The Motorola Atrix 4G was the first smartphone with a fingerprint scanner for quicker, more secure login authentication. But the security feature's widespread use came about when Apple introduced it in its iPhone 5s back in 2013. Since then, Snapdragon-powered Android phones have made...
HONG KONG — Qualcomm announced it will support a new generation of video and imaging devices at its 4G/5G Summit. The Qualcomm Snapdragon connected camera portfolio includes a suite of camera platforms featuring hardware and software capabilities for on-camera deep learning and video analytics,...
HONG KONG — Qualcomm announced it will support a new generation of video and imaging devices at the 4G/5G Summit. The Qualcomm Snapdragon connected camera portfolio includes a suite of camera platforms featuring hardware and software capabilities for on-camera deep learning and video analytics, 4K High...
Fraud remains a significant risk for communication service providers, but the right tools can help prevent issues and speed up the onboarding of new customers
Today’s business environment is fraught with identity theft, data breaches and overall fraud exposure. Communications service providers are particularly vulnerable to...
As more "things" from watches to sensors to vehicles are given connectivity, there are two fundamental goals: make sure the technology works as expected, and make sure it is secure. In different devices, the testing to ensure those two aspects can look very different.
RCR...
As more "things" from watches to sensors to vehicles are given connectivity, there are two fundamental goals: make sure the technology works as expected, and make sure it is secure. In different devices, the testing to ensure those two aspects can look very different.
RCR...
AT&T cloud business now includes support from Amazon Web Services and deeper integration with IBM targeting enterprise customers
AT&T bolstered its cloud efforts, announcing deals with Amazon Web Services and IBM.
The multiyear deal with AWS calls for the delivery of integrated solutions using each company’s...
Connected to the Yahoo hack, can users protect themselves from future attacks and will it affect the sale to Verizon/AOL?
I think you’d have to have been living in a cave if you didn’t see any online news stories or live TV news broadcasts about...
Securing the industrial IoT
The Industrial Internet Consortium, an organization formed to accelerate the industrial "internet of things," today published the Industrial Internet Security Framework, a common IoT security framework that addresses security issues in industrial systems. The IISF emphasizes the importance of five IIoT characteristics: safety,...
Securing the industrial IoT
The Industrial Internet Consortium (IIC), an organization formed to accelerate the industrial internet of things (IIoT), today published the Industrial Internet Security Framework (IISF), a common IoT security framework that addresses security issues in industrial systems. The IISF emphasizes the importance of five...
As the telecommunications space evolves to serve new segments like IoT and use new technologies like NFV and SDN, security remains a critical challenge
This is a time of great opportunity for communications service providers. Demand for all sorts of cloud-based services is on the...
Saving money and creating a connected beer center
Del Papa is a beer distribution company founded more than a century ago, and the company today distributes 10 million cases of beer annually from 30 suppliers. More than 375 employees work at their headquarters in Texas City,...
Lockheed Martin turned to 3D technology and big data to streamline the diagnostics and maintenance processes for its F-35 and F-22 fighter planes, according to a case study provided by the Industrial Internet Consortium
The F-35 Lightning II is a family of fifth-generation stealth aircraft developed...
Lockheed Martin turned to 3D technology and big data to streamline the diagnostics and maintenance processes for its F-35 and F-22 fighter planes, according to a case study provided by the Industrial Internet Consortium
The F-35 Lightning II is a family of fifth-generation stealth aircraft developed...
Can the use of IP-based PTT platforms allow for a more profitable, secure and efficient working environment in the security space?
The global security industry is growing at a rapid pace. More professional and coordinated operations across disciplines and geographical borders among criminals is one...
IIoT security: critical importance, under-addressed
The industrial internet of things presents a cybersecurity concern of a scale we have never before seen. Its premise alone – making every "thing" around us connected to a network – is enough to spur the imagination of entire environments...
The dangers of an insecure IIoT system
Wired detailed the frightening consequences of vulnerable computer-based systems in its 2008 article Industrial control systems killed once, and will again, experts warn. With the expansion of “smart devices” into the automobile and medical industries, those predictions are more...
Does continued growth of the IoT open up cybersecurity concerns for building automation?
Every day when we arrive at the office we take some things for granted – the lights will be on, the heat or air conditioning will be working and the building entry...
Security is one of the major concerns surrounding the Rio 2016 Olympic and Paralympic Games, and not only physical security. Information and communications technology providers interviewed by RCR Wireless News for a special Olympics series (check all stories here) put cybersecurity at the top of their list...
Preparing for the Olympics with a smart building
Honeywell created what it called the "intelligent system" for the National Stadium in Beijing, China, turning the venue for the opening and closing events at the 2008 Summer Olympics into a "smart building." Designed by highly controversial artist...
Preparing for the Olympics with a smart building
Honeywell created what it called the "intelligent system" for the National Stadium in Beijing, China, turning the venue for the opening and closing events at the 2008 Summer Olympics into a "smart building." Designed by highly controversial artist...
Baidu provides 3 tips for operators looking to support a surge in data connected with the upcoming 2016 Summer Olympic Games in Brazil
With spectators streaming the events worldwide, athletes posting pregame rituals on social media and fans taking selfies in the stands, smartphone activity...
In a move intended to bolster its end-to-end cloud security portfolio, Cisco this week agreed to acquire Massachusetts-based security startup CloudLock for $293 million.
CloudLock uses an API-based approach to provide cloud access security broker tech geared toward enterprise-grade security and analytics related to cloud...
Security is primary hold up to enterprise internet of things
The majority of enterprises have already deployed internet of things solutions, according to a new report from 451 Research, which saw the greatest adoption coming from utilities and manufacturers.
Taking stock of the source of enterprise...