RFID and IOT: An overview

June 16, 2016

This talk presents an overview of RFID, its applications, IOT, RFID anti-collision protocols and the security issues...

Spotlight

RSA

RSA’s Intelligence Driven Security solutions help organizations reduce the risks of operating in a digital world. Through visibility, analysis, and action, RSA solutions give customers the ability to detect, investigate and respond to advanced threats; confirm and manage identities; and ultimately, prevent IP theft, fraud and cybercrime. Specialties Security, Identity Assurance, Encryption, Key Management, Advanced Threats, Network Monitoring, Network Forensics, Security Analytics, Adaptive Authentication

OTHER WHITEPAPERS
news image

IIoT Value Chain Security

whitePaper | April 12, 2022

In the past, Plattform Industrie 4.0, Germany and Robot Revolution & Industrial IoT Initiative (RRI), Japan announced four publications, “Facilitating International Cooperation for Secure Industrial Internet of Things/ Industry 4.0”

Read More
news image

SK Telecom 6G White Paper

whitePaper | June 13, 2023

6G requires setting achievable goals and continuous communication with the market and consumers.  Efforts of all participants in the new 6G ecosystem are required, such as expanding of 6G usage scenarios, selecting candidate spectrums, vitalizing open interfaces, e.g., Open RAN, and simple architecture options, etc.

Read More
news image

Internet of Things for Telecom Engineers

whitePaper | February 11, 2020

The Internet of Things (IoT) is no longer the future: it is the new reality moving telecommunications forward. The IoT enables physical objects to see, hear, think, and perform jobs by having them “talk” to each other, share information, and coordinate decisions. The number of internet-enabled objects has surpassed the Earth’s population. Today, the IoT connects everything from HVAC thermostats and smart homes to transportation, healthcare, industrial automation, and emergency response equipment. As the prevalence of IoT innovations grow, telecom leaders must embrace the opportunities, and challenges, posed by a more connected future.

Read More
news image

Why VDI makes sense for hard-core UNIX® and Linux® engineering applications

whitePaper | July 19, 2022

By now, everyone has heard the terms desktop virtualization and VDI It seems like we’ve been pounded with marketing propaganda about these technologies from companies like VMware, Citrix® and Microsoft® since 2006. But if desktop virtualization is so good, why are most of the world’s desktops still “old-style” physical desktops and laptops?

Read More
news image

Medical and iot device security for healthcare

whitePaper | December 27, 2021

With the advent of the Internet of Things (IoT), businesses are experiencing a digital transformation bigger than the PC and Mobile revolutions combined and healthcare is no exception. The new breed of connected medical devices brings the promise of improved patient care, better clinical data, improved efficiency, and reduced costs but they also bring increased security risks.

Read More
news image

Transforming Endpoints with Artificial Intelligence

whitePaper | August 5, 2021

There has never been so much compute power available in IoT devices - now is the time to be designing and deploying true intelligence in IoT endpoints. Devices which are aware of their environment are capable of adding huge value to the data they collect and the services which they enable. This paper explores how new and emerging technology can enable your devices to see, hear and feel what is going on, interpret what they sense, take autonomous actions and generate real, trusted, valued data for the cloud. Recent developments in hardware and software will enable a step change in the capability of resource-constrained endpoint platforms, allowing developers to build vision, voice and vibration capability, coupled with genuine intelligence at the endpoint.

Read More

Spotlight

RSA

RSA’s Intelligence Driven Security solutions help organizations reduce the risks of operating in a digital world. Through visibility, analysis, and action, RSA solutions give customers the ability to detect, investigate and respond to advanced threats; confirm and manage identities; and ultimately, prevent IP theft, fraud and cybercrime. Specialties Security, Identity Assurance, Encryption, Key Management, Advanced Threats, Network Monitoring, Network Forensics, Security Analytics, Adaptive Authentication

Events