Contributing Authors

    Beacons and geofencing: Real time enterprise asset tracking and self-service

    Part I We are living in the era of the Fourth Industrial Revolution. The World Economic Forum says the “the introduction of new technologies creates...

    Will the rapidly evolving energy infrastructure expedite the adoption of busbar trunking systems?

    The widespread use of busbar trunking systems came into vogue when large office buildings and apartment complexes needed to be powered. Busbar trunking systems...

    Malware can defeat Cyber Defense in many ways…

    Malware is a key vector for data breaches. Research shows that 51% of data breaches include the usage of malware, whether for initial breach,...

    Using Cleanrooms for Electronics Manufacturing

    A tiny particle of dust on certain products can be very damaging, which is why OEMs cannot risk particulate contamination when it comes to...

    Bluetooth Mesh Networks and Home Automation

    If you are considering getting into the home automation device game, now is the time—thanks to Bluetooth Mesh, a network topology used for establishing...

    Consumer Electronics industry in 2019: Top 5 Trends

    Consumer electronics have become an essential part of our daily routine. It has penetrated every aspect of human life leading to aggressive investment and...

    Is Power Truly Democratic?

    There are some points about solar PV technology that instantly endear us to the idea. Most of us have been dependent on supply of...

    The Ultimate Relationship of Bluetooth Mesh Networking and Cloud Connectivity

    Internet of Things, a word which can be heard in any tech conference or tech magazine or from anyone who is interested in future...

    8 Questions to Ask in DDoS Protection

    As DDoS attacks grow more frequent, more powerful, and more sophisticated, many organizations turn to DDoS mitigation providers to protect themselves against attack. Before evaluating...

    Intelligent Video: The key to transforming the in-store shopping experience

    The retail sector has felt the disruptive impact of e-commerce more than most. The inevitable costs of staffing, rent, maintenance and daily operations has...

    6 Predictions for the Surveillance Industry 2019

    Technology continues to develop at a rapid and accelerating pace. While it can be easy to become distracted by the potential of every new...

    Cyber Security Strategy to Secure the Real World

    Extending Cyber Security to the Connected Edge The development of the smartphone started a trend of connected devices that not only perform some form of...

    Increasing Collaboration at Work While Reducing Security Risk

    Security is your responsibility Employees sharing personal and private data internally and externally is a constant stress area for security teams and IT operators in...

    The Million-Dollar Question of Cyber-Risk: Invest Now or Pay Later?

    Cybersecurity is often an afterthought. Executives are quick to focus on the endgame benefits of customer-centric strategies, digital transformation, mobility, IoT and cloud computing,...

    Digital Signatures: Making e-Procurements Safer

    In today’s times, technology evolves real fast… the flip side, so do hackers. Armed with a deviously brilliant mind and superior knowledge of the...

    Related News