In the News

  • News_TexasRoads

CSR Expands BlueCore Platform

The beauty of the IoT (Internet of Things) is how it is helping to solve challenges and deliver game-changing innovations in an increasingly connected world.

  • News_VendingMachine

QNX Tech Supports Embedded Systems

Thousands of devices are being connected to the Internet every day—from cars and streetlights to vending machines, light bulbs, and industrial machines.

  • News_Cybersecurity4

Many Lack Strong Password-Management Practices

Focus on security is more than a fleeting thought these days.

  • News_AndroidMan

Closer Look at Improvements to Google Play Services

Some recent announcements from Google,, have the tech world buzzing. Beginning on the developer’s side, an upgrade to Google Play Services will improve the experience and capability of developing on the Android platform.


Blog Posts

  • Blog_Peggy_Smedley

Not Neutral with Net Neutrality

Depending on what side of the fence you are on is whether you support net neutrality. But if there is one thing for sure, the debate on this subject will go on, and on, and on, regardless of the FCC (Federal Communications Commission),, ruling last week.

  • Blog_Tim_Lindner

“Haptics” Is Happening!

About two years ago, a savvy technology sales executive said to me that there are two “megatechnologies” based on human senses that would fuel significant business opportunities during the coming decade. They are “vision” and “voice.”

The Peggy Smedley Show

Now They’re Talkin’

  • In the wake of what could be the biggest hack yet, Peggy breaks down just how banks were taken for $1 billion, and reflects on the damage caused by cybercrime to date.
  • Jim Drylie, Ph.D., executive director School of Criminal Justice & Public Administration College of Business & Public Management, Kean University, talks policing cybercrime, raising cyber security awareness, and executives who choose to bury their heads in the sand instead of addressing their security issues.
  • Brian Zaugg, director of information security, Authentic8 Inc., discusses the security danger of Website browsers, the benefits and liabilities of M2M/IoT and the architectural principles of Internet security.
  • Peggy discusses the pros and cons of BYOD (bring your own device), what measures companies must take to secure their networks, the rise ofmalware, and more.
Listen to the entire show

Featured Product

Tagg Tracker


Keeping Tabs on Spot
Anyone who ha […]