Search Results

Search results for: AI engineering

Google, T-Mobile, Silicon Labs among those to partner with ioXt Alliance to secure IoT devices

The ioXt Alliance, which describes itself as the global standard for IoT Security, announced today that major technology companies and manufacturers including Google, T-Mobile, Silicon Labs, have certified a wide range of devices through the ioXt Alliance Certification Program. (more…)

Read more

August 24, 2020

Posted by: Anasia D'mello

How to upgrade your embedded display for a punchier user experience

Why should I increase the display resolution? Integrating a higher resolution display is a popular upgrade path for today’s embedded products, says David Roberts, business manager, at Anders. This is to meet the ever-increasing expectations of end users spoiled by the latest smartphones. (more…)

Read more

August 17, 2020

Posted by: Anasia D'mello

Accenture completes acquisition of PLM Systems

Accenture in Italy has completed the acquisition of Turin-based boutique systems integrator PLM Systems. Terms of the transaction, which Accenture announced on May 19, 2020, were not disclosed. (more…)

Read more

August 5, 2020

Posted by: Anasia D'mello

Schieler joins Fibocom joint venture company Rolling Wireless as CEO

Fibocom, a global provider of IoT (Internet of Things) wireless solutions and wireless communication modules, reports that Dan Schieler has been appointed to the position of chief executive officer of Rolling Wireless Technology Co., Ltd. This is a joint venture company invested by Fibocom and three other professional investment institutions. (more…)

Read more

Posted by: Anasia D'mello

Security suite launched for critical IoT device protection

Sequitur Labs has unveiled its new embedded system security with the launch of EmSPARK 2.0, designed to prevent high-value, embedded devices from being compromised. (more…)

Read more

July 27, 2020

Posted by: Anasia D'mello

Podcast: Cave Dwellers, Privacy, Huawei and Buzzsaws

Guest Alicia Asin, CEO of IoT specialists Libellium, asks “Is it really necessary to expose our privacy to control pandemics?” Privacy Purists are in the spotlight as Jeremy Cowan and George Malim ask Alicia how enterprises should balance free services and access to our data. And, Sun of a Beach: We see how IoT can help you in Spain this summer; we anticipate the UK’s Huawei decision, and see how we can all avoid COVID Cliches. (more…)

Read more

July 20, 2020

Posted by: IoT global network

What is device attestation?

As an organisation that is founded on the expertise and insights of our members, we have taken the opportunity to discuss some of the new and emerging technologies shaping our industries, and how GlobalPlatform is working to define standards that enable digital devices and services to be securely brought to market. (more…)

Read more

July 17, 2020

Posted by: Anasia D'mello

Investigation shows problems in search for counterfeit IT components

Hardware security specialists with cyber security provider F-Secure has published a report detailing its investigation into a pair of counterfeit network switches. The investigation, which concluded that the counterfeits were designed to bypass processes that authenticate system components, illustrates the security challenges posed by counterfeit hardware. (more…)

Read more

Posted by: Anasia D'mello

Energy-efficient solutions launched for 5G and IoT edge computing, e-mobility and smart manufacturing

Delta, a global provider in power and thermal management solutions, launched an innovative digital exhibition under the theme ‘Pioneering Energy-efficient Infrastructure Technologies’ to unveil new smart and energy-efficient solutions for 5G and IoT edge computing, e-mobility, as well as smart manufacturing. (more…)

Read more

July 16, 2020

Posted by: Anasia D'mello

Cyber researchers accurately locate malicious drone users

Researchers at Israel’s Ben-Gurion University of the Negev (BGU) have learned how to pinpoint the location of a drone operator who may be operating maliciously or harmfully near airports or protected airspace. They do so by analysing the flight path of the drone. (more…)

Read more

July 7, 2020

Posted by: Anasia D'mello