burgerlogo
article

All Articles

Cloud Software

How Do Amazon, Google, and Microsoft Fight Cyber Threats?

Amazon, Google, and Microsoft have all taken steps to fight growing cybersecurity concerns. This is how they compare.

Guest Writer

Nov 11, 2021

article img

Cloud Software

How Do Amazon, Google, and Microsoft Fight Cyber Threats?

Guest Writer

Nov 11, 2021

article img

Augmented Reality

How IoT Has Helped Power The Olympics Games

IoT is changing the way we watch and play sports, including the Olympics. Read more about how the Games are changing with IoT.

SIMON IoT

Nov 11, 2021

article img

Augmented Reality

How IoT Has Helped Power The Olympics Games

SIMON IoT

Nov 11, 2021

article img

Machine Learning

Few-Shot Machine Learning Explained: Examples, Applications, Research

Few-shot machine learning algorithms sacrifice some accuracy in exchange for a more flexible dataset, but the disadvantages can be mitigated by algorithmic improvements.

MobiDev

Nov 10, 2021

article img

Machine Learning

Few-Shot Machine Learning Explained: Examples, Applications, Research

MobiDev

Nov 10, 2021

article img

Entertainment and Tourism

How IoT Can Help Businesses in the Sports and Fitness Industry

IoT has a potential for businesses at the intersection of sports, wellness, and health to boost their offerings. It is driven by the change in consumers expectations towards how they do sports and watch them. Connected sports gear, wearables, fitness apps, sports venues — all can benefit from joining forces with IoT technology.

Guest Writer

Nov 10, 2021

article img

Entertainment and Tourism

How IoT Can Help Businesses in the Sports and Fitness Industry

Guest Writer

Nov 10, 2021

article img

Cloud Software

AWS IoT Core Limits and Impact on IoT Design

AWS IoT Core has some limitations and quotas that developers will want to keep in mind when using it. Here are the Service Quotas for AWS and what the service quotas mean for IoT professionals.

Guest Writer

Nov 9, 2021

article img

Cloud Software

AWS IoT Core Limits and Impact on IoT Design

Guest Writer

Nov 9, 2021

article img

Cybersecurity

How to Choose an Affordable RoT for Maximum IoT Security

In the last couple of years technologies have evolved that enable silicon chips to produce their own identities and keys. This article explains how that's done today, and what's coming next to improve security and cut costs.

Guest Writer

Nov 8, 2021

article img

Cybersecurity

How to Choose an Affordable RoT for Maximum IoT Security

Guest Writer

Nov 8, 2021

article img

Cybersecurity

Why Securing Your IoT Device Has Never Been More Important

IoT security is complicated. Professionals in the field should understand best practices for efficient risk assessment and mitigation.

Eseye

Nov 5, 2021

article img

Cybersecurity

Why Securing Your IoT Device Has Never Been More Important

Eseye

Nov 5, 2021

article img

Predictive Maintenance

The Factory of the Future Will Be Resilient

Predictive maintenance and Machine Health solutions can help manufacturers boost resilience in the face of disruption.

Augury

Nov 5, 2021

article img

Predictive Maintenance

The Factory of the Future Will Be Resilient

Augury

Nov 5, 2021

article img

Contact Tracing

Types of Real-Time Bluetooth Location Systems

Bluetooth devices in general, and BLE devices in particular, can transmit valuable data with negligible energy costs for monitoring and processing.

Minew

Nov 4, 2021

article img

Contact Tracing

Types of Real-Time Bluetooth Location Systems

Minew

Nov 4, 2021

article img

Automotive

GPS Vehicle Trackers, Security, and Consumer Privacy

Assessing your threats and testing your IoT product for security robustness against those threats is key to your IoT success.

Kudelski IoT

Nov 3, 2021

article img

Automotive

GPS Vehicle Trackers, Security, and Consumer Privacy

Kudelski IoT

Nov 3, 2021

article img

Device Management

5 IoT Security Challenges That Keep CISOs up at Night

Security vulnerabilities can create chaos for CISOs, threatening both their reputation and their users' data. These five concerns are the most pressing for CISOs in the near future.

Aeris

Nov 3, 2021

article img

Device Management

5 IoT Security Challenges That Keep CISOs up at Night

Aeris

Nov 3, 2021

article img

IT and Security

AI Biometric Authentication for Enterprise Security

AI and machine learning can improve the security value of biometric data when matched and authenticated against user credentials.

MobiDev

Nov 2, 2021

article img

IT and Security

AI Biometric Authentication for Enterprise Security

MobiDev

Nov 2, 2021

article img
logo

The Most Comprehensive IoT Newsletter for Enterprises

Showcasing the highest-quality content, resources, news, and insights from the world of the Internet of Things. Subscribe to remain informed and up-to-date.

Looking to Advertise on IoT For All?

Check out our Partner Program to drive maximum value for your brand across our channels!