C# expected to be Tiobe language of the year
While C# fell short of Tiobe’s Programming Language of the Year honors for 2022, Tiobe expects the Microsoft-built object-oriented, type-safe language to snag the honor for 2023. Tiobe will announce the winning programming language in January. Tiobe gives Programming Language of the Year honors to the language with the most growth year over year in […]
Read MoreEMQ Honored With Frost & Sullivan’s 2023 Global Enabling Technology Leadership Award
Morgan Hill, CA, Nov. 29, 2023 – Following an in-depth analysis by Frost & Sullivan of the MQTT connectivity platforms industry, EMQ has been honored with the prestigious 2023 Global Enabling Technology Leadership Award for MQTT Platforms. Known for its pioneering work, particularly “MQTT over QUIC,” EMQ has established itself as a frontrunner in IoT data connectivity solutions. The company’s […]
Read MoreThe best new features in C# 12
C# 12 arrived in November with .NET 8, bringing several new features—primary constructors, collection expressions, inline arrays, and more—that make it simpler and easier to write more efficient code. Just as we walked through the .NET 8 highlights previously, in this article we’ll take a close look at the key new features in C# 12. […]
Read MoreTransmission Control Protocol (TCP)
What is Transmission Control Protocol (TCP)? Transmission Control Protocol (TCP) is a standard that defines how to establish and maintain a network conversation by which applications can exchange data. One of the main communication protocols of the IP suite, TCP resides at the transport layer of the Open Systems Interconnection (OSI) model. It works with […]
Read MoreHow to Implement Device Convergence for Sigfox & LoRaWAN
Illustration: © IoT For All One of the most frequently asked questions when it comes to convergence is “How to implement convergence for a Sigfox and LoRaWAN device/solution?” There are multiple IoT stakeholders in the IoT ecosystem that have already ventured what I would call “Hybridation” – the deployment of hybrid schemes in their IoT […]
Read MoreIoT Device Security Challenges: Calling for Consumer Vigilance
Illustration: © IoT For All IoT device security challenges are a highly debated topic, for good reason. In this article, Attila Szasz, CEO and founder of BugProve will shed some light on the reasons, the trends, and current expectations. What Are the Global Security Challenges with IoT Devices? Perhaps the biggest wake-up call was the […]
Read MoreNavigating cloud concentration and AI lock-in
It’s not that difficult to understand. When we move to any new technology, we increase risk. Risk of lock-in, failure, and, most commonly, the risk of building solutions that don’t return enough value to the business. Gartner surveys have underscored the emerging risk of cloud concentration. They emphasize the potential wide-scale impact of business continuity […]
Read MoreVision Technology in Medical Manufacturing
Illustration: © IoT For All In the world of modern medicine, there’s one tiny component that plays a colossal role. It’s the kind of component that finds its way into your arteries during procedures like an angiogram or takes center stage in life-saving organ surgeries. The mere thought of its importance might send a shiver […]
Read MoreSateliot and t42 Lead the Way with Satellite-Based 5G IoT Maritime Tracking Solution
Barcelona, San Diego – Sateliot, the first company to operate a Low-Earth orbit (LEO) 5G IoT satellite constellation, and t42, the global expert in providing IoT tracking devices for maritime containers, have signed a collaboration agreement to boost connected containers, enabling shipping companies to save 47 billion euros annually. t42 will deploy thousands of 5G-IoT […]
Read Moretiming attack
What is a timing attack? A timing attack is a type of side-channel attack that exploits the amount of time a computer process runs to gain knowledge about or access a system. There are practical implementations of timing attacks against some encryption methods. How do timing attacks work? Timing attacks measure how long a computer […]
Read More