M2M
-
The Internet of Things is Vulnerable!
By Kiran Veigas On 1 Sep 2014A recent study shows that 70% of devices connected to the Internet of Things used unencrypted network services to relay information. In the world of PCs and mobile devices, security is well addressed. But in the evolving world of the...
-
M2M Utilities: Public Security and Emergency Management in India
By Aditya Basu On 28 Aug 2014The first duty and highest obligation of any government in the world is public safety and security, leaving little or no room for error. M2M technology is a great way that can help us envisage a connected world where there...
-
M2M Utilities | Securing Your World with Panic buttons in public conveyance
By Aditya Basu On 26 Aug 2014The violence against women in India has grown to be a matter of grave concern, cutting across the boundaries of culture, class, education, ethnicity and age. Even in the 21st century, women cannot step out of their house assured of...
-
Securing Your M2M Platform – The need and way out
By Aditya Basu On 20 Aug 2014The gravest concern after choosing the right M2M platform and overcoming the challenges in the process of implementation is securing it. While leveraging an M2M platform, companies connect their workforces and mobile resources for gathering or exchanging a lot of...
-
Choosing the ideal M2M platform for your enterprise IoT
By Manu Tayal On 19 Aug 2014Enterprises today face many challenges when it comes to choosing the right Machine to Machine (M2M) platform for their Internet of Things (IoT) architecture. In most cases, these challenges surface out of the enterprises’ lack of ability to comprehend their...
Tag Cloud
Subscribe for blog updates