How to keep hydro-electric power under control: Managing and maintaining hydro-electric plants

By tapping into gravity and the water cycle, humans have long taken advantage of one of Earth’s most efficient and naturally occurring energy sources, water.

Read more

ip.access addresses the TV white space and fixed access markets as part of Microsoft-led Project Belgrade

ip.access, an independent small cell solution provider is happy to announce its participation in Project Belgrade, an initiative of the worldwide leader in software, services, devices and solutions, Microsoft. The project successfully demonstrates affordable internet connectivity for the unconnected using TV white space (TVWS) spectrum.

Read more

Guide to Mobile World Congress 2018

IoT Now Magazine (ISSN 2397-2807) explores the evolving opportunities and challenges facing CSPs across this sector. Our exclusive interviews pass on the key lessons learned by industry leaders in next gen Machine-to-Machine (M2M) and Internet of Things (IoT) services.  Guide to Mobile World Congress: Sequans and NTT DOCOMO partner for LTE-M adoption, smart grids to save city

Read more

PTC accelerates the global rollout of its subscription business in most markets

PTC’s new software licences for its core solutions and ThingWorx® Industrial Innovation Platform will be available globally only by subscription, effective January 1, 2019. There will only be six countries that are exceptions. The exceptions where PTC has not announced plans for a complete transition from perpetual licensing to subscription are China, India, Korea, Russia, Taiwan, and Turkey.

Read more

Over-the-air firmware: The critical driver of IoT success

In the early days of IoT, updating remote devices often caused intermittent disruption and performance degradation. As IoT platforms have matured, they have embraced a novel way to remotely and reliably update connected devices with little to no disruption: over-the-air (OTA) firmware updates.

Read more

HPE, PTC, and Wind River join effort to speed IoT software purchasing

Three of the biggest software vendors in IoT – HPE, PTC, and Wind River (Intel) – have agreed to join the IoT M2M Council’s (IMC) fledgling template RFP Program for IoT Software Platforms, which will be presented at the IMC’s conference at CES.

Read more

Why energy control room operators should travel back in time: Substation control with the energy time machine

When Britain’s energy infrastructure was first established, no one could have anticipated the increased demand for power that the future would bring. To measure the performance of today’s energy supply, power distributors largely rely on supervisory control and data acquisition (SCADA) software to gather insights from each substation.

Read more

Purpose Software adds new dashboard option to solution portfolio

Purpose Software, the supplier of business management software to the managed services and print reseller industry, has announced the immediate availability of a new dashboard option for its CBS and 2serv service management solutions. This new capability will help resellers to improve individual, team and organisational performance whilst enhancing decision-making across the business.

Read more

Orange announces the Open Source release of its OCast software technology

OCast is a software technology that allows you to use a smartphone to play videos on devices including TV set-top boxes, TV Sticks or TVs and control playback of the video (pause, fast forward and rewind, for example). Beyond video, OCast can also play and control slideshows, playlists and web apps.

Read more

Symantec selects Amazon Web Services to deliver cloud security to global customers

Amazon Web Services, Inc. (AWS), an Amazon.com company, announced that Symantec has chosen AWS as its strategic infrastructure provider for the vast majority of its cloud workloads, leveraging AWS’s infrastructure scale and maturity to deliver cloud security to its global customers.

Read more

What can we expect from the next generation of software business models?

The software industry is changing at a startling pace. From virtualisation to the cloud to the Internet of Things (IoT), what software buyers expect and demand from their software investment is drastically different than it was in years past.

Read more

Climbing the ranks in automation

The top three countries that are leaders in manufacturing have remained fairly similar over the last few decades. The US, China and Germany have continued evolving to export a large amount of products to the world. To remain high in the ranks, these countries have adopted automation, optimised their manufacturing processes and advanced production processes.

Read more

Software radio reconfiguration enables upgrades to in-vehicle and IoT radio systems

Most new cars sold today offer connectivity as a feature, whether standard or optional. Customers expect their navigation systems to be connected, to download real time traffic information and map updates.

Read more

CEVA and LG Electronics partner for smart 3D camera solution

CEVA, Inc., the licensor of signal processing IP for smarter, connected devices, announced a partnership with LG Electronics, a provider in consumer electronics and appliances, to deliver a high-performance, low-cost smart 3D camera solution for consumer electronics and robotic applications.

Read more

Flexera issues warning about cyberattacks like the Equifax Breach: they’re probably just the first known victim

As 143 million Equifax consumers continue to pick up the pieces from stolen Social Security numbers, birth dates, drivers’ licenses, addresses and credit card numbers, Flexera has another warning – expect a long tail of incidents and breaches in the months and years to come.

Read more

ESET researchers discover first-ever ransomware misusing Android accessibility services

Detected by ESET products as Android/DoubleLocker, it is based on the foundations of a particular banking Trojan, renowned for misusing accessibility services of the Android operating system. However, DoubleLocker lacks the functions related to harvesting users’ banking credentials and wiping out their accounts.

Read more