burgerlogo
article

All Articles

5G

An Introduction to a Full 5G System

There are three application spaces designated for 5G– eMBB to replace 4G, URLCC for data transfer, and mMTC for device networks.

Guest Author

Mar 19, 2020

article img

5G

An Introduction to a Full 5G System

Guest Author

Mar 19, 2020

article img

Connectivity

3 Reasons Why Your IoT Initiatives Need SD-WAN

Three key reasons why SD-WANs make it easier to scale your IoT initiatives in line with rapidly changing business requirements.

Guest Writer

Mar 19, 2020

article img

Connectivity

3 Reasons Why Your IoT Initiatives Need SD-WAN

Guest Writer

Mar 19, 2020

article img

Connectivity

MQTT vs SSE: A Comparison

Both MQTT and SSE protocols are built upon a pub/sub concept, using a ‘broker’ when distributing messages. However, their Applications differ. We've taken a look at how they compare.

Guest Writer

Mar 18, 2020

article img

Connectivity

MQTT vs SSE: A Comparison

Guest Writer

Mar 18, 2020

article img

Cloud Software

The Importance of IoT Platforms Through the Eyes of an MVNO

The purpose of this article is to analyze the importance of an IoT platform through the perspective of an MVNO. Firstly, we have assessed the different types of IoT platforms and their specific requirements. After that, we have looked at the major features of a comprehensive telecom services solution that can help MVNOs fulfill those IoT requirements.

Guest Writer

Mar 16, 2020

article img

Cloud Software

The Importance of IoT Platforms Through the Eyes of an MVNO

Guest Writer

Mar 16, 2020

article img

Consumer Products

5 Ways to Secure Your IoT Devices—Before They Get Hacked

A brief overview of ways to protect your IoT devices from hackers before you start using them. The article touches on two-factor authentication, the importance of routinely updating your devices, and why you should disable UPnP features—just to name a few.

Guest Writer

Mar 13, 2020

article img

Consumer Products

5 Ways to Secure Your IoT Devices—Before They Get Hacked

Guest Writer

Mar 13, 2020

article img

Uncategorized

IoT Security and Common Criteria Framework

The Internet of Things (IoT) has entered the home. As cloud technology continues to expand its market reach, cloud-based applications are starting to make waves in the consumer market.

Guest Author

Mar 12, 2020

article img

Uncategorized

IoT Security and Common Criteria Framework

Guest Author

Mar 12, 2020

article img

Uncategorized

How Do We Enhance Trust in Connected Things?

Today, we have the Internet of Things, and we enjoy the hyper-connectivity it provides if only we can get ourselves to trust it. Our security technology is lagging behind, so how do we enhance trust in connected things?

Guest Author

Mar 12, 2020

article img

Uncategorized

How Do We Enhance Trust in Connected Things?

Guest Author

Mar 12, 2020

article img

Uncategorized

EU Cybersecurity Certification Framework and the Philosopher's Stone

The EU’s new Cybersecurity Act aims to improve EU cyber resilience and response by building upon existing instruments that keep networks and information systems secure.

Guest Author

Mar 12, 2020

article img

Uncategorized

EU Cybersecurity Certification Framework and the Philosopher's Stone

Guest Author

Mar 12, 2020

article img

Uncategorized

National Security Certifications for IT/IoT Products — DON'T GET LOST

In the EU there is currently a multitude of cybersecurity certification initiatives. However, the EU wants to set up an EU-wide certification framework through the Cybersecurity Act.

Guest Author

Mar 12, 2020

article img

Uncategorized

National Security Certifications for IT/IoT Products — DON'T GET LOST

Guest Author

Mar 12, 2020

article img

Uncategorized

Trusting Your Connected Gifts Blindly

Christmas is the time of giving, and it’s very likely some of you received new tech toys, including IoT devices. After all, they are frequently used on a day-to-day basis and have become an essential part of many people’s daily lives.

Guest Author

Mar 12, 2020

article img

Uncategorized

Trusting Your Connected Gifts Blindly

Guest Author

Mar 12, 2020

article img

Uncategorized

Towards a Happy & Secure New IoT Year

The year behind us has brought much cybersecurity-related news, and not all of it was good. With the multitude of high-profile breaches and reports of IoT devices used to carry out DDoS attacks and cybercriminals becoming more daring.

Guest Author

Mar 12, 2020

article img

Uncategorized

Towards a Happy & Secure New IoT Year

Guest Author

Mar 12, 2020

article img

Uncategorized

How Safe Are Smart Homes From Cyber Attacks

The biggest trend in the past year has been the rise of smart homes and devices. With everything from our light switches to our fridges connected to the internet, how safe are smart homes from cyber attacks?

Guest Author

Mar 12, 2020

article img

Uncategorized

How Safe Are Smart Homes From Cyber Attacks

Guest Author

Mar 12, 2020

article img
logo

The Most Comprehensive IoT Newsletter for Enterprises

Showcasing the highest-quality content, resources, news, and insights from the world of the Internet of Things. Subscribe to remain informed and up-to-date.

Looking to Advertise on IoT For All?

Check out our Partner Program to drive maximum value for your brand across our channels!