32 Results for:BLE
- Sort by:
Optimizing BLE for high-volume data
19 Feb 2019Building high-volume data IoT apps with Bluetooth and Bluetooth Low Energy isn't without its challenges. Exadel's Jonathan Fries and Travis Bolinger outline best practices of developing a BLE-based ... Read More
Top 12 most commonly used IoT protocols and standards
12 Jul 2023Not every IoT communication protocol is right for every deployment or device. Consider the power and security requirements before choosing one protocol over another. Read More
A guide to networks for IoT healthcare devices
03 Oct 2022Healthcare IoT use cases are growing -- and admins must know what networks can support these devices. Familiarize yourself with protocols that provide connectivity and security. Read More
Secure printing: The foundation of multi-layered security
22 Oct 2023Implementing secure print solutions is an easy way to ensure neither network data nor printed documents fall into the wrong hands. RFID readers and mobile authentication technology solutions help ... Read More
Common types of enterprise network connections
27 Apr 2022The goal of every network is to connect devices. The connections that form those links -- such as wired cabling and wireless technologies -- are crucial in network infrastructure. Read More
Belgian security researcher hacks Tesla with Raspberry Pi
24 Nov 2020Belgian security researcher Lennert Wouters once again succeeds in hacking a Tesla vehicle, this time by exploiting the Bluetooth Low Energy standard Read More
Orange Business Services, Wirepas team for IoT smart tracking
02 Dec 2021Internet-of-things collaboration will focus on the ability to bring concrete results to businesses, such as saving time, and securing and traceability of assets Read More
Bleedingbit vulnerabilities put Wi-Fi access points at risk
02 Nov 2018Armis researchers discovered two chip-level Bluetooth vulnerabilities -- dubbed Bleedingbit -- that could allow pseudo-remote code execution on wireless access points. Read More
Despite recent vulnerabilities, you shouldn’t stop using hardware security keys like Yubikey
20 Jun 2019No solution is perfect, but these hardware security keys remain an awesome option in keeping accounts secure from attackers! Read More
Real-time location services crosses the chasm: 3 predictions for 2019
16 Jan 2019The value of the real-time location services market is booming. Quuppa's Fabio Belloni offers three predictions for the RTLS market in 2019, exploring how a leap forward in technology, partnerships ... Read More