Search Results

Search results for: AI

Winners announced in global search for consumer experience AI, connected homes and IoT cyber security

Go Ignite, an alliance of Tier One telcos including Deutsche Telekom, Orange, Singtel and Telefonica, announced the winners of the second global search for start-ups offering the most innovative solutions for three technologies. (more…)

Read more

September 12, 2017

Posted by: Avadhoot Patil

ADT maintains top spot as Comcast challenges Vivint for second place

ADT recently surpassed two million interactive security subscribers in North America and Comcast crossed the one million subscriber mark to challenge Vivint for second place in the market. Strategy Analytics’ report published here discusses the latest industry rankings, (more…)

Read more

September 6, 2017

Posted by: Avadhoot Patil

Black Hat 2017 attendees describe how cybercrime continues unabated while enterprises’ defences remain ill-prepared

Lastline, Inc, the provider of advanced malware protection, released results of a survey that underscores how cybercrime continues to plague organisations. The survey of 134 Black Hat USA 2017 attendees found that nearly 55% of respondents have suffered a cyberattack (more…)

Read more

August 29, 2017

Posted by: Avadhoot Patil

Comprion claims to be first to release remote SIM provisioning device test bench

In line with the just published GSMA SGP.23 test specification for Remote SIM Provisioning (RSP) of eUICCs in consumer devices, Comprion has announced the release of a corresponding device test bench. The GSMA SGP.23 test specification encompassed three items under test: eUICCs, devices, and servers. (more…)

Read more

August 25, 2017

Posted by: Avadhoot Patil

ITTIA partners with Wind River and announce the availability of ITTIA DB SQL on VxWorks

ITTIA, a provider of high performance database and connectivity products for embedded systems and Internet of Things (IoT) devices, announced its partnership with Wind River® and the availability of ITTIA DB SQL on VxWorks® real-time operating system (RTOS). (more…)

Read more

August 24, 2017

Posted by: Avadhoot Patil

CSPs risk hefty government fines as new research shows continuing failure to prepare for cyber-attacks

Almost a third (31%) of businesses have been affected by cyber-crime in the past 12 months, according to new research from Databarracks. In light of this, the business continuity specialist suggests that organisations must invest in ongoing cyber awareness training, (more…)

Read more

August 23, 2017

Posted by: Avadhoot Patil

Outsourced AI and deep learning in the healthcare industry – Is data privacy at risk?

As emerging technologies, artificial intelligence (AI) and deep learning are proven to provide powerful business insights. This is especially true for the healthcare industry, says Jonathan Martin, EMEA operations director at Anomali, (more…)

Read more

Posted by: Avadhoot Patil

Zen and the art of automatic car maintenance

How safe are our cars, really? While we may be excellent drivers, that means nothing if the car itself is suffering from mechanical faults. Cars over a certain age are obliged to undergo MOT certification every year, but during the 12 months between checks, there’s actually no legal need to undergo regular maintenance. (more…)

Read more

August 21, 2017

Posted by: Avadhoot Patil

Lantronix products now available globally from Digi-Key electronics

Lantronix, Inc., a global provider of secure data access and management solutions for Internet of Things (IoT) assets, announced that its IoT modules, embedded and device gateway solutions will be available for immediate shipment worldwide through Digi-Key Electronics, (more…)

Read more

August 17, 2017

Posted by: Avadhoot Patil

Scared about supply chain cybersecurity? 5 reasons you aren’t scared enough- Part 2

We saw the 1st reason of supply chain cybersecurity in the 1st part yesterday. Now we see the remaining reasons today. In today’s world, “common criminals, organised crime rings, and nation-states leverage sophisticated techniques to launch attacks that are highly targeted and very difficult to detect,” (more…)

Read more

August 15, 2017

Posted by: Avadhoot Patil