• Funding, Personnel Additions to Glassbeam

    Funding, Personnel Additions to Glassbeam

    Glassbeam, Inc., www.glassbeam.com, a machine data analytics company, is making additions to both its financial and personnel lineups. […]

  • Networked Audio Solutions for the Home

    Networked Audio Solutions for the Home

    Sometimes the value of a connected solution can’t be expressed in dollars and cents. Sometimes a product or solution just makes life better. […]

  • What’s Ahead for EVs?

    What’s Ahead for EVs?

    The EV (electric vehicle) discussion is multifaceted. One common question is which comes first—the vehicles or the infrastructure? […]

  • Airbiquity Now Uses INRIX and Parkopedia

    Airbiquity Now Uses INRIX and Parkopedia

    It’s no secret that traffic and limited parking availability are annoyances motorists don’t want to have to deal with after a long commute. […]

In the News

  • News_WomanUsingTablet

Networked Audio Solutions for the Home

Sometimes the value of a connected solution can’t be expressed in dollars and cents. Sometimes a product or solution just makes life better. […]

  • News_GEGasPump

What’s Ahead for EVs?

The EV (electric vehicle) discussion is multifaceted. One common question is which comes first—the vehicles or the infrastructure? […]



 

Blog Posts

  • Blog_Peggy_Smedley

AT&T’s Lurie Is CEO

If you’ve been in the wireless connected devices industry for any length of time now then you know the name Glenn Lurie. […]

  • Blog_Tim_Lindner

Patent Report: Aug. 12-19, 2014

It looks like some of our favorite companies have shaken off the summer doldrums and are back to normal levels of patent grants. […]


The Peggy Smedley Show

Now They’re Talkin’

  • Peggy Smedley says a collaborative effort between the government, industry, and academia can help bring about better cyber protection for infrastructure and businesses.
  • According to Bryan Sartin, director of RISK Team, Verizon Enterprise Solutions,  four out of five of the initial points of entry in cyber attacks leading to theft of information come from weak, default, easily guessed, or stolen credentials.
  • Ben Feinstein, CTU director of operations and development, Dell SecureWorks,believes our reliance on new technologies is surpassing  our ability to secure and understand the interconnectedness of these devices.
  • Although embedded systems are growing fast, Mark Brooks, senior research engineer, Southwest Research Institute, www.swri.org, sees system update issues and costs as two problems involved with products using these technologies.
Listen to the entire show

Featured Product

Homepage

Tagg Tracker is a GPS-enabled pet collar that uses GPS and wireless technology to help you track a pet’s location from a computer or mobile device. With location information available 24 hours a day, […]