Subject:::What's the Next WebRTC Killer App? - TMCnet's TechToday
If you have trouble viewing this email, click here to view online.
TMCnet's TechToday eNewsletter
 
 

What's the Next WebRTC Killer App?


Last night I attended a WebRTC Meetup featuring a presentation from developer Lisa Larson-Kelley, and one message in particular seemed to capture the audience's attention: WebRTC's potential. There are more than one billion endpoints supporting WebRTC today, from phones to tablets and computers, and everyone seems to be waiting for the "killer" WebRTC app – the app that really showcases its true potential, disruptiveness and value.

Why You Need to Know: So there you have it, developers! We're looking for a way to integrate WebRTC that will enable seamless communications, enhance productivity/efficiency and it needs to be beyond just a replacement for Skype.


 

Will AT&T and Verizon Acquire DirecTV and Dish Network?

One might argue that will happen. The traditional argument--for at least a decade--is that neither AT&T nor Verizon can grow the video portion of their triple-play services much more than incrementally without acquiring more video share now held by the satellite providers. No matter how effective the telcos are at marketing video services, they are hampered for a couple of reasons.

Why You Need to Know: No matter how effective Verizon is at winning video market share where it has fixed network FiOS assets, the fact is that Verizon's network footprint is too small, relative to the satellite networks to grow its business too much further.
 
 

Ponemon Institute Study Finds Organizations Remain Very Vulnerable to SQL Injection Attacks

In case you were not aware, although it appears many if not most IT security professionals know this up close and personal, SQL injections are a vector of vulnerability those with malicious intent unfortunately love to exploit. A new first-of-its-kind study by security research firm Ponemon Institute, done in conjunction with DB Networks, a provider of behavioral analysis database security solutions, is out and deserves to be on your "must read" list.

Why You Need to Know: This is an instance where what you don't know can and will hurt you, and having better visibility into SQL activities so problems can be determined quickly and preventive measure can be taken sooner rather than later is an important step to take as part of best practices to reduce vulnerability risks.
 
 

Discussing TI's IoT Ecosystem with Avner Goren

The Internet of Things (IoT) introduces an enormous amount of connected endpoints and even more data. Texas Instruments (TI) set out to make its technology more accessible and easy to use in the Internet of Things with its new IoT ecosystem, which helps cloud service providers meet different customer needs and bring IoT connectivity to TI devices and their networks. We caught up with Avenir Gorn, GM of strategic marketing for strategic processing at TI, to discuss TI's role in the IoT, what this ecosystem aims to do and what types of developments he's looking forward to seeing as the IoT matures.

Why You Need to Know: Traditionally, wireless connectivity has been considered something that is complex. TI has been working for the last few years on changing this concept and perception and delivery point of view.
 
 

New Support Emerges For Smartphone Anti-Theft Devices

While the idea of the mandatory kill switch for smartphones being signed into law has proven at least somewhat controversial, the controversy may be about to boil right out of the concept. A shocking wave of new support has arisen for the smartphone kill switch, coming not only from several breeds of device maker, but also from the major carriers as well. The wave of new support in question comes from several fronts. Not only are all five of the United States' largest cellular carriers in on the action, but so too are firms like Apple, Google and Microsoft, as well as several device makers like Samsung, HTC and Huawei.

Why You Need to Know: Protecting mobile devices from theft is important. After all, no one ever wants to see a mobile device stolen, except for the thieves who may want to do the stealing. This new step goes a long way toward preventing just such a point, while also protecting consumer choice to not have such a switch built in.
 
 

 
This email was distributed by: Technology Marketing Corporation, 35 Nutmeg Drive Suite 340, Trumbull, Connecticut 06611 As a valued reader or attendee of TMC's publications and events, you will occasionally receive carefully-screened offers and free product information via email. If you no longer wish to receive this type of email, please go to http://www.tmcnet.com/enews/subs.aspx?eml=[[email]] to adjust your preferences.