Articles by tag: consumer security

New Biden IoT Security Program Will Give U.S. IoT Adoption a Boost

IoT security
   The Biden Administration's recent launch of the U.S. Cyber Trust Mark, an IoT security labeling program, is a significant stride towards safeguarding Americans from Read more

Latest

improved usable range
An Advantage of 6.25 kHz Radios—Improved Usable Range
December 1, 2023

Improved usable range extends communication across various industries. Icom’s latest video highlights a significant advancement in radio technology that improves usable range, offered through NXDN™ 6.25 kHz radios compared to traditional 12.5 kHz models. The video explains how NXDN radios, operating at 6.25 kHz, provide a more usable signal over the same distance as […]

Read More
multipath resilience
Understanding the Advantages of 6.25 kHz Radios in Multipath Resilience
December 1, 2023

6.25 kHz radios offer an advantage in multipath resilience. In radio communication, multipath interference is a significant challenge, often leading to signal distortion and loss. This Icom video looks at the advantages of 6.25 kHz radios, particularly their resilience to multipath interference. The video delves into the technicalities of multipath interference – a phenomenon […]

Read More
IoT and tokenization
Revolutionizing Logistics with IoT and Tokenization: A Deep Dive into the Future
December 1, 2023

Revolutionizing logistics with IoT and tokenization—this core theme forms the crux of exploration in the latest episode of Semi-Related, an Optym Podcast. Host Chris Torrence, Chief Strategy Officer for Optym, engages with Todd Haselhorst, Founder/CEO of HEALE Labs, in a conversation that promises to reshape our understanding of the logistics industry. In this episode, […]

Read More
All Articles
New Biden IoT Security Program Will Give U.S. IoT Adoption a Boost
July 21, 2023

The Biden Administration’s recent launch of the U.S. Cyber Trust Mark, an IoT security labeling program, is a significant stride towards safeguarding Americans from associated security risks. It will feature a distinct shield logo on products that meet cybersecurity criteria, including unique and strong default passwords, data protection, regular security updates, and incident detection […]

Read More