close
close
Home Tech Trends

Tech Trends

What are the latest trends that experts observe in the technology industry? Get them here.

A Filterless Design For Air-Pollution Control

This article takes a look at the causes, effects and control of air pollution in the urban environment. It also introduces easy-to-construct home and commercial air-purifier systems to effectively control air...
bluetooth

Bluetooth Technology

Bluetooth is a wireless technology standard invented by Ericsson in 1994 for exchanging data over short distances using short-wavelength UHF radio waves (Range: 2.4 to 2.485 GHz) from fixed and mobile devices. This...

Messaging Protocol | Secuirty Fundamentals | Multiple Vulnerabiltlities

IoT Messaging Protocol is Big Security RiskThe insecure implementation of the MQTT (Message Queue Telemetry Transport) protocol, an Oasis standard for IoT communication, by many IoT product vendors is contributing to...

Building Security | Better Architecture | Cybersecurity Initiatives

Building Security into IoT Products from the Ground Up Security is too important to be an afterthought. No one wants to cobble together an aftermarket fix, and having to do so would...

IoT Security Platform | Hacking Tools | Cybersecurity Strategy

Device Authority Adds Key Features to KeyScaler for IoT Security Device Authority, a global leader in Identity and Access Management (IAM) for the Internet of Things (IoT), today announces the latest update...

CNS653-ME & LCM1500-Q Achieves 80 PLUS Efficiency Ratings for 115 Volt Industrial Power Supplies

HONG KONG — Artesyn Embedded Technologies today announced that its CNS653-ME and LCM1500-Q AC-DC power supplies have received 80 PLUS certifications for 115 volt industrial units from Ecova, the total...

Electromagnetic Hacking | Airforce Cybersecurity | Vulnerable Gadgets

Now You Can Hack a Chip With a Wave of Your Hand When You Think of a standard hacker toolkit, software vulnerabilities and malware come to mind. But a pair of researchers are...

Adaptive Security System | Spying IoT Devices | Ransomware Attack

Adaptive Data-driven Cyber Security System to Prevent Cyber Attacks Recognising the complexity of cyber attacks and the multi-stakeholder nature of tackling cyber security are the key components of a new data-driven cyber...

NTT Data: Roof computing with standard interfaces…IoT ecosystem

In order to ease the efforts of building applications over Roof platform, a unified interfacing and functional model is required. This is where Roof Computing, also known as IEEE P1931.1, comes...

Biometric IoT | Spying Apparatus | Protect Security Risks

‘Biometric’ security for smart devices could stop cyber-attacks New security technology that could stop cyber-attacks and protect the privacy of billions of smart device users worldwide could soon be available as a...

Popular Articles

Popular Videos