this issue: Internet of Things

  • Internet of Things (IoT) pros and cons
  • FEATURED Investing in an IoT solution? Here’s what to consider.
  • Survey says: What early adopters say about their IoT experiences
  • Customer spotlight: Genfare takes advantage of IoT innovation
  • More to learn: Open source and IoT: A match made for the enterprise | IoT blog series | Why IoT devices are the 'unusual suspects' in DDoS attacks
  • Recommended | Red Hat news and more | Related events

Did you miss October's newsletter about telecommunications? Check it out.


From the editor

Internet of Things (IoT) pros and cons

The IoT―internet-connected devices that send and receive data―is changing everything, from smart parking to avalanche prevention. One study estimates we’ll spend US$6 trillion on IoT solutions in the next 5 years. Impressive business benefits include increased customer insights and revenue. But complex challenges abound, like big data analysis and security. For example, a recent attack compromised several popular websites―including Netflix and Twitter―by taking advantage of vulnerable IoT devices.

All emerging technologies have growing pains. This issue of Red Hat Shares aims to ease your pain by arming you with helpful IoT information.

See what the IoT means for business


Featured story

Investing in an IoT solution? Here’s what to consider.

The IoT comes with inherent complexities: managing and connecting disparate devices, storing and managing collected data, and connecting operational technology to enterprise IT, to name a few. So there’s a lot to consider before implementing an IoT solution.

IDC recommends, for one, making sure the vendors you evaluate offer products that support, or are interoperable with, open standards. You’ll be glad you did when it’s time to expand your IoT plans. Check out more considerations related to infrastructure, long-term implications, and more in this IDC blog post.

Read the blog post


Survey says

What early adopters say about their IoT experiences

  • 72% or more of organizations in the manufacturing, retail, and transportation segments have deployed IoT―well above the average deployment rate.
  • 90% or more of organizations have created or plan to create security policies for their IoT deployments.
  • 96% of organizations that have deployed IoT believe they have a culture of innovation.
  • 48% of organizations that have deployed or will deploy IoT plan to use existing analytics tools for IoT-generated data.
Source: IDC InfoBrief, sponsored by Red Hat, Internet of Things: State of the Market, September 2016

Customer spotlight

Genfare takes advantage of IoT innovation

Genfare, a transportation solutions provider, transitioned its fare collection solution to a Software-as-a-Service (SaaS) offering to take advantage of IoT technology―from real-time monitoring to data collection from remote devices and fareboxes. Genfare can now supply software solutions to the transportation market, helping customers cut costs and maintenance while supporting multiple payment options for riders.

Read the success story


More to learn

Open source and IoT: A match made for the enterprise

"In an extremely nascent and crowded market like enterprise IoT, organizations are trying to rely more and more on open platforms and control their own destiny."

Read the article

IoT blog series

How should your business implement an IoT solution in a way that offers you flexibility and control no matter what the eventual IoT landscape looks like? Find out this and much more in our blog series.

Read more

Why IoT devices are the 'unusual suspects' in DDoS attacks

Unsecured, connected IoT devices create vulnerabilities that can be used by hackers to trigger massive distributed denial of service (DDoS) attacks.

Read the article


New offerings and releases


Around the web


トピックス

注目のニュース