Articles Search Results

100 Articles and 0 related Products found for hacker
  • How do mobile credentials work?
    Needless to say, mobile phones are increasingly used as keys to open doors, due to the convenience factor. So how does the mechanism work? H...
    Editor / Provider: William Pao, a&s International | Updated: 2019 / 5 / 21
  • How IIoT can help solve smart city challenges
    The industrial internet of things (IIoT), and smart panels that facilitate power generation have a major role to play in the development of ...
    Editor / Provider: Prasanth Aby Thomas, Consultant Editor | Updated: 2019 / 3 / 26
  • What Gallagher thinks about combating cyber threats
    Needless to say, IoT security issues have become a major problem given more and more devices now reside on the Internet. Ensuring products a...
    Editor / Provider: a&s Editorial Team | Updated: 2019 / 1 / 18
  • Why edge-based solutions are key to smart buildings
    Customization could be key to provide building occupants with ideal conditions. For this to happen, technology on the edge is a potential so...
    Editor / Provider: Prasanth Aby Thomas, Freelancer | Updated: 2018 / 11 / 6