WELCOME TO The THE INTERNET OF THINGS REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
ThroughTek | October 12, 2015
ThroughTek, leading Internet of Things (IoT) & market-leading Machine-to-Machine (M2M) solutions provider, today announced findings from its “IoT Makers’ Battle Report” that highlights consumers’ brand and device preferences across IoT. The report found nearly half of consumers aware of IoT devices on the market are most familiar with Apple’s IoT devices (48%), while surprisingly only 13 percent are most familiar with Google’s connected devices. Rounding t...
ThroughTek Co., Ltd. | January 24, 2017
ThroughTek Co., Ltd., a leading IoT (Internet-of-Things) platform and cloud solutions provider, announced today that it has registered as Taiwan’s first IoT company on the Emerging Stock Board (ESB) of Taipei Exchange (TPEx), effective January 18, 2016. ThroughTek reported its operating revenue of 153.77 million New Taiwan Dollars for the year of 2016, with a YoY growth of 42%, reaching historical high....
ThroughTek Co., Ltd. | September 06, 2016
ThroughTek, IoT total solution provider for device connectivity and video technology, has collaborated with a leading chipset provider and automotive manufacturing company in China to develop a low-power video surveillance solution for the connected car. The monitoring system became available last month for a select model in China, and will be available for other well-known brands later this year....
Tech Radar | January 13, 2020
The risks of cybersecurity are more complex than ever. Due to the rise of the Internet of Things (IoT) and Artificial Intelligence (AI), by 2020 every person will generate 1.7 megabytes of information per second. As new technologies evolve, cyber criminals adapt and discover new hacking methods to apprehend sensitive data. AI and IoT have the potential to revolutionise society, but what happens when these new technologies are weaponized by cyber criminals? Unless hardware-based endpoint security...
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE