1 2 3 4 10 / 39 POSTS
Wireless IoT Devices in Agriculture Reached 17 million

Wireless IoT Devices in Agriculture Reached 17 million

The installed base of wireless IoT devices in agricultural production worldwide reached 17.0 million connections in 2016 enhancing smart farming, acco ...
The Evolution of IoT

The Evolution of IoT

by Deon Liebenberg, Managing Executive: Internet of Things, Vodacom The world is changing at warp speed – we live in an age of intelligent machines ...
Automation – Creating the Worker of Tomorrow

Automation – Creating the Worker of Tomorrow

By Andrew Hoseck – Chief Operating Officer at In2IT Technologies Job Simulator is a virtual reality game set in the future, where machines have rep ...
Fleet Management: Taking the Blinders Off

Fleet Management: Taking the Blinders Off

As fleets grow in size, there is a greater need to understand where vehicles are, what the conditions are of stock loads, and whether or not drivers a ...
Proving Identity All From The Palm of Your Hand

Proving Identity All From The Palm of Your Hand

Veridium, a leader in strong authentication using biometrics, has recently  collaborated with South Africa’s blockchain start-up Wala to bring univers ...
Interoperability at the Edge not a Challenge: IoT.nxt

Interoperability at the Edge not a Challenge: IoT.nxt

Overcoming the hurdle of retrofitting into existing infrastructure and creating system and device interoperability at the edge is a key differentiator ...
Enterprise Customers Look to Resellers to Share the Risks of IT Deployment

Enterprise Customers Look to Resellers to Share the Risks of IT Deployment

ICT resellers that want to thrive in a changing technology market need to be prepared to share risks with their customers and move towards consumption ...
The Password is King: IoT Devices Evolve but Still Prove Vulnerable

The Password is King: IoT Devices Evolve but Still Prove Vulnerable

Connected smart devices are generally considered to be a very convenient way to make our lives easier. But to what extent are they safe to use from a ...
The Crucial Role of the Cyber Insurer

The Crucial Role of the Cyber Insurer

The role of the insurer has evolved over the years, from one who simply offers protection, to one that tailors solutions specific to the needs of indi ...
How Mercedes is Stolen Using a Remote Control

How Mercedes is Stolen Using a Remote Control

Police have released CCTV footage of one of the first "relay crimes" to be caught on camera - where thieves can steal a car without needing keys. T ...
1 2 3 4 10 / 39 POSTS