We’ve compiled a list of what every well-prepared MWC attendee should pack in their bag to ensure their experience is a successful one.
Posts from US
Posted on 18th Feb 2015 by Bernd Eckenfels in M2M
Earlier this month we announced the winner and runners-up for the #IoTMaker Challenge, with Jason Mitcheson’s 3G Bushfire Alert System proving to be the judges’ top pick. As we did previously with other entries to the contest, including a smart bike for motorcycle riders, smart swear jar and traffic accident detector, we’ve mocked up a […]
Posted on 17th Feb 2015 by Tim Cawsey in Mobile
Mobile World Congress, arguably the biggest event in the tech calendar, is just a few weeks away. Drawing over 70,000 of the brightest minds from around the globe to display and discuss the next big thing in mobile. We’re expecting to see a lot on wearables, tablets, iterative improvements to last year’s Smartphones, more movement […]
Posted on 11th Feb 2015 by Shannon Taylor in M2M
Unfortunately for the Seahawks, their last minute drive in the 4th quarter of Super Bowl XLIX fell short at the one yard line. In this post, we look at how the IoT could have saved them from what’s being called one of the worst play calls in NFL history.
Posted on 9th Feb 2015 by Manfred Kube in M2M
The time has come – our panel of expert judges has come to a decision; they’ve chosen the 3G Bushfire Alert System as the winning idea from our shortlisted IoTMaker Challenge entries. In this post we explore why it’s such a deservedly winning idea.
Posted on 5th Feb 2015 by Shannon Taylor in Enterprise Security
Whilst it’s good ‘password’ is no longer the number 1 password (now it’s number 2), there hasn’t been enough progress with regard to consumer and business habits – multi-factor authentication is the only way to address this safely; in this post, we explain why.
Posted on 29th Jan 2015 by Dominique Brulé in Mobile
We look at how the Trusted Services Hub can bridge the fragmentation endemic in mobile payments and accelerate deployments and consumer acceptance of the new services
Posted on 28th Jan 2015 by Jean-Francois Ouillet in Mobile
The average consumer uses 25 different usernames to log in to all their online services, at a cost of convenience and security. How can we address the challenge, improve the user experience and increase our overall security from the hacker threat? Mobile Authentication is one key answer.
Posted on 28th Jan 2015 by Nicole Williams in Financial Services
As the EMV migration is in full swing across the United States, contactless and mobile payment opportunities continue to grow, too. The wider availability of mobile payments like Apple Pay and SoftCard is driving this popularity as well. When contactless payment programs like these incorporate the security of EMV through the use of a secure […]
Posted on 27th Jan 2015 by Philippe Benitez in Financial Services
The Identity Theft Resource Center reported that data breaches hit an all-time high of 783 in 2014, and in many instances payment card details were compromised along with personal information like email addresses, phones numbers, or physical addresses. This meant that more payment cards had to be reissued due to breaches in 2014 than in […]