• The Art of Zen…Thermostat

    The Art of Zen…Thermostat

    The old saying of “keep it simple” has been taken to heart by thermostat developer Zen, www.zenthermostat.com. […]

  • Computer Hackers to Target Cars?

    Computer Hackers to Target Cars?

    While some believe computer hackers will only work to gain access on newer cars and their connected infotainment systems, one law group says older cars using newer technology are also at risk. […]

  • Funding, Personnel Additions to Glassbeam

    Funding, Personnel Additions to Glassbeam

    Glassbeam, Inc., www.glassbeam.com, a machine data analytics company, is making additions to both its financial and personnel lineups. […]

  • Networked Audio Solutions for the Home

    Networked Audio Solutions for the Home

    Sometimes the value of a connected solution can’t be expressed in dollars and cents. Sometimes a product or solution just makes life better. […]

In the News

  • News_Zen

The Art of Zen…Thermostat

The old saying of “keep it simple” has been taken to heart by thermostat developer Zen, www.zenthermostat.com. […]

  • News_Traffic2

Computer Hackers to Target Cars?

While some believe computer hackers will only work to gain access on newer cars and their connected infotainment systems, one law group says older cars using newer technology are also at risk. […]

  • News_WomanUsingTablet

Networked Audio Solutions for the Home

Sometimes the value of a connected solution can’t be expressed in dollars and cents. Sometimes a product or solution just makes life better. […]



 

Blog Posts

  • Blog_Peggy_Smedley

AT&T’s Lurie Is CEO

If you’ve been in the wireless connected devices industry for any length of time now then you know the name Glenn Lurie. […]

  • Blog_Tim_Lindner

Patent Report: Aug. 12-19, 2014

It looks like some of our favorite companies have shaken off the summer doldrums and are back to normal levels of patent grants. […]


The Peggy Smedley Show

Now They’re Talkin’

  • Peggy Smedley says a collaborative effort between the government, industry, and academia can help bring about better cyber protection for infrastructure and businesses.
  • According to Bryan Sartin, director of RISK Team, Verizon Enterprise Solutions,  four out of five of the initial points of entry in cyber attacks leading to theft of information come from weak, default, easily guessed, or stolen credentials.
  • Ben Feinstein, CTU director of operations and development, Dell SecureWorks,believes our reliance on new technologies is surpassing  our ability to secure and understand the interconnectedness of these devices.
  • Although embedded systems are growing fast, Mark Brooks, senior research engineer, Southwest Research Institute, www.swri.org, sees system update issues and costs as two problems involved with products using these technologies.
Listen to the entire show

Featured Product

Homepage

Tagg Tracker is a GPS-enabled pet collar that uses GPS and wireless technology to help you track a pet’s location from a computer or mobile device. With location information available 24 hours a day, […]