WELCOME TO The THE INTERNET OF THINGS REPORT
Newsletter | Member Login | Signup
Home > Companies > Truphone
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
iot-now | May 10, 2018
Global mobile operator, Truphone, has received GSMA accreditation for its eSIM subscription management solution. This endorsement means Truphone joins a select group of companies to receive accreditation for its subscription management solution from the GSMA – an organisation that sets the standards for the mobile industry globally. Truphone’s solution enables SIM profiles to be downloaded into eSIM ready smartphones, wearable tech and other IoT devices – rendering the traditio...
Enterprise Iot
Nozomi Networks | January 25, 2024
Nozomi Networks Inc., the leader in OT and IoT security, today introduced Guardian Air™, the industry's only wireless spectrum sensor purpose-built for OT and IoT environments worldwide. With 80 percent of new IoT deployments wirelessly connected, wireless is quickly becoming a preferred network. The explosion of wirelessly connected devices increases potential access points and exploitation of networks. This puts critical infrastructure at risk of cyberattacks and disruptions to...
Industrial IoT
Tuya Smart | January 24, 2024
Tuya Smart, the global IoT developer service provider, has delivered its Best Practices in using Amazon Aurora at IoT industry. Amazon Aurora is a relational database management system (RDBMS) built for the cloud with full MySQL and PostgreSQL compatibility. Tuya and Amazon Web Services (AWS) built a solid basis of collaboration in database use cases exploration while also delivering smooth operation of billions of devices requiring high concurrency and low latency. Tuya...
Tech Radar | January 13, 2020
The risks of cybersecurity are more complex than ever. Due to the rise of the Internet of Things (IoT) and Artificial Intelligence (AI), by 2020 every person will generate 1.7 megabytes of information per second. As new technologies evolve, cyber criminals adapt and discover new hacking methods to apprehend sensitive data. AI and IoT have the potential to revolutionise society, but what happens when these new technologies are weaponized by cyber criminals? Unless hardware-based endpoint security...
infographic
Whitepaper
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE