loader image

14216 Riyadh, Saudi Arabia

Office Hours: 8:00 AM – 6:00 PM

  • December 22 2023
  • Smart Transformation

EMQ Honored With Frost & Sullivan’s 2023 Global Enabling Technology Leadership Award

Morgan Hill, CA, Nov. 29, 2023 – Following an in-depth analysis by Frost & Sullivan of the MQTT connectivity platforms industry, EMQ has been honored with the prestigious 2023 Global Enabling Technology Leadership Award for MQTT Platforms. Known for its pioneering work, particularly “MQTT over QUIC,” EMQ has established itself as a frontrunner in IoT data connectivity solutions. The company’s […]

Read More
  • December 22 2023
  • Smart Transformation

The best new features in C# 12

C# 12 arrived in November with .NET 8, bringing several new features—primary constructors, collection expressions, inline arrays, and more—that make it simpler and easier to write more efficient code. Just as we walked through the .NET 8 highlights previously, in this article we’ll take a close look at the key new features in C# 12. […]

Read More
  • December 21 2023
  • Smart Transformation

Transmission Control Protocol (TCP)

What is Transmission Control Protocol (TCP)? Transmission Control Protocol (TCP) is a standard that defines how to establish and maintain a network conversation by which applications can exchange data. One of the main communication protocols of the IP suite, TCP resides at the transport layer of the Open Systems Interconnection (OSI) model. It works with […]

Read More
  • December 21 2023
  • Smart Transformation

How to Implement Device Convergence for Sigfox & LoRaWAN

Illustration: © IoT For All One of the most frequently asked questions when it comes to convergence is “How to implement convergence for a Sigfox and LoRaWAN device/solution?” There are multiple IoT stakeholders in the IoT ecosystem that have already ventured what I would call “Hybridation” – the deployment of hybrid schemes in their IoT […]

Read More
  • December 20 2023
  • Smart Transformation

IoT Device Security Challenges: Calling for Consumer Vigilance

Illustration: © IoT For All IoT device security challenges are a highly debated topic, for good reason. In this article, Attila Szasz, CEO and founder of BugProve will shed some light on the reasons, the trends, and current expectations. What Are the Global Security Challenges with IoT Devices? Perhaps the biggest wake-up call was the […]

Read More
  • December 20 2023
  • Smart Transformation

Navigating cloud concentration and AI lock-in

It’s not that difficult to understand. When we move to any new technology, we increase risk. Risk of lock-in, failure, and, most commonly, the risk of building solutions that don’t return enough value to the business. Gartner surveys have underscored the emerging risk of cloud concentration. They emphasize the potential wide-scale impact of business continuity […]

Read More
  • December 19 2023
  • Smart Transformation

Vision Technology in Medical Manufacturing

Illustration: © IoT For All In the world of modern medicine, there’s one tiny component that plays a colossal role. It’s the kind of component that finds its way into your arteries during procedures like an angiogram or takes center stage in life-saving organ surgeries. The mere thought of its importance might send a shiver […]

Read More
  • December 18 2023
  • Smart Transformation

Sateliot and t42 Lead the Way with Satellite-Based 5G IoT Maritime Tracking Solution

Barcelona, San Diego – Sateliot, the first company to operate a Low-Earth orbit (LEO) 5G IoT satellite constellation, and t42, the global expert in providing IoT tracking devices for maritime containers, have signed a collaboration agreement to boost connected containers, enabling shipping companies to save 47 billion euros annually. t42 will deploy thousands of 5G-IoT […]

Read More
  • December 17 2023
  • Smart Transformation

timing attack

What is a timing attack? A timing attack is a type of side-channel attack that exploits the amount of time a computer process runs to gain knowledge about or access a system. There are practical implementations of timing attacks against some encryption methods. How do timing attacks work? Timing attacks measure how long a computer […]

Read More
  • December 17 2023
  • Smart Transformation

The (Network) Core of Connectivity in Mobile Telecoms

Illustration: © IoT For All The core network typically stays imperceptible in cellular communication systems, unlike radio access networks, which reveal visible elements such as cell towers. But what is a core network, what does it do, and why do these functions matter to you as an end-user? Let’s take a look at the role […]

Read More