32 Results for:BLE

  • Sort by: 

Optimizing BLE for high-volume data

By Jonathan Fries 19 Feb 2019

Building high-volume data IoT apps with Bluetooth and Bluetooth Low Energy isn't without its challenges. Exadel's Jonathan Fries and Travis Bolinger outline best practices of developing a BLE-based ... Read More

Top 12 most commonly used IoT protocols and standards

By Mary K. Pratt 12 Jul 2023

Not every IoT communication protocol is right for every deployment or device. Consider the power and security requirements before choosing one protocol over another. Read More

A guide to networks for IoT healthcare devices

By Babak Beheshti 03 Oct 2022

Healthcare IoT use cases are growing -- and admins must know what networks can support these devices. Familiarize yourself with protocols that provide connectivity and security. Read More

Secure printing: The foundation of multi-layered security

By Louella Fernandes 22 Oct 2023

Implementing secure print solutions is an easy way to ensure neither network data nor printed documents fall into the wrong hands. RFID readers and mobile authentication technology solutions help ... Read More

Common types of enterprise network connections

By Andrew Froehlich 27 Apr 2022

The goal of every network is to connect devices. The connections that form those links -- such as wired cabling and wireless technologies -- are crucial in network infrastructure. Read More

Belgian security researcher hacks Tesla with Raspberry Pi

By Alex Scroxton 24 Nov 2020

Belgian security researcher Lennert Wouters once again succeeds in hacking a Tesla vehicle, this time by exploiting the Bluetooth Low Energy standard Read More

Orange Business Services, Wirepas team for IoT smart tracking

By Joe O’Halloran 02 Dec 2021

Internet-of-things collaboration will focus on the ability to bring concrete results to businesses, such as saving time, and securing and traceability of assets Read More

Bleedingbit vulnerabilities put Wi-Fi access points at risk

By Michael Heller 02 Nov 2018

Armis researchers discovered two chip-level Bluetooth vulnerabilities -- dubbed Bleedingbit -- that could allow pseudo-remote code execution on wireless access points. Read More

Despite recent vulnerabilities, you shouldn’t stop using hardware security keys like Yubikey

By Kyle Johnson 20 Jun 2019

No solution is perfect, but these hardware security keys remain an awesome option in keeping accounts secure from attackers! Read More

Real-time location services crosses the chasm: 3 predictions for 2019

By Fabio Belloni 16 Jan 2019

The value of the real-time location services market is booming. Quuppa's Fabio Belloni offers three predictions for the RTLS market in 2019, exploring how a leap forward in technology, partnerships ... Read More