IoT relies on five key attributes to ensure a secure foundation for services to run over

Security in IoT is a process that relies on continuous security across five key dimensions of an IoT service. These five attributes are Secure Boot, Secure Firmware over the Air, Secure Physical Interface and APIs, Secure Physical Transport Layer and Robustness. Here, Mats Andersson, the senior director of technology for short range wireless at u-blox,

Read more

Telekom Austria Group delivers promised new M2M company

Vienna, Austria: As first reported by M2M Now on July 7th, 2011, the Telekom Austria Group has set up a new subsidiary company in the M2M field. The new company, the Telekom Austria Group M2M GmbH, acts as

Read more

Vodafone Case Studies: Real-world examples of putting these technologies to work

Vodafone foresees ‘trillions’ of connected devices and has provided machine-to-machine connectivity for its customers around the world

Read more