Industry Categories

Sensor Fusion in Autonomous Mobile Robots – enabling AMRs to...

We can imagine how complex it is to fuse all the sensory channels together and teach machines to take decisions independently. Let us look at…

Security ─ a major part of DevSecOps

What is DevSecOps? The term DevOps stands for Development and Operations, where the right tools and different mindsets come together for the benefit of the…

Technical Guideline for Securing IoT Devices from Cyber Attacks

Technical Guideline for Securing IoT Devices from Cyber Attacks

With exponential growth in the number of IoT devices in all sectors and the number of cyber-attacks is also increasing thus developing secure IoT devices…

Bring Internet of Medical Things (IoMT) Devices to Life with...

Today, MedTech innovations are harnessing the power of technology and helping the healthcare industry in newer and innovative ways. We all know that AI/ML have…

Botnet Attacks: How IoT Devices become Part/Victim of such Attacks

What is Botnet? The word “Botnet” is jargon used in the IT industry. It is a combination of two words “Robot” and “Network”─“bot”from the robot…

How to Improve Security in IoT Applications

How to Improve Security in IoT Applications

Hackers can create catastrophic situations if they get access to the IoT ecosystem. Therefore, it’s crucial to protect it. Azure IoT provides a secure channel…

eVTOL aircraft – Future of elevated/aerial transportation

eVTOL aircraft – Future of elevated/aerial transportation

We all know that air travel is the quickest and most efficient mode of transportation since it uses natural routes and does not necessitate the…

Digital Health Cloud Platform – Ecosystem View, Integration Touchpoints, and...

The healthcare delivery teams are adopting new ways of offering accessible and affordable care due to the recent challenges of care team shortage and the…

Role of IoT in fueling EV charging future growth

Role of IoT in fueling EV charging future growth

This is the fourth blog in a series of ‘Digital transformation in EV charging value chain’ and it focuses on the growing needs of IoT…

Thick Client Application Security Assessment

Thick Client Application Security Assessment

Thick clients are being referred to by many names: Fat, Rich, or Heavy Clients. It follows a client-server architecture and can be developed using different…