WELCOME TO The THE INTERNET OF THINGS REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Sequans Communications, Thales | January 21, 2021
Sequans Communications reported that Thales expects to utilize Sequans' second-generation Monarch 2 and Calliope 2 stages as a reason for its new generation of Cinterion IoT LTE-M/NB-IoT and Cat 1 modules.
Thales has been utilizing Sequans' first-generation monstrous IoT modem technology in its Cinterion IoT modules since 2015 and has sent them around the world. The accessibility of Sequans' second-generation massive IoT chips will currently fuel the second period of j...
LoRa Alliance | September 15, 2021
The LoRa Alliance®, the global association of companies backing the open LoRaWAN® standard for the Internet of Things (IoT) low-power wide-area networks (LPWANs), today announced that Tony Shakib, general manager/partner of Azure IoT Engineering at Microsoft, has joined the LoRa Alliance board of directors. Microsoft is widely considered a hyperscaler for LoRaWAN, and its participation in the alliance can strengthen the technology’s presence in the LPWAN market.
Identiv | February 14, 2022
Identiv, Inc., a global leader in digital security and identification in the Internet of Things (IoT), today announced its partnership with Wiliot, a SaaS company with a platform connecting the digital and physical world through the IoT. Identiv's new Bluetooth (BLE) IoT Pixels for the mass IoT Market feature built-in logic and communicate intelligently to create an ecosystem of digital products in healthcare, pharma, and smart packaging, including tracking cold chain, temperature, moisture,...
Tech Radar | January 13, 2020
The risks of cybersecurity are more complex than ever. Due to the rise of the Internet of Things (IoT) and Artificial Intelligence (AI), by 2020 every person will generate 1.7 megabytes of information per second. As new technologies evolve, cyber criminals adapt and discover new hacking methods to apprehend sensitive data. AI and IoT have the potential to revolutionise society, but what happens when these new technologies are weaponized by cyber criminals? Unless hardware-based endpoint security...
SOFTWARE AND TOOLS
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE