Showing 1081-1090 of 1091 results.

EasyJet is using drones for maintenance applications.

Internet of Things Can Be Beneficial to Airline MROs

is realign their business models to reflect the opportunities IoT brings,” he says. Nevertheless, Grose remains optimistic on the long-term prospects of IoT in aviation. “In the future, as IoT...

Startups are flocking to the IoT space.

IoT Startups Eye Data, Sensor-Heavy Aviation Sector

little guy.” California, arguably the global tech hub capital, has seen a lot of IoT-related startups appear in recent years offering services similar to Predikto’s. C3 IoT, headquartered 30 mi....

Now and later words with red marker

The Urgent Need to Improve Industrial Internet Security

Software security expert Mike Ahmadi first noticed the spike in industrial control systems cybersecurity vulnerabilities in the NIST CVE (cybersecurity vulnerabilities and exposures) database three years ago. Software code bugs...

Why the Cure to Parkinson's Might Be in the Cloud

...data analytics platform for the project. The platform integrates a number of software components including Cloudera CDH —a secure data platform that collects, stores, and manages data of any type...

The City of San Francisco wants to ween itself off of privately owned vehicles.

Things in IoT You Need to Know This Week: May 16–20

IoT, explains Paris-based lawyer Jérôme Deroulez in a French-language article on Village Justice . 7. Amazon Debuts Programmable IoT Dash Buttons Amazon debuted its first programmable IoT dash buttons, physical...

Silhouette of two laptop users

How Digital Is Manufacturing?

...Business at Ohio State University, the digital commerce platform company Magneto, and the research and platform company Nextrade Group. “Already, companies invest about one in every five digitization dollars on...

Magnifying glass over computer monitor highlighting word security

Nine Main Challenges in Big Data Security

together to cope with new malicious software attacks, providing maximum gains in Big Data security. Here are some additional recommendations to strengthen Big Data security: Focus on application security, rather...

You are now leaving Telecoms.com

You have clicked a link which is hosted on another platform.

× Continue