Articles Search Results

218 Articles and 0 related Products found for hacking
  • How do mobile credentials work?
    Needless to say, mobile phones are increasingly used as keys to open doors, due to the convenience factor. So how does the mechanism work? H...
    Editor / Provider: William Pao, a&s International | Updated: 2019 / 5 / 21
  • What are some common security issues in IIoT?
    The smart factory concept, enabled with IIoT, has in many ways transformed manufacturing. Yet with so many connected devices in place, they ...
    Editor / Provider: William Pao, a&s International | Updated: 2019 / 3 / 14
  • Setting up robust networking in smart factories
    For smart factories looking to leverage the advances of “Industry 4.0,” establishing robust connectivity between controllers, like programma...
    Editor / Provider: John Liu | Updated: 2019 / 2 / 25