Business Applications

Mobile banking and small businesses

The 28 million small US companies are far from reaching the attention of mobile banking. Some FinTechs have identified the existing gaps in this market. For example, the UK start-up Monizo opens the first targeted […]

All RFID measurements from one box

Leveraging its UHF RFID test and measurement expertise, CISC enhanced its RFID Xplorer with latest SDR (software defined radio) technology and software to a new level of UHF RFID / RAIN RFID / EPC Gen2 […]

The Data Protection Dilemma

Enterprises of every size and in every industry around the globe are producing more data than ever before. At the same time, there is a greater demand for access to this information. From business intelligence […]

Beware of Cyber Threat Monday and Black Friday

Cyber-fraud is accelerating at this time of year. As consumers flock to take advantage of the best deals in stores and online, security teams are reduced and everything focuses on increasing sales volume. In all […]

Quand la cyber-sécurité contribue à l’enchantement client…

Sorry ! No translation is available !

The FinTech World Is Looking East

According to KPMG studies, FinTech investments in North American and European are decreasing in Q1 of 2016, and have been growing by 20% in Asia, amounting to a total of US-$ 2.7 billion. At the […]

Regulators monitor FinTechs and Blockchain

The fifth Money2020 conference in Las Vegas held in October 2016 brought together 11,000 delegates eager for information on the new financial techniques and on hundreds of new products and services based on the blockchain. […]

How to succeed in a Website Implementation and Design

Sorry ! No English translation available for the book written in French by J-M Hardy and Leo J. Lesage « 60 règles d’or pour réussir son site web ».

Cyber attacks on bank networks

Reuters reminds that the global network of financial messaging SWIFT suffered last June a series of hacker attacks on its subsidiaries, particularly those from Bangladesh. According to the company eSentire, threat detection service provider and […]

Classical Press, Digital Newspaper and Digital Technics

If Gutenberg’s invention revolutionized the transmission of information and communication, it took Diderot for the whole of human knowledge can be disseminated by the Encyclopedias and then the French Revolution to the ideas brewing lead […]

Stormshield and Gemalto are securing mobile data exchanges

Stormshield, an Airbus Defence and Space subsidiary, and Gemalto, a digital security expert, are consolidating their partnership in developing a technology to secure end to end connections and exchange of data on all mobile devices. […]

The Internet of Sensors starts in Europe

The “IoSense” European project began in Dresden, Germany, on the Infineon Technologies company’s site. IoSense is a 3-year R & D project with a budget of 65 million euros. It led by 33 partners from […]

About the closure of Bank Branches

Because of current economic difficulties, banks seek to reduce costs and transform their business models appropriately. One of the means used to deal with this movement is to close small branches and focus on digital […]

Cyberattacks on hospitals

Usually, the fighters will not attack hospitals during a war. In Cybercrime, hackers have no such qualms. Because, on average, in the US, hospitals are attacked approximately every 7 seconds and 24 hours a day. […]

A Thermal Imaging Smartphone

Bullitt Group, expert in rugged smartphones manufacturing will integrate the micro camera FLIR Lepton in the new Cat S60. This Android mobile terminal belongs to the range of Cat Phones rugged terminals. The Cat S60 […]

Cellular Connectivity for Connected Objects

MediaTek and Orange are offering dedicated IoT platforms integrating cellular connectivity ready for use, thus meeting an ever increasing demand for connecting objects and devices everywhere. The offer is aimed at professionals and target areas […]

IoT Solution for Real-Time Monitoring of Smart Objects

The offer “LinqUs IoT Quality of Service (QoS)” from Gemalto is a solution that enables mobile network operators to monitor the service quality of intelligent objects in real time. The “LinqUs IoT Quality of Service” […]

Cybersecurity in 2016

The information security risk must be managed as a financial deal, a commercial reputation or a legal issue. Too often, a company’s management understands the gravity of the situation only after a data breach. The […]

Fatigue and Road Safety

The French company Innov-plus has developed equipment able to analyze in real time the behavior of a car driver and any signs of fatigue or inattention. Assistance for vigilance camera system on the basis of […]

A wireless authentication for IoT

STMicroelectronics and ClevX, a company specialized in the development of IP technologies for mobile and portable storage devices, are marketing encrypted mobile storage system which is secured by DataLock with user authentication made by a […]

Towards an obligation to secure data in Europe

After United Kingdom and the Netherlands which incite starting from  the1th of January 2016 all companies to protect their data and to notify within 72 hours any serious data breach, the whole business in Europe […]

iPhone 6 or electronic identity card?

The iPhone 6 Apple terminal could play the role of security clearance and of payment card in workplaces and universities, since it has both biometric security features and mobile payment applications. Softwares for new smartphones, […]

Card Data Security Compliance

According to a new report by Verizon Communications Inc, our out of five global retailers and other merchants failed interim tests to determine whether they are in compliance with payment card data security standards. This […]

Personal Data Security : Fears and proposed cure

According to the recent study, State of Privacy, published by Symantec, the quality of customer service focuses on data security, a decisive factor in the purchase for 88% of consumers. Most French believe that businesses […]

Fujitsu Biometric Identity Multi-factor Verification

Fujitsu currently markets a multi-factor identity verification device, called “PalmSecure ID Match.” This device is designed to meet a variety of security-sensitive applications, including those in the financial, retail, social security and other public services. […]

Strengthening security measures in 2015, according to HID Global

HID Global, an expert in secured identification solutions, assesses safety, as considered from the point of view of companies. Five major technological developments have been recorded in 2014. • interoperability platforms accessible via smart card […]

Cybersecurity and Industry Convergence

The availability of connections associated with the connected objects (IoT) reinforces the need for cybersecurity. If the consequences of digital vulnerabilities for information theft, espionage or financial misappropriation are becoming well known, the awareness of […]

ETSI issues new specification for M2M modules

ETSI’s Industry Specification Group for Surface Mount Technique has released its Group Specification for Embedded Communication Modules for Machine to Machine Communications (M2).  ETSI’s specification for embedded communication modules, “GS SMT 001”, provides common physical specifications […]

Proliferation of mobile payments offerings

The world of mobile devices is abuzz following the opportunities offered by mobile NFC payments via radio that allow users to buy goods by sending related information. The Apple Pay offer competes with Google, in […]

RFID manages parachutes

Leaving no room for error, the parachutes production chain associated with RFID, reduced manufacturing costs and improved security. Since the beginning of the production of parachutes in 1943, the US military has studied the manual […]

Articles précédents

© 2015 Strategies Telecoms & Multimedia | Contact |  -