WELCOME TO The THE INTERNET OF THINGS REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
SuperCom | January 11, 2022
SuperCom, a global provider of secured solutions for the e-Government, IoT and Cybersecurity sectors, announced today that it has secured a new electronic monitoring contract in Wyoming. The contracting agency is an Adult and Juvenile Probation Agency and plans to use SuperCom's PureTrack GPS smartphone products to monitor their case load for location compliance. The contract is structured as a recurring per unit per day lease model, with billing at the end of each month.
IoT.Business.News | March 04, 2020
Farnell has published new research on the Internet of Things (IoT) which confirms strong adoption of Artificial Intelligence (AI) within IoT devices, alongside new insights on key markets, enablers and concerns for design engineers working in IoT. AIoT is the major emerging trend from the survey, demonstrating the beginning of the process to build a true IoT ecosystem. Research showed that almost half (49%) of respondents already use AI in their IoT applications, with Machine Learning (ML) the m...
IoT Tech News | February 21, 2020
The IoT is barreling towards the enterprise – but companies remain highly vulnerable to IoT-based attacks, according to a new report.The study from Extreme Networks, which polled 540 IT professionals across industries in the North America, Europe and Asia Pacific regions, found that 70% of companies who said they employed IoT devices were fully aware of successful or attempted hacks. 84% of those polled said they employed IoT devices of some subscription, with more than half admitting they...
Embedded computing | January 14, 2020
OEMs often tout their “system approach” to design. In theory, this means that they look at the end application, and then design each aspect of the system to meet the needs of that application. Security is no different. The OEM must ensure that there are no holes in the security chain. However, the OEM typically stops at the outside of the box. If you plug in a rogue device, you’re generally on your own. Or if there’s a problem upstream, like with the cloud provider, it&rs...
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE