Smart City

More News

VIEW ALL

TMC's 5GExpo.com Launches as Part of the #TECHSUPERSHOW 2021 in Miami

By: SmartCity News     4/8/2020

Producers of ITEXPO and IoT Evolution Expo Launch New Conference & Expo Exploring Applications, Use Cases, and Competitive Landscape in 5G-enabled Fixed and Mobile Communications

Read More

Sigfox Issues Open Letter Challenging IoT to Fight COVID-19, Waives Connectivity Fees

By: Ken Briodagh     4/7/2020

On April 3, Sigfox issued a challenge to the IoT industry to leverage technology to help mitigate impact of the ongoing global pandemic of the COVID-19 crisis.

Read More

Nokia Rolls Out New Wi-Fi 6 Mesh Router

By: Chrissie Cluney     4/7/2020

Nokia has added a new Wi-Fi 6 Beacon to its whole-home WiFi portfolio, according to a recent release.

Read More

Nozomi Networks and Deloitte Partner on IT, OT and IoT Security in EMEA

By: Ken Briodagh     4/7/2020

Deloitte's EMEA Cybersphere Center and Nozomi Networks have launched a partnership to address growing demand in the EMEA for managed security services and solutions in the IT, OT and IoT.

Read More

Samea and Sequans Partner on Smart Building IoT Monitoring Solution

By: Ken Briodagh     4/3/2020

New Smart Building Wireless Sensor monitors building conditions, including light, heat, movement with LTE connectivity

Read More

Separating COVID-19 Fact from Fiction in the IoT

By: Special Guest     4/3/2020

Here are the top five things that will not happen in IoT in 2020. In fact, the coronavirus likely pushes the horizon for these things even further into the future.

Read More

IoT Time Podcast S.5 Ep.13 Wi-Charge

By: Ken Briodagh     4/2/2020

In this episode of IoT Time Podcast, Ken Briodagh sits down with Ori Mor of Wi-Charge, to talk about Batteries, wireless power transmissions, charging technology and energy sustainability.

Read More

Creating a "Botnet" of Good IoT Devices

By: Special Guest     4/1/2020

IoT devices are not as secure as they could be. At any point in time, at least a small fraction of devices are under the control of threat actors and malicious software.

Read More