WELCOME TO The THE INTERNET OF THINGS REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
TELUS | January 04, 2021
Circle Insights Inc. (MTRX:TSXV) (RACMF:OTCQB) (the "Organization" or "Circle"), a supplier of contactless arrangements and computerized reasoning ("AI") to drive constant experiences, improved client commitment and mechanized scene following to the physical space, is satisfied to declare that IoT accomplice TELUS (T:TSX; TU:NYSE) is quickening its association with Loop Insights in 2021 by dispatching an immediate and backhanded public deals and promoting effort exh...
NCR Corporation | September 18, 2020
NCR Corporation, a software and services leader for the retail, restaurant and banking industries, today announced a collaboration with Microsoft to power NCR Digital Connected Services (DCS).
NCR’s Digital Connected Services Internet of Things (IoT) management software will run on top of Azure IoT AI technology. That means data can be turned into insights faster, and incidents that could potentially impact availability can be identified sooner, increasing uptime. Through th...
IoT EEtimes | March 12, 2020
Last month, we were planning to conduct a series of interviews and meetings at the Mobile World Congress (MWC), here in Barcelona. Obviously, it has been impossible to realize those meetings; the GSMA canceled the entire conference and exhibition. We didn’t want to miss the opportunity to bring IoT Times readers the latest news about IoT solutions, including new chipsets, connectivity, security, 5G, and other relevant technologies. After the GSMA announcement of canceling MWC, we reached o...
Embedded computing | January 14, 2020
OEMs often tout their “system approach” to design. In theory, this means that they look at the end application, and then design each aspect of the system to meet the needs of that application. Security is no different. The OEM must ensure that there are no holes in the security chain. However, the OEM typically stops at the outside of the box. If you plug in a rogue device, you’re generally on your own. Or if there’s a problem upstream, like with the cloud provider, it&rs...
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE