Smart Solutions

Column Bernd Schöne: Documentation – Beware of Backdoors!

Column Bernd Schöne: Documentation – Beware of Backdoors!

Long-term Storage – Bernd Schöne in his column: Have you ever wondered how old the most important software packages in the world are? Spoiler alert: they’re very old.

Column: Martin Milter – IoT Provisioning – Security from The Get-Go

Column: Martin Milter – IoT Provisioning – Security from The Get-Go

In the past, IoT was focused mainly on getting things connected through sensor networks that were capable of collecting huge amounts of data – but the bigger questions remain: What should we do with all this data? How can we use and monetize it?

Column: Gerd Leonhard – Science Fiction or Science Fact?

Column: Gerd Leonhard – Science Fiction or Science Fact?

Gerd Leonhard writes about the two major forces are at work in the realm of exponential technologies.

Smart Companies: IoT Solutions for the real world

Smart Companies: IoT Solutions for the real world

Smart companies develop new technologies, that solve important problems and long-term challenges. IoT Solutions for the real world!

Smart Products: IoT-Technology in every day Products

Smart Products: IoT-Technology in every day Products

New IoT-Technology in every day Products including smart homes, health, sports, lightning or baby care.

Smart Sensors: Hot Stuff

Smart Sensors: Hot Stuff

Fire watches, or vigils, have existed since Ancient Rome. Today, instead of people, the latest generation of sensors do all the work much more reliably – and a lot cheaper. The fire detectors work together in a network and sound the alarm via the cloud and Smart Sensors.

ICS Vulnerabilities: No Lockdown for ICS Hackers

ICS Vulnerabilities: No Lockdown for ICS Hackers

Industrial control system vulnerabilities are increasing – at the same time, awareness of the security of industrial networks is growing. ■ by Chen Fradkin Few of us will have fond memories of 2020, a transformative year that forced businesses worldwide to rethink and reprioritize remote workforces, their impact on productivity […]

IoT in stolen Vehicle Recovery: It’s a Steal!

IoT in stolen Vehicle Recovery: It’s a Steal!

With the use of motor vehicles still on the rise, auto theft has become an increasing problem. New technologies are needed to protect vehicles.

eSIM and Blockchain from the very beginning: Making IoT more Independant

eSIM and Blockchain from the very beginning: Making IoT more Independant

G+D Mobile Security’s product uses a novel combination of eSIM and blockchain technology. It forms a scalable framework that can be extended from air freight to encompass land and sea operations.

Column Martin Grossen: Microsoft Azure – Connecting Stuff isn’t enough

Column Martin Grossen: Microsoft Azure – Connecting Stuff isn’t enough

Martin Grossen about the Avnet, Internet of Things in the cloud and collaboration with Microsoft for a better connected world.