WELCOME TO The THE INTERNET OF THINGS REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Keysight | December 21, 2021
Keysight Technologies, Inc. (NYSE: KEYS), a leading technology company that delivers advanced design and validation solutions to help accelerate innovation to connect and secure the world, announced that Fibocom has selected the company’s 5G solutions to perform comprehensive testing, verification and optimization of wireless modules developed for 5G and internet of things (IoT) applications.
Fibocom, a global supplier of wireless communication modules and solutions headquar...
Cavli Wireless, Inc. | June 25, 2020
Cavli Wireless, a cellular module manufacturer headquartered in California with operations in Europe, Middle East and Asia, is set to change the face of global IoT deployments by launching a disruptive IoT adoption plan – Cavli Hubble99. IoT connectivity enablement is a multi-stakeholder ecosystem that includes module manufacturers, telecom operators, and platform providers to manage the hardware, connectivity, and subscriptions. Currently for SMBs and Enterprises, the total cost of owners...
Hologram, Inc. | July 08, 2020
Starting today, Hologram customers can unlock a new level of cellular IoT connectivity with Hologram Hyper, our eUICC SIMs and platform. Hyper helps organizations scale faster across different markets by providing over-the-air, updatable access to Hologram's full portfolio of cellular IoT connectivity partners and profiles. It's the key to flexibility for your IoT project—in coverage, performance, and pricing. "Software is eating the world," says Hologram founder and CEO ...
Venturebeat | February 11, 2020
Can AI help prevent distributed denial of service (DDoS) attacks and improve smart home security? Cujo AI says yes. The company recently inked a deal with Comcast to shield almost 20 million households from malware and spyware — and perhaps just as importantly, to protect the rest of the internet from insecure IoT devices on those homes’ local networks. How? By using machine learning on huge amounts of network data to build a graph of normal device traffic and tracking anomalies that...
SOFTWARE AND TOOLS
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE