Skip to main content
Loading ...

Your Country

Your Country

Change your address
Search

You are here

RSS FeedSubscribe to Blog RSS Feed

New

by Patrick Mannion

The Security Manifesto and accompanying Digital Social Contract are an industry‑wide call to action from Arm’s CEO at the recent Arm TechCon, but developers have to act now, using available tools and pushing back to ge

November 17, 2017
Arm TechCon

There’s a lot that goes into making IoT applications run smoothly and securely. From designing the hardware to ensuring robust connectivity, security, privacy, and data collection, the success of a prototype or of an end product hinges on cleanly clearing all of these hurdles. Sound daunting?

October 25, 2017
Prototype shooting jacket that gives feedback on position and stability of the participant’s arm

CSR

by Paul Gough

Electronics and sportswear are not a natural combination. The materials are quite different; you have hard, rigid and fragile electronics compared to the soft, flexible, robust and washable textiles.

September 27, 2017
Water meter

by Ludger Boeggering

As smart electricity metering rollouts progress across Europe, Asia and the United States, other utilities are looking to get in on the act. Those involved in water, gas and heat are now also seeking to take advantage of the benefits.

July 28, 2017
Big Data Management

by Craig S. Mullins

The number of connected things is projected to grow exorbitantly before the end of the decade.

June 16, 2017
LTE

IoT

by Sabrina Bochen

LTE. Most of us know it as the technology that lets us watch our videos on our phone, but the truth is, there’s much more to it than that. While high speed smartphone connectivity is how most of us know LTE today, it isn’t just about higher speeds and video streaming.

May 17, 2017
With automobiles generating gigabytes of data, FASTR has a plan to secure that data while ensuring user privacy, but it needs help.

by Patrick Mannion

In a connected world, very few worthwhile things can happen in isolation, and this is particularly true of automotive security and privacy.

April 07, 2017

by Ben Smeets, Per Ståhl

Security is critical for a trustworthy Internet‑of‑Things. To achieve this, it is crucial we solve the main challenge of secure identities for constrained IoT devices and find efficient ways to deal with the many identity technologies in use.

March 22, 2017