672 Results for:Bluetooth

  • Sort by: 

DefinitionBluetooth

Bluetooth is a telecommunications industry specification that describes how mobile devices, computers ...Read More

Norway and IoT: A match made in heaven

By Pat Brans 01 Oct 2021

Norway is becoming a centre of internet of things innovation as tech developers look for answers to some of the country's unique challenges Read More

Democratizing machine learning will transform IoT

By Svein-Egil Nielsen 26 Apr 2021

For the smart home to succeed, what happens in the home, will have to stay in the home and become smarter without the infinite compute capability of the cloud and with features such as voice ... Read More

Poly targets huddle rooms with Trio 8300

By Jonathan Dame 12 Sep 2019

Poly has designed the Trio 8300 for huddle rooms that fit no more than five people. The vendor released a video system targeted at the same market earlier this year. Read More

Partners pursue health-related IoT system integration

By John Moore 11 Dec 2020

Systems integrators Insight Enterprises and Accenture have supported initiatives to bring new health technologies to the market; other IT channel news. Read More

UK counts the cost as Ireland presses ahead with contact-tracing app

By Joe O’Halloran 23 Jun 2020

Irish eyes smiling as Republic’s heath executive said to be on verge of giving greenlight to Covid-19 tracker app, while UK reveals £11.8m cost of development to date for no return as yet Read More

IoT connectivity management platforms optimize deployments

By Shannon Flynn 24 May 2021

IT administrators can simplify IoT device and network challenges with IoT connectivity management platforms that monitor data transfers and security. Read More

Understanding BYOD policy enforcement and creation

By Michael Goad, Dan Sullivan 03 Mar 2022

A well-defined BYOD policy is critical for any organization that allows consumer devices on the network. Communicating and enforcing the BYOD policy can prevent many problems. Read More

Anker weighs in on a chain of hubs, USB on the high Cs

By Adrian Bridgwater 10 Jun 2021

Picture the scenario, you’re wandering the halls of the average technology trade show and you casually pick up a small four-port USB-C data hub and sling it into your bag without thinking too much. ... Read More

How can an authentication bypass vulnerability be exploited?

By Judith Myerson 14 Jan 2019

A vulnerability was found in Western Digital's My Cloud NAS device that can be easily exploited by hackers. Discover what this vulnerability is and how users can be protected. Read More

IoT becomes an on-ramp for edge computing

By Gordon Haff 15 Jan 2021

IoT dovetails with edge computing in two primary ways: IoT is a workload using edge computing as its platform and other edge workloads are more squarely in IoT’s influence, such as chemical plants ... Read More